How can we help? 👋

User registration

There is no “public” sign up function for DekkoSecure; it’s an invite-only system. When you’re invited you’ll get an email message which includes the name of the user that invited you. Your email invite will lead you to a “standard” account creation page (where you set an email, password and 2FA for your profile) or to a Single Sign-On page if your organisation has previously set up integration with DekkoSecure.

 
For clients that are new to DekkoSecure, an account manager will create your Tenancy and at least one Hub for you, and then invite your initial users.
 

These initial users are typically administrative staff who are assigned the Tenant admin role, meaning they can create Hubs. From here, Hub admins can invite users for onboarding.

 

Users can be onboarded in 3 ways:

  • Individual invite to a Hub
  • Mass Hub invite using a CSV file
  • Hub registration link
  • Single Sign-On (”Corporate Registration”)
 

Refer to the Creating Hubs, sending invites and roles articles for guidance on invites.

 
💡
If you invite a new user to a Hub they will be sent a registration invite. If you send an invite to the same user for another Hub, the user will see added to both Hubs when they finish creating their account.

Registration pages

The linked registration page in your email invite will automatically send you to a standard or corporate account creation page depending on your organisation’s authentication configuration with DekkoSecure:

 
Notion image

Encryption and security management for new users

One of the primary features of the DekkoSecure platform is that the encryption key generation and management for all users is completely automated and totally transparent. Upon account creation, the application creates a private and public key for the user.

Users’ private keys are encrypted by their password, which is also done automatically. Critically, this means that administrators are not burdened with security activities such as managing keys, updating and distributing certificates, etc.

 

Refer to the Encryption article for more information.

Did this answer your question?
😞
😐
🤩