The Guardian System is a role-based access control mechanism that allows you to securely share assets with specific team members while maintaining fine-grained control over who can view and manage your sensitive information.
When you create an asset in Key Man Out, you automatically become its Custodian - the owner with full control. You can then assign other team members as Gatekeepers or Successors, each with different levels of access and responsibilities.
The Guardian System ensures that:
Who: The person who created the asset (automatically assigned)
Can Do:
Cannot Do:
Use Case: You are the owner of credentials for a critical service and want to ensure your team can access them in an emergency, but only with proper safeguards.
Who: A trusted team member who acts as an additional security layer
Can Do:
Cannot Do:
Use Case: Your IT security manager who should be notified of emergency access attempts and can block suspicious requests, but doesn't need to see the actual credentials.
Who: A team member who may need emergency access to the asset
Can Do:
Cannot Do:
Use Case: Your department head who needs to access the company's domain registrar credentials if you're unavailable during a critical DNS issue.
The guardian management panel showing Custodian, Gatekeepers, and Successors
To add a guardian to an asset:
The team member will receive an email notification that they've been added as a guardian, along with their role and responsibilities.
Important Notes:
Custodians can remove Gatekeepers instantly without any approval:
The Gatekeeper will receive an email notification that they've been removed.
Removing a Successor requires a special approval workflow to prevent unauthorized removal of important disaster recovery contacts:
If No Other Successors Exist: The removal is instant, just like removing a Gatekeeper.
If Other Successors Exist: An approval request is created:
Why This Workflow?
This approval process ensures that:
To see which assets you're a guardian for:
You'll receive email notifications for:
Goal: Ensure your team can access domain registrar credentials if you're unavailable.
Setup:
Goal: Critical certificates need to be renewed, but only specific people should access them.
Setup:
Goal: CEO needs to ensure CFO and COO can access critical accounts if unavailable.
Setup:
Q: Can I have multiple Custodians on one asset? A: No, only the person who created the asset is the Custodian. Ownership cannot be transferred.
Q: What happens if the Custodian leaves the company? A: The team owner can reassign assets or Successors can request access. Plan for this by assigning multiple Successors to critical assets.
Q: Can a Gatekeeper become a Successor? A: Not simultaneously. You'd need to remove them as a Gatekeeper first, then add them as a Successor.
Q: How long do removal requests last? A: Successor removal requests expire after 7 days if not approved or denied.
Q: Can I remove all Successors from an asset? A: Yes, but each removal (after the first) requires approval from remaining Successors. The last Successor can be removed instantly.
Q: What if no one approves a Successor's access request? A: Access requests don't expire automatically. Successors should communicate with Custodians and other guardians to get timely responses. Time-delay requests auto-approve if not denied.
Q: Can I see a history of who accessed an asset's secret? A: Custodians receive email notifications each time someone accesses their asset's secret, including timestamp, location, and IP address.
Asset Management
Master asset creation, organization, and management in Key Man Out. Learn about encrypted secrets, file attachments, auto-save features, and guardian roles.
Access Request System
Learn how Successors request and gain access to protected assets using standard approval, time-delay, or DNS verification methods in Key Man Out.