Hybrid Key Management Model
Oumla utilizes a robust hybrid model for key management, enhancing security through key splitting:Client Share
One part of the key remains with you, the client. We call this the “Oumla Share”.
Oumla-Managed Share
Another part is securely stored by Oumla in our encrypted infrastructure.
Third-Party Share
The final part is entrusted to a reliable third party for additional security.
This three-way split ensures that no single entity has complete control over the keys, significantly reducing the risk of unauthorized access or compromise.
Client Responsibilities
As a client, you play a crucial role in maintaining the security of your Oumla Share:1
Receive Your Share
Upon registration, you’ll receive a PDF document containing your Oumla Share.
2
Store Securely
You must store this file in a secure location, such as an encrypted drive or a physical safe.
3
Implement Access Controls
Implement proper access controls to ensure only authorized personnel can access the Oumla Share.
4
Regular Security Reviews
Regularly review and update your security measures to protect this critical information.
Operational Requirements
Your Oumla Share is essential for various blockchain operations:
- Generating new addresses for receiving assets
- Signing transactions to move funds or interact with contracts
- Other key-dependent functions within the platform
Security Best Practices
To further enhance the security of your Oumla Share:Use Strong Passwords
Use Strong Passwords
Use strong, unique passwords for any systems storing the share. Avoid using the same password across multiple platforms and consider using a password manager.
Enable Multi-Factor Authentication
Enable Multi-Factor Authentication
Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security to systems that store or access your Oumla Share.
Maintain Secure Backups
Maintain Secure Backups
Regularly back up your Oumla Share, ensuring backups are also securely stored in encrypted locations. Test your backups periodically to ensure they can be restored when needed.
Define Access Protocols
Define Access Protocols
Establish a clear protocol for share access within your organization. Document who has access, under what circumstances, and maintain an audit trail of all access attempts.
Support and Assistance
Our dedicated support team is always ready to assist you with any questions or concerns regarding key management and security. We’re committed to your success in blockchain development and can provide guidance on best practices for securing your Oumla Share.Contact Support
Need help with security or key management? Reach out to our support team at
Remember, while Oumla provides advanced security measures, the safety of your Oumla Share is a shared responsibility. By following these guidelines and maintaining vigilant security practices, you can ensure the highest level of protection for your blockchain assets.