Encryption Key Management
Critical guide for managing encryption keys that protect user data in STING.
2 minute read
STING implements industry-leading security practices with passwordless authentication, WebAuthn, and advanced access controls.
New in v1.0: Encryption Key Management - Critical documentation for protecting user data. Always backup your encryption keys before upgrades!
msting encryption-keys status # Check key status
msting encryption-keys backup # Backup before upgrades
msting encryption-keys restore # Restore from backup
STING prioritizes passwordless authentication methods:
STING uses Ory Kratos for identity management:
Prioritize biometric authentication while maintaining security:
Best practices for authentication assurance levels in enterprise deployments.
Fine-grained access controls based on attributes (enterprise feature).
Found a security issue? Please report it responsibly:
Critical guide for managing encryption keys that protect user data in STING.
Custom AAL2 solution for passwordless WebAuthn authentication with biometric authenticators.
Solutions for email verification issues in STING deployments.
Alignment of STING authentication architecture with Kratos best practices.
Specific requirements and configuration patterns for Ory Kratos v1.3.1 in STING.
Configure and manage passkey authentication in STING.
Implementation guide for password change flow allowing limited access for password updates.
Architecture and strategy for synchronizing profile data between STING and Kratos.
Implementation of unified login flow that checks user existence before presenting authentication options.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.
Find what you're looking for...