Keyavi Portal

If you're a Keyavi Administrator, see Keyavi Portal Administration for admin-related tasks.

The Keyavi Portal is where you, the data ownerClosed A user that encrypts the file with Keyavi and maintains control of that data throughout its lifecycle from the Data Management Console., can manage Keyavi-protected data and access to it. However, if you're a Keyavi User or Security Administrator, you can also manage other users' data and define user settings. Keyavi PolicyClosed Rules associated with a protected payload that designate which users can access the encrypted file, from what locations, and for what time periods. Administrators configure geolocationClosed The ability to track a device’s physical whereabouts down to latitude and longitude coordinates, or more practically, a physical address, using GPS, cell phone towers, WiFi access points and IP address lookup, or a combination of these. policies, offline access, and Intelligent Directory.

It’s up to your organization’s system administrator to determine what functionality and components a Keyavi Administrator can access. Access to each component and functionality should follow the defined Keyavi Security Groups list below.

These are role types allowed to access the web portal:

Role

Description

Portal Access

Read-only user Download the agent, access Keyavi Web, and update profile settings.
  • Clients

  • Profile Settings

Full access user Manage self-data and update profile settings.
User Administrator Manages user access and user's data, such as reassigning data to another user.
  • Dashboard

  • User Management

  • Clients

  • Profile Settings

Security Administrator Monitor security alerts, revoke access (user, file, and device), restrict offline access, and view file chain of custody (forensics).

Policy Administrator

Manage cross-company policies, such as GEO policies, offline access, and Intelligent Directory.

Guest

All users and groups who are external to the organization require read-only access.

DecryptClosed The process of opening a protected, encrypted file and transforming it back into its original, accessible form for authorized users based on policies set for that file.

*Read-only access
**View their data only