Skip to main content
At Oumla, we understand that key security is paramount in blockchain development. Our managed infrastructure solution employs cutting-edge security practices to protect your private and public keys, allowing you to focus on building your application with peace of mind.

Hybrid Key Management Model

Oumla utilizes a robust hybrid model for key management, enhancing security through key splitting:

Client Share

One part of the key remains with you, the client. We call this the “Oumla Share”.

Oumla-Managed Share

Another part is securely stored by Oumla in our encrypted infrastructure.

Third-Party Share

The final part is entrusted to a reliable third party for additional security.
This three-way split ensures that no single entity has complete control over the keys, significantly reducing the risk of unauthorized access or compromise.

Client Responsibilities

As a client, you play a crucial role in maintaining the security of your Oumla Share:
1

Receive Your Share

Upon registration, you’ll receive a PDF document containing your Oumla Share.
2

Store Securely

You must store this file in a secure location, such as an encrypted drive or a physical safe.
3

Implement Access Controls

Implement proper access controls to ensure only authorized personnel can access the Oumla Share.
4

Regular Security Reviews

Regularly review and update your security measures to protect this critical information.

Operational Requirements

Your Oumla Share is essential for various blockchain operations:
  • Generating new addresses for receiving assets
  • Signing transactions to move funds or interact with contracts
  • Other key-dependent functions within the platform
You’ll need to provide your Oumla Share securely when performing these operations through our platform.

Security Best Practices

To further enhance the security of your Oumla Share:
Use strong, unique passwords for any systems storing the share. Avoid using the same password across multiple platforms and consider using a password manager.
Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security to systems that store or access your Oumla Share.
Regularly back up your Oumla Share, ensuring backups are also securely stored in encrypted locations. Test your backups periodically to ensure they can be restored when needed.
Establish a clear protocol for share access within your organization. Document who has access, under what circumstances, and maintain an audit trail of all access attempts.

Support and Assistance

Our dedicated support team is always ready to assist you with any questions or concerns regarding key management and security. We’re committed to your success in blockchain development and can provide guidance on best practices for securing your Oumla Share.

Contact Support

Need help with security or key management? Reach out to our support team at
Remember, while Oumla provides advanced security measures, the safety of your Oumla Share is a shared responsibility. By following these guidelines and maintaining vigilant security practices, you can ensure the highest level of protection for your blockchain assets.