📄️ Connection Process
The connection process is an essential aspect of our end-to-end encryption paradigm. It is imperative to ensure the highest level of security during user authentication. A key principle is that software APIs should never directly share passwords with our encryption API.
📄️ Two-Factor Authentication (2FA) Activation
Enabling Two-Factor Authentication (2FA) provides an additional layer of security for users. This process unfolds in two steps.
📄️ Password Recovery
Password recovery is a secure process that requires account verification by the user's software. If the software deems the user legitimate in requesting a password reset, the user's software API can request a short-lived authorization token from our API to renew the password.
📄️ Secure Encryption Key Storage
Secure encryption key storage is at the core of our approach to ensuring data confidentiality. This paradigm emphasizes securing encryption keys throughout their lifecycle.
📄️ Encryption and Decryption
The process of encryption and decryption is a crucial step in our security architecture, ensuring the confidentiality of data throughout its transit.
📄️ Cloud and On-Premise Modes
We offer our clients the freedom to choose between our Cloud and On-Premise modes to cater to their specific infrastructure and security needs.
📄️ Usage of X-LAGERTHA Header
The Lagertha API goes beyond security standards by introducing an additional mechanism to ensure integrity and prevent replay attacks. Each API call must include the custom X-LAGERTHA header to enhance the security of the entire process.