Not all secrets require the same level of protection. A development API key needs different safeguards than production database credentials. Key Man Out's intelligent access control lets you match security measures to sensitivity—without creating operational bottlenecks.
Choose between Standard Approval, Time-Delay, or DNS Verification based on security needs
Best For: Moderate-sensitivity assets requiring quick access with oversight.
How It Works:
Typical Use Cases:
Business Benefit: Quick access for legitimate needs while preventing unauthorized silent access.
Example Scenario:
Account manager out sick. Backup manager requests access to client contract. Sales director receives notification on phone, reviews context, approves. Backup gains access immediately to continue client service. Original manager notified upon return.
Best For: High-sensitivity assets where urgency itself is suspicious.
How It Works:
Configurable Business Hours Awareness:
Typical Use Cases:
Security Benefit: Time delay allows custodian to become aware and respond even if temporarily unreachable. Legitimate requests proceed, suspicious ones get caught.
Example Scenario:
Attacker compromises successor account, requests access to AWS root credentials. Request triggers 48 business-hour delay. Custodian returns from weekend trip, sees notification, denies request. Attack prevented despite successor account compromise.
Emergency Override: Custodian can grant immediate access when genuine emergency verified:
Production database crash. DBA requests credentials with 24-hour delay. CTO confirms emergency, overrides delay, grants immediate access. System restored, full audit trail maintained.
Best For: Domain-related assets requiring proof of domain ownership.
How It Works:
Typical Use Cases:
Security Benefit: Requesting access to example.com credentials? Prove you control example.com DNS first. Social engineering and account compromise mitigated through cryptographic proof.
Example Scenario:
Successor requests access to domain registrar account for
acmecorp.com. System generates tokenkmout-verify-a3f9b2c8. Successor adds TXT record_keymanout.acmecorp.comwith token value. System polls DNS, verifies record, grants access. Successor downloads credentials, manages domain, removes DNS record.
Advanced Protection:
Standard Configuration: Any designated gatekeeper can approve.
Best For: Most business scenarios where trust in individual gatekeepers is established.
High-Security Configuration: Multiple gatekeepers must approve.
Best For:
Example:
Production database credentials require 2 of 3 approvals: CTO, Security Officer, Lead Architect. Even if attacker compromises one gatekeeper account, access denied without second approval.
Custodian final authority combined with gatekeeper oversight.
Best For: Assets where ownership is clear but delegation is needed.
Gatekeepers can deny requests with reason:
Denial triggers:
Custodian always maintains ultimate authority:
Configurable access windows:
Automatic expiration:
Custodian can revoke anytime:
Instant revocation:
Different assets, different workflows:
| Asset Tier | Method | Approvers | Delay |
|---|---|---|---|
| Tier 1: Low Sensitivity | Standard | 1 gatekeeper | None |
| Tier 2: Moderate | Standard | 2 gatekeepers | None |
| Tier 3: High | Time-Delay | 1 gatekeeper | 24 hours |
| Tier 4: Critical | Time-Delay + Consensus | 2 of 3 gatekeepers | 48 hours |
| Tier 5: Domain-Specific | DNS Verification + Time-Delay | Automatic (DNS) + 1 gatekeeper | 12 hours |
Same asset, different workflows based on context:
Production Database Credentials:
Domain Registrar Account:
Bottom Line: Match security to sensitivity. Fast access when safe, delayed access when prudent, cryptographic proof when critical. Every request logged, every approval recorded, every custodian informed.
Guardian System
Complete control over who can access what with custodians, gatekeepers, and successors. Learn how Key Man Out's three-tier role hierarchy provides security with business continuity.
Team-Based Organization
Organize secrets by team or family with flexible membership, independent vaults, and compartmentalized access. Learn how Key Man Out supports collaboration without compromising security.