Data Management Administration

As a Security Administrator, you’ll use the Data Management Console to recall files, modify access, add users, and add policyClosed Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods. requirements on all the protectedClosed The process of encrypting a file and tying access policies to it so that authorized users can access the data securely based on restrictions set by the data owner. data a user has created.

You can also drill down into the details of a protected file to view the:

  • Chain of Custody Events: Entire lifecycle of Keyavi-protected data from creation to every access attempt. It helps you understand how your data is being accessed and how it’s protecting itself. The list shows the:

    • Name of the user who took the action

    • Date and time of action

    • Type of action attempted

    • Status

      You can drill down even further for details like the IP address, MAC address, UUID, and device name. For more details, View Chain of Custody Events.

  • Policy Audit Trail: Every change to user access and policies made to the IKD file. The list shows:

    • Who made the change (you, the data owner)

    • Action

    • Date and time

    • Modification date

Search for a File

You can search for a file by filtering on File Type, Date Created, or Recalled Date, and drill down further by a timeframe:

  • 1D - the last day (24 hours)

  • 7D – the last week

  • 1M – the last month (30 days)

  • 6M – the last six months

  • YTD – January 1st of the current year to the current date

  • 1Y – the last year

Revoke a File

When you recall a file, you prevent a previously authorized recipient access to the data.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want recalled. The Data Management Detail window opens.

  3. From the Access Authorization panel click Recall.

  4. The file gets recalled immediately.

Reinstate a File

You can also reinstate access to a file that you had previously revoked.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want access reinstated.

  3. From the Access Authorization panel, select the recipient from the list, and click Un Recall.

The file gets reinstated immediately.

Revoke Authorization to a File

You can revoke access to a file.

  1. Select Data Management from the left navigation.

  2. Filter for and select the file you want access revoked on.

  3. From the Access Authorization panel, select the recipient from the list, and then select Change Access.

  4. Toggle Revoke Authorization to Yes. Then select Update.

Reinstate Authorization to a File

You can also reinstate access to a file you previously revoked.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want access un-revoked.

  3. From the Access Authorization panel, select the recipient from the list, and click Change Access.

  4. Toggle the Revoke Authorization to NO. Then click Update.

Change Access Rights to a File

You can change usage rights to a file even after sharing the data.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want to modify.

  3. From the Access Authorization panel, select the recipient from the list, and then click Change Access.

  4. Select the USAGE RIGHTS you want to give and then click Update.

Add a New User to Access a File

As authorized users change over time, for example, new members joining the team, you can add them to access the file.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want to modify.

  3. From the Access Authorization panel, click Add Authorization.

  4. Select the USAGE RIGHTS you want to give.

  5. Select the user(s) and/or group(s) you want to provide access to and then click Authorize.

If you don't see the user listed, contact your Keyavi administrator.

Update the File-level Geolocation

You can change the authorized geolocationClosed The ability to track a device’s physical whereabouts down to latitude and longitude coordinates, or more practically, a physical address, using GPS, cell phone towers, WiFi access points and IP address lookup, or a combination of these. of a protected file.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want to update.

  3. Above the Access panel, click Authorized Locations.

  4. Define a location using one of these two methods:

    • Enter a city, address, or zip code in the Location search, and then select the matching location. Show meClosed

      The remaining fields populate with relevant details.

    • Using decimal degrees, enter the latitude and longitude coordinates Lat,Long. Show meClosed

      While the number of decimal places you use in the coordinates affects the precision of the geolocation protection, Keyavi checks only the first four digits of the user's location when evaluating access locations.

      The remaining fields populate with the geolocation details for the entered coordinates.

  5. In Location Name, enter a name to identify the location.

  6. If you want this policy to apply to one user only, in User, select the user to apply the policy to.

  7. Click Save Location.

Update the Access Time of a File

You can change the access time frameClosed A specific window of time when access is allowed to a file. The time frames can be open-ended, so you can set just a beginning date and time or ending date and time. of a protected file.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want to update.

  3. In the Access panel, select the calendar icon and clock icon for:

    1. Access Start Time - Earliest date and time the data becomes accessible to authorized users. The start date should be before the end date.

    2. Access End Time - Expiration date and time the data becomes inaccessible to authorized users. The end date should be after the start date.

    To clear the start and end times, click the X to the left of the calendar and time icons.

  4. Click Update.

View Chain of Custody Events

You can view the entire lifecycle of Keyavi-protected data from creation to every access attempt to help you understand how your data is accessed and how it's protecting itself.

  1. Select Data Management from the left navigation.

  2. Search for and select the file you want to view.

  3. From the Chain of Custody Events panel, click Details for the event you want to view to drill down further into the event.

    The Custody Details window opens.