{"id":17908,"date":"2021-02-10T18:00:00","date_gmt":"2021-02-10T17:00:00","guid":{"rendered":"https:\/\/www.kyos.ch\/?p=17908"},"modified":"2023-05-05T14:07:55","modified_gmt":"2023-05-05T12:07:55","slug":"what-is-double-key-encryption-dke","status":"publish","type":"post","link":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/","title":{"rendered":"What is Double Key Encryption (DKE)?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17908\" class=\"elementor elementor-17908\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c1df1d6 elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"3c1df1d6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-260433a7  kyos-vertical-menu elementor-hidden-phone\" data-id=\"260433a7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c8cbf60 kyos-fixed-item elementor-widget elementor-widget-template\" data-id=\"5c8cbf60\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8783\" class=\"elementor elementor-8783 elementor-8533\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a813e45 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a813e45\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5af3eb\" data-id=\"d5af3eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-26058eb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"26058eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3e54c19\" data-id=\"3e54c19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cde3b2 kyos-fixed-item elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8cde3b2\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/staging.kyos.ch\/kyos\/\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"19.432\" height=\"44.834\" viewBox=\"0 0 19.432 44.834\"><path id=\"Trac&#xE9;_4373\" data-name=\"Trac&#xE9; 4373\" d=\"M7.771,22.432h0L19.432,0H11.687L0,22.432l11.687,22.4h7.745Z\" fill=\"#2d2926\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-48b921f\" data-id=\"48b921f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-390f19f kyos-fixed-item-black elementor-widget elementor-widget-text-editor\" data-id=\"390f19f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a style=\"color: #2d2926!important;\" href=\"\/en\/kyos\/\">About<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6e00f63\" data-id=\"6e00f63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-95c6fd8\" data-id=\"95c6fd8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49bd5e6 elementor-widget elementor-widget-heading\" data-id=\"49bd5e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is Double Key Encryption (DKE)?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9445cba uae-toc-hide-heading elementor-widget elementor-widget-author-box\" data-id=\"9445cba\" data-element_type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/Kyos_Collaborator_Thibaud_Work-300x300.jpg\" alt=\"Picture of Thibaud Merlin\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h2 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tThibaud Merlin\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Cloud Security Architect<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02d8fa9 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"02d8fa9\" data-element_type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\" class=\"attachment-full size-full wp-image-17909\" alt=\"Illustration de double key encryption\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg 640w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa65eb6 elementor-widget elementor-widget-heading\" data-id=\"aa65eb6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Introduction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-159f5f7 elementor-widget elementor-widget-heading\" data-id=\"159f5f7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is DKE?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5733488 elementor-widget elementor-widget-text-editor\" data-id=\"5733488\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DKE \u2013 or Double Key Encryption\u2013 is a new option offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.<\/p><p>Given that many customers are worried to start their journey to the cloud because of data protection concerns, Microsoft implemented a new option to protect unstructured data (documents, files) against unauthorized access, wherever the document or file is stored AND against the cloud provider itself.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ec1cd3 elementor-widget elementor-widget-heading\" data-id=\"1ec1cd3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is MIP?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c6cbb8 elementor-widget elementor-widget-text-editor\" data-id=\"4c6cbb8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Using MIP files are encrypted and protected against unauthorized access, not only in your internal perimeter but in every location.<\/p><p>Documents are encrypted, and the encryption key is encrypted too. To protect this key, MIP uses by default a master key in the Azure Key Vault (either in an HSM or software-protected): the master key is accessible to service accounts to be able to use standard cloud features (like eDiscovery).<\/p><p>With DKE file encryption keys are protected by two master keys: the first is still in the Azure Key Vault, while the second could be either with a second cloud provider (e.g., cloud HSM) or on an on-premises server (backed with an HSM\/KMS). This means you can have full control of who access the key and when. ISP service accounts are not able to decrypt DKE encrypted files, thus making them available only to those who are authorized on your own system.<\/p><p>Currently DKE allows two ways to authorize users and both require LDAP access to Active Directory:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06973a8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"06973a8\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">LDAP-Gruppenmitgliedschaft<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">E-Mail-Adressen (basierend auf dem UPN des Benutzers)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ae521b elementor-widget elementor-widget-text-editor\" data-id=\"8ae521b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft publishes the source code of the internal server, you will be able to develop additional features for new authorization methods.<\/p><p>At this point, DKE uses the credentials entered the Office Client to authenticate the user on the DKE server. \u00a0<\/p><p>All this is pretty cool, isn\u2019t it?<\/p><p>Indeed, it is. However, you must keep the following in mind: since ISP service accounts are not able to access DKE protected files, you will be not able to use some cool cloud features \u2013 in fact all features which need access to the contents of the protected documents (like SharePoint Online Co-Authoring, Office Web App, eDiscovery)<\/p><p>DKE is the new AD RMS, with one more foot in the Cloud Door.<\/p><p>&#8220;As&#8221; in the sense of &#8220;when&#8221;? Is it already published?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bffc688 elementor-widget elementor-widget-heading\" data-id=\"bffc688\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How does it work<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579bd02 elementor-widget elementor-widget-image\" data-id=\"579bd02\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"695\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/KYOS_Post_DKE_Schema-1024x890.png\" class=\"attachment-large size-large wp-image-8989\" alt=\"\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/KYOS_Post_DKE_Schema-1024x890.png 1024w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/KYOS_Post_DKE_Schema-300x261.png 300w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/KYOS_Post_DKE_Schema-768x667.png 768w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/03\/KYOS_Post_DKE_Schema.png 1386w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa0fd23 elementor-widget elementor-widget-text-editor\" data-id=\"aa0fd23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"double-key-encryption-frequently-asked-questions\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/compliance\/double-key-encryption-overview?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Double Key Encryption frequently asked questions<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4625c1 elementor-widget elementor-widget-heading\" data-id=\"e4625c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Can I use DKE to share documents with external users?<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb862ae elementor-widget elementor-widget-text-editor\" data-id=\"bb862ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The answer is yes, but with some caveats:<\/p><ul><li>An external user must be authorized on your AzureAD (Guest user, B2B, etc\u2026) and on your on-premises DKE server\/HSM\/KMS (AD groups membership OR emails list).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-addf09c elementor-widget elementor-widget-heading\" data-id=\"addf09c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Can I use different DKE keys for different labels?<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eabad3d elementor-widget elementor-widget-text-editor\" data-id=\"eabad3d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes, you can use one key per label, and you are able to rotate keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55c584f elementor-widget elementor-widget-heading\" data-id=\"55c584f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Which kind of files can I protect?<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da511dc elementor-widget elementor-widget-text-editor\" data-id=\"da511dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For now, only Office documents. There is no possibility yet to encrypt emails.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8295ed8 elementor-widget elementor-widget-heading\" data-id=\"8295ed8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">The prerequisites to use DKE:<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9356fbb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9356fbb\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Office 365 E5\/A5 license (or M365 E5)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The latest client: AIP Unified label (the classic client is not supported)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The latest version of Office<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">An HSM\/KMS to store and protect master key<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Public certificate and a WAF in front of the DKE service<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-644a0bc elementor-widget elementor-widget-heading\" data-id=\"644a0bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">What comes next?<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cce963e elementor-widget elementor-widget-text-editor\" data-id=\"cce963e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2 Solutions :<\/p><p><strong><em>Thales EKMS plugin<\/em><\/strong><\/p><p><strong><em>DuoKey SaaS solution<\/em><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcb07e7 elementor-widget elementor-widget-image\" data-id=\"dcb07e7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"377\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/DKE-solutions-Thales-EKMS-DuoKey-Saas.png\" class=\"attachment-large size-large wp-image-17915\" alt=\"Schema DKE solutions Thales EKMS and DuoKey Saas\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/DKE-solutions-Thales-EKMS-DuoKey-Saas.png 945w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/DKE-solutions-Thales-EKMS-DuoKey-Saas-300x141.png 300w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/DKE-solutions-Thales-EKMS-DuoKey-Saas-768x362.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-599ab23 elementor-widget elementor-widget-text-editor\" data-id=\"599ab23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Thales will release a new product, end of Q1 2021, to connect Thales HSM\/KMS (Luna HSM, CCKM KMS, Data Protection on Demand PaaS) to DKE API.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a44207 elementor-widget elementor-widget-heading\" data-id=\"0a44207\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Technical Overview<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-387f857 elementor-widget elementor-widget-heading\" data-id=\"387f857\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How does the demo server work?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bfdff elementor-widget elementor-widget-text-editor\" data-id=\"d1bfdff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft published the source code of a C#\/.NET 3.1 demo server here: <a href=\"https:\/\/github.com\/Azure-Samples\/DoubleKeyEncryptionService\/tree\/main\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/Azure-Samples\/DoubleKeyEncryptionService\/tree\/main<\/a><\/p><p>How does the authentication\/authorization work?<\/p><p>The server uses OpenIDConnect to authenticate against Azure AD (and also cookies).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76ecb01 elementor-widget elementor-widget-code-highlight\" data-id=\"76ecb01\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-tomorrow copy-to-clipboard word-wrap\">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-csharp \">\n\t\t\t\t<code readonly=\"true\" class=\"language-csharp\">\n\t\t\t\t\t<xmp>using Microsoft.AspNetCore.Authentication.Cookies;\r\n    using Microsoft.AspNetCore.Authentication.JwtBearer;\r\n    using Microsoft.AspNetCore.Authentication.OpenIdConnect;\r\n<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9760f3 elementor-widget elementor-widget-text-editor\" data-id=\"b9760f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And the server uses JWT to grant authorization.<\/p><p>You must register an enterprise app on your AzureAD to integrate your DKE server to the tenant.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5931d6 elementor-widget elementor-widget-image\" data-id=\"b5931d6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"366\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-server-tenant-1024x468.png\" class=\"attachment-large size-large wp-image-17924\" alt=\"double-key-encryption-dke-server-tenant\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-server-tenant-1024x468.png 1024w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-server-tenant-300x137.png 300w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-server-tenant-768x351.png 768w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-server-tenant.png 1386w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-137197a elementor-widget elementor-widget-text-editor\" data-id=\"137197a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To authorize a user to access the on-premises key, the source code uses 2 methods:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a9e606 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2a9e606\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">LDAP group membership<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"5.216\" height=\"12.035\" viewBox=\"0 0 5.216 12.035\"><path id=\"Trac&#xE9;_4048\" data-name=\"Trac&#xE9; 4048\" d=\"M2.086,6.022h0L5.216,0H3.137L0,6.022l3.137,6.013H5.216Z\" transform=\"translate(5.216 12.035) rotate(180)\" fill=\"#541dff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">List of email addresses<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b36f471 elementor-widget elementor-widget-text-editor\" data-id=\"b36f471\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Provide the LDAP path to the server and the group names, and the DKE server will be able to search if a user is a member of the allowed group.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06d0ba9 elementor-widget elementor-widget-code-highlight\" data-id=\"06d0ba9\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-tomorrow copy-to-clipboard word-wrap\">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-json \">\n\t\t\t\t<code readonly=\"true\" class=\"language-json\">\n\t\t\t\t\t<xmp>{\r\n\"AllowedHosts\": \"*\",\r\n\"JwtAudience\": \"https:\/\/aadrm.com\",\r\n\"JwtAuthorization\": \"https:\/\/login.windows.net\/common\/oauth2\/authorize\",\r\n\"RoleAuthorizer\": {\r\n  \"LDAPPath\": \"If you use role authorization (AuthorizedRoles) then this is the LDAP path.\"\r\n},\r\n\"TestKeys\": [\r\n  { \r\n    \"Name\": \"YourTestKeyName\",\r\n    \"Id\": \"GUID\",\r\n    \"AuthorizedRoles\": [\"On premises Active Directory groups that you want to have access to this key. If you provide a value for AuthorizedRoles, then remove the line that starts with AuthorizedEmailAddress.\"],\r\n    \"AuthorizedEmailAddress\": [\"Email addresses of users that have access to this key. If you provide a value for AuthorizedEmailAddress, then remove the line that starts with AuthorizedRoles.\"],\r\n    \"PublicPem\" :  \"The public key in PEM format.  Do not include the BEGIN and END lines\",\r\n    \"PrivatePem\":  \"The private key in PEM format.  Do not include the BEGIN and END lines\"\r\n  }\r\n<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ef7881 elementor-widget elementor-widget-text-editor\" data-id=\"5ef7881\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Each key has a separate configuration for authorization, thus you can have different authorization for different labels.<\/p><p>In MIP, for each DKE protected label, you must specify the path to the Key:<\/p><p><a href=\"https:\/\/your.dkeserver.com\/YourKey\" target=\"_blank\" rel=\"noopener\">https:\/\/your.dkeserver.com\/YourKey<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39e835 elementor-widget elementor-widget-image\" data-id=\"e39e835\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"152\" src=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/dsk-server-yourkey-1024x195.png\" class=\"attachment-large size-large wp-image-17930\" alt=\"dsk-server-yourkey\" srcset=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/dsk-server-yourkey-1024x195.png 1024w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/dsk-server-yourkey-300x57.png 300w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/dsk-server-yourkey-768x146.png 768w, https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/dsk-server-yourkey.png 1386w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d29e41 elementor-widget elementor-widget-heading\" data-id=\"1d29e41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How are the keys handled in the server?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-259ae37 elementor-widget elementor-widget-text-editor\" data-id=\"259ae37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this demo server, a simple public\/private key in the app settings:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23849c elementor-widget elementor-widget-code-highlight\" data-id=\"a23849c\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-tomorrow copy-to-clipboard word-wrap\">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-json \">\n\t\t\t\t<code readonly=\"true\" class=\"language-json\">\n\t\t\t\t\t<xmp>\"TestKeys\": [\r\n  { \r\n    \"Name\": \"YourTestKeyName\",\r\n    \"Id\": \"GUID\",\r\n    \"AuthorizedRoles\": [\"On premises Active Directory groups that you want to have access to this key. If you provide a value for AuthorizedRoles, then remove the line that starts with AuthorizedEmailAddress.\"],\r\n    \"AuthorizedEmailAddress\": [\"Email addresses of users that have access to this key. If you provide a value for AuthorizedEmailAddress, then remove the line that starts with AuthorizedRoles.\"],\r\n    \"PublicPem\" :  \"The public key in PEM format.  Do not include the BEGIN and END lines\",\r\n    \"PrivatePem\":  \"The private key in PEM format.  Do not include the BEGIN and END lines\"\r\n  }\r\n]\r\n<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b03028 elementor-widget elementor-widget-text-editor\" data-id=\"6b03028\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And the server uses this key to encrypt\/decrypt:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ccb4bd elementor-widget elementor-widget-code-highlight\" data-id=\"9ccb4bd\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-tomorrow copy-to-clipboard word-wrap\">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-csharp \">\n\t\t\t\t<code readonly=\"true\" class=\"language-csharp\">\n\t\t\t\t\t<xmp>services.AddSingleton<ippw.IKeyStore, ippw.TestKeyStore>();<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e79cfa elementor-widget elementor-widget-text-editor\" data-id=\"6e79cfa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><u>Note:<\/u><\/strong> At this moment, this method is only for demo purposes, do not use it in production!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05f9be6 elementor-widget elementor-widget-heading\" data-id=\"05f9be6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Which kind of Key Type is used?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b75b925 elementor-widget elementor-widget-code-highlight\" data-id=\"b75b925\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-tomorrow copy-to-clipboard word-wrap\">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-csharp \">\n\t\t\t\t<code readonly=\"true\" class=\"language-csharp\">\n\t\t\t\t\t<xmp>    public class TestKeyStore : IKeyStore\r\n    {\r\n        private const string KeyType = \"RSA\";\r\n        private const string Algorithm = \"RS256\";\r\n<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17b07b1 elementor-widget elementor-widget-text-editor\" data-id=\"17b07b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This demo server can be tuned to be used in a production environment, or third-party product like the new Thales one can be used as an appliance to interface with the new MIP DKE API:<\/p><p><a href=\"https:\/\/github.com\/thalescpl-io\/ms-dke-api\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/thalescpl-io\/ms-dke-api<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a3fc3 elementor-widget elementor-widget-heading\" data-id=\"a5a3fc3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f742e0 elementor-widget elementor-widget-text-editor\" data-id=\"7f742e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft has published the API for using DKE, and it has made available a sample source code to make a DKE server. This server is not usable \u201cas-is\u201d for a production environment, however editors with experience in Key Management such as Thales are already preparing the missing components that will soon enable the use of this option.<\/p><p>DKE provides an answer to customers&#8217; concerns about service provider access to data protected by a system like MIP\/AIP, however it should be noted that this mechanism prevents the use of some important features of SaaS platforms that would need to access the data (such as eDiscovery, etc&#8230;).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f3b860 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--color-custom elementor-share-buttons--skin-gradient elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"0f3b860\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2b7f294e\" data-id=\"2b7f294e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-755f3319 kyos-fixed-item elementor-widget elementor-widget-template\" data-id=\"755f3319\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8782\" class=\"elementor elementor-8782 elementor-8557\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7758e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7758e7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b28947\" data-id=\"2b28947\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69ae174 elementor-widget elementor-widget-text-editor\" data-id=\"69ae174\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More information on this subject?<\/p><p>We are at your disposal!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-991947b elementor-widget elementor-widget-button\" data-id=\"991947b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#kyos-footer-bloc\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>1. Introduction What is DKE? DKE \u2013 or Double Key Encryption\u2013 is a new option offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software. Given that many customers are worried to start their journey to the cloud because of data protection concerns, Microsoft implemented a new option to protect unstructured data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":17909,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68,66],"tags":[],"class_list":["post-17908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sec_data-en","category-sec-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Double Key Encryption (DKE)? - KYOS<\/title>\n<meta name=\"description\" content=\"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Double Key Encryption (DKE)? - KYOS\" \/>\n<meta property=\"og:description\" content=\"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\" \/>\n<meta property=\"og:site_name\" content=\"KYOS\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-10T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-05T12:07:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Etienne Maghakian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Etienne Maghakian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\"},\"author\":{\"name\":\"Etienne Maghakian\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4\"},\"headline\":\"What is Double Key Encryption (DKE)?\",\"datePublished\":\"2021-02-10T17:00:00+00:00\",\"dateModified\":\"2023-05-05T12:07:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\"},\"wordCount\":947,\"publisher\":{\"@id\":\"https:\/\/staging.kyos.ch\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\",\"articleSection\":[\"Data protection and encryption\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\",\"url\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\",\"name\":\"What is Double Key Encryption (DKE)? - KYOS\",\"isPartOf\":{\"@id\":\"https:\/\/staging.kyos.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\",\"datePublished\":\"2021-02-10T17:00:00+00:00\",\"dateModified\":\"2023-05-05T12:07:55+00:00\",\"description\":\"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage\",\"url\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\",\"contentUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg\",\"width\":640,\"height\":427,\"caption\":\"Illustration de double key encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.kyos.ch\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Double Key Encryption (DKE)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.kyos.ch\/#website\",\"url\":\"https:\/\/staging.kyos.ch\/\",\"name\":\"KYOS\",\"description\":\"Better safe than sorry\",\"publisher\":{\"@id\":\"https:\/\/staging.kyos.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.kyos.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.kyos.ch\/#organization\",\"name\":\"KYOS\",\"url\":\"https:\/\/staging.kyos.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png\",\"contentUrl\":\"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png\",\"width\":360,\"height\":80,\"caption\":\"KYOS\"},\"image\":{\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4\",\"name\":\"Etienne Maghakian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.kyos.ch\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g\",\"caption\":\"Etienne Maghakian\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Double Key Encryption (DKE)? - KYOS","description":"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/","og_locale":"en_US","og_type":"article","og_title":"What is Double Key Encryption (DKE)? - KYOS","og_description":"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.","og_url":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/","og_site_name":"KYOS","article_published_time":"2021-02-10T17:00:00+00:00","article_modified_time":"2023-05-05T12:07:55+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg","type":"image\/jpeg"}],"author":"Etienne Maghakian","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Etienne Maghakian","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#article","isPartOf":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/"},"author":{"name":"Etienne Maghakian","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4"},"headline":"What is Double Key Encryption (DKE)?","datePublished":"2021-02-10T17:00:00+00:00","dateModified":"2023-05-05T12:07:55+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/"},"wordCount":947,"publisher":{"@id":"https:\/\/staging.kyos.ch\/#organization"},"image":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg","articleSection":["Data protection and encryption","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/","url":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/","name":"What is Double Key Encryption (DKE)? - KYOS","isPartOf":{"@id":"https:\/\/staging.kyos.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage"},"image":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg","datePublished":"2021-02-10T17:00:00+00:00","dateModified":"2023-05-05T12:07:55+00:00","description":"DKE or Double Key Encryption offered by Microsoft Information Protection (MIP), a cloud-based data classification and protection software.","breadcrumb":{"@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#primaryimage","url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg","contentUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2023\/03\/double-key-encryption-dke-kyos-post.jpg","width":640,"height":427,"caption":"Illustration de double key encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.kyos.ch\/en\/sec-en\/sec_data-en\/what-is-double-key-encryption-dke\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.kyos.ch\/en\/"},{"@type":"ListItem","position":2,"name":"What is Double Key Encryption (DKE)?"}]},{"@type":"WebSite","@id":"https:\/\/staging.kyos.ch\/#website","url":"https:\/\/staging.kyos.ch\/","name":"KYOS","description":"Better safe than sorry","publisher":{"@id":"https:\/\/staging.kyos.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.kyos.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.kyos.ch\/#organization","name":"KYOS","url":"https:\/\/staging.kyos.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/","url":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png","contentUrl":"https:\/\/staging.kyos.ch\/wp-content\/uploads\/2021\/06\/01.kyos_.logo_.noir_.width_.360-1.png","width":360,"height":80,"caption":"KYOS"},"image":{"@id":"https:\/\/staging.kyos.ch\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/10c03a166f24b0dfb247a0c084600db4","name":"Etienne Maghakian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.kyos.ch\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae7f1a0e450b509aaa528bdd6bf7b596556a5219b7ec73e1de10dd84ec9384f5?s=96&d=mm&r=g","caption":"Etienne Maghakian"}}]}},"_links":{"self":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/17908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/comments?post=17908"}],"version-history":[{"count":13,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/17908\/revisions"}],"predecessor-version":[{"id":17997,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/posts\/17908\/revisions\/17997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/media\/17909"}],"wp:attachment":[{"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/media?parent=17908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/categories?post=17908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.kyos.ch\/en\/wp-json\/wp\/v2\/tags?post=17908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}