\n \u003C/div>\n \u003Cdiv class=\"starRatingWrapper\">\n \u003Ch4>4.6\u003C/h4>\n \u003Cimg class=\"starGroupImage\" src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/stars-logo.png\" alt=\"star-ratings\" loading=\"lazy\" />\n \u003C/div>\n \u003Cdiv class=\"gartnerWrapper\">\n \u003Cp>As of August 2023\u003C/p>\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/about/gartner-logo-fortanix.svg\" alt=\"gartner-logo\" loading=\"lazy\" />\n\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"borderLine2\">\u003C/div>\n \u003Cdiv class=\"complianceLogo\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/SOC-2-Type-2.svg\" alt=\"SOC-2 Type-2\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/iso-27001-lite.webp\" alt=\"ISO 27001\" width=\"95\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/fips-140-2.svg\" alt=\"FIPS 140-2 Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/gartner-cool-vendor.svg\" alt=\"Gartner Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/pci-dss-footer-logo.svg\" alt=\"PCI DSS Compliant\" loading=\"lazy\" />\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"c cell-md-4 cell-sm-4 cell-lg-4\">\n \u003Cdiv class=\"second-menu first-child fortanix-logos-wrapper\">\n \u003Cdiv class=\"section-20 map-container\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/worldmap.png\" width=\"188\" height=\"99\" useMap=\"#image-map\" alt=\"world map logo\" loading=\"lazy\" />\n\n \u003Cmap id=\"world-map\" name=\"image-map\">\n \u003Carea id=\"usa\" coords=\"34,60,22,47\" shape=\"rect\" />\n \u003Cspan>US\u003C/span>\n \u003Carea class=\"inactive\" id=\"netherlands\" coords=\"88,31,98,44\" shape=\"rect\" />\n \u003Cspan>Europe\u003C/span>\n \u003Carea class=\"inactive\" id=\"india\" coords=\"127,48,136,64\" shape=\"rect\" />\n \u003Cspan>India\u003C/span>\n \u003Carea class=\"inactive\" id=\"singapure\" coords=\"145,58,157,72\" shape=\"rect\" />\n \u003Cspan>Singapore\u003C/span>\n \u003C/map>\n \u003C/div>\n \u003Cdiv class=\"address text-white\">\n \u003Cdiv id=\"usa-address\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>US:\u003C/label>\n 3910 Freedom Circle, Suite 104, \u003Cbr />\n Santa Clara CA 95054 \u003Cbr />\n \u003Ca href=\"tel:+14082144760\">+1 408-214-4760\u003C/a> |\n \u003Ca href=\"mailto:info@fortanix.com\">info@fortanix.com\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"india-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>India:\u003C/label>\n UrbanVault 460,\u003Cbr /> First Floor, C S TOWERS,\u003Cbr /> 17th Cross Rd,\n 4th Sector,\u003Cbr /> HSR Layout, Bengaluru,\u003Cbr /> Karnataka 560102\u003Cbr />\n \u003Ca href=\"tel:080-41749241\">+91 080-41749241\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"netherlands-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Europe:\u003C/label>\n High Tech Campus 5, \u003Cbr />\n 5656 AE Eindhoven, The Netherlands\n \u003Cbr />\n \u003Ca href=\"tel:+31850608282\">+31850608282\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"singapure-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Singapore:\u003C/label>\n 30 Cecil St. #19-08 Prudential Tower, \u003Cbr />\n Singapore 049712\n \u003C/div>\n\n \u003Cdiv class=\"social-footer\">\n \u003Cul>\n \u003Cli>\n \u003Ca href=\"https://www.linkedin.com/company/fortanix/\">\n \u003Ci class=\"fa fa-linkedin\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://twitter.com/fortanix\">\n \u003Ci class=\"fa fa-twitter\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.facebook.com/fortanix/\">\n \u003Ci class=\"fa fa-facebook\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.youtube.com/c/fortanix\">\n \u003Ci class=\"fa fa-youtube-play\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003C/ul>\n \u003C/div>\n\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n\n\n \u003Cfooter class=\"footerBoxWrapper\">\n \u003Cdiv class=\"shell-wide\">\n \u003Cdiv class=\"footerNavigationLinks\">\n \u003Cdiv class=\"footerNavigationLinksFirst\">\n \u003Ca href=\"https://www.fortanix.com/trust-center\">\n \u003Ch4>Trust Centre\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Privacy Policy\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Legal\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/terms\">\n \u003Ch4>Terms of Service\u003C/h4>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"footerNavigationLinksLast\">\n \u003Ch4>Fortanix Copyright 2025. All Right reserved\u003C/h4>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/footer>\n \u003Clink rel=\"stylesheet\" href=\"https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css\" />\n\u003C/section>"},"editableProperties":[],"children":[]},{"elementType":16,"elementName":"customCSS","elementGUID":"4bba8004-92fb-49ba-9e1b-0b73e0b21e94","displayName":"CSS","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"customCSS":"/* revamp-styles */\n\n.hidden {\n display: none;\n}\n.shell,\n.shell-wide,\n.shell-fluid {\n margin-right: auto;\n margin-left: auto;\n padding-left: 15px;\n padding-right: 15px;\n}\n\n.shell,\n.shell-wide {\n min-width: 300px;\n max-width: 480px;\n}\n\n.shell-mobile {\n padding-right: 0;\n}\n\n@media (min-width: 768px) {\n\n .shell,\n .shell-wide {\n max-width: 750px;\n }\n\n .shell-mobile {\n padding-right: 15px;\n }\n}\n\n@media (min-width: 992px) {\n\n .shell,\n .shell-wide {\n max-width: 970px;\n }\n}\n\n@media (min-width: 1200px) {\n .shell {\n max-width: 1080px;\n }\n\n .shell-wide {\n max-width: 1200px;\n }\n}\n\n@media (min-width: 1800px) {\n .shell-wide {\n max-width: 1800px;\n }\n}\n\n.siteFooterRevampMainWrapper {\n background: #151629;\n padding-top: 80px;\n}\n\n.fiveColumnWrapper {\n display: block;\n padding-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper {\n text-align: center;\n}\n\n.fiveColumnWrapper .oneColumnWrapper h2 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n padding-bottom: 24px;\n margin: 0;\n}\n\n\n.fiveColumnWrapper .oneColumnWrapper h3 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 300;\n line-height: 20px;\n margin: 0;\n padding: 0px;\n margin-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper p {\n color: rgba(242, 244, 248, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n /* 200% */\n letter-spacing: 1px;\n text-transform: uppercase;\n padding-bottom: 6px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper {\n padding-bottom: 30px;\n}\n\n.hiringTag {\n padding: 2px;\n margin-left: 5px;\n color: var(--Color, #FFF);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n letter-spacing: 0.5px;\n text-transform: uppercase;\n background: rgba(41, 42, 71, 0.29);\n}\n\n/*section2*/\n.borderLine {\n border: 1px solid #F2F4F8;\n width: 100%;\n opacity: 0.1;\n /* margin: 50px; */\n}\n\n.borderLine2 {\n border: 1px solid #F2F4F8;\n max-width: 100%;\n opacity: 0.1;\n}\n\n.siteFooterSection2 {\n padding: 45px 0px;\n}\n\n.fortanixLogoContainer {\n display: flex;\n justify-content: space-between;\n align-items: center;\n padding-bottom: 24px;\n}\n\n.fortanixLogoContainer .starRatingWrapper h4 {\n color: var(--Color, #FFF);\n font-family: var(--heading-font-family);\n font-size: 20px;\n font-style: normal;\n font-weight: 700;\n line-height: normal;\n font-variant: all-small-caps;\n letter-spacing: 1px;\n padding-bottom: 2px;\n}\n\n.starGroupImage {\n margin: 0;\n}\n\n.fortanixLogoContainer .gartnerWrapper p {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 0.5px;\n padding-bottom: 9px;\n}\n\n.complianceLogo {\n padding-top: 24px;\n display: flex;\n flex-direction: column;\n}\n\n.complianceLogo img {\n max-width: 90px;\n height: 90px;\n margin: 0 auto;\n padding: 12px;\n}\n\n\n/*section3*/\n.siteFooterRevampMainWrapper .footerBoxWrapper {\n background: rgba(41, 42, 71, 0.29);\n padding: 24px 0px;\n}\n\n.footerNavigationLinks {\n display: block;\n text-align: center;\n}\n\n.footerNavigationLinks h4 {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 0.5px;\n padding: 14px;\n}\n\n\n@media only screen and (min-width: 768px) {\n .fiveColumnWrapper {\n display: flex;\n justify-content: space-between;\n padding-bottom: 5px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 18%;\n text-align: left;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper:nth-child(3) {\n padding-bottom: 60px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper3 p {\n padding-top: 38px;\n }\n\n .complianceLogo {\n padding: 24px 0px 0px;\n display: flex;\n flex-direction: row;\n gap: 40px;\n flex-wrap: wrap;\n }\n\n .complianceLogo img {\n padding: 0px;\n }\n\n .footerNavigationLinks {\n display: flex;\n justify-content: space-between;\n }\n\n .footerNavigationLinksFirst {\n display: flex;\n gap: 35px;\n align-items: center;\n }\n\n .footerNavigationLinks h4 {\n padding: 0px;\n }\n\n .siteFooterSection2Wrapper {\n display: flex;\n gap: 25px;\n justify-content: space-between;\n align-items: flex-start;\n }\n\n .hiringTag {\n font-size: 8px;\n }\n}\n\n@media only screen and (min-width: 1022px) {\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 22%;\n text-align: left;\n }\n\n .hiringTag {\n font-size: 10px;\n\n }\n}\n\n#section-footer-revamp {\n background-color: #151629;\n padding-bottom: 0;\n}\n\n/* #section-footer-revamp .footer-seperator {\nheight: 9px;\nbackground: linear-gradient(89.99deg, #998bed 14.37%, #70f8f8 95.31%);\n} */\n\n#section-footer-revamp .brand img {\n height: 22px;\n}\n\n#section-footer-revamp .address {\n color: #f2f4f8;\n font-weight: 500;\n}\n\n#section-footer-revamp .address label {\n font-weight: 700;\n display: block;\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address a,\n#section-footer-revamp .address a:active,\n#section-footer-revamp .address a:link,\n#section-footer-revamp .address a:hover,\n#section-footer-revamp .address a:visited {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address>div {\n margin-bottom: 15px;\n position: relative;\n}\n\n#section-footer-revamp.new-footer .address>div {\n opacity: 0.6;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 300;\n line-height: 23px;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .address>div>img {\n position: absolute;\n left: -36px;\n display: none;\n}\n\n#section-footer-revamp .address>div>img.active {\n display: block;\n}\n\n@media (max-width: 480px) {\n #section-footer-revamp .brand img {\n height: 38px;\n }\n\n #section-footer-revamp .address {\n font-size: 10px !important;\n padding-bottom: 0px !important;\n }\n\n #section-footer-revamp .social-footer {\n display: none;\n }\n\n #section-footer-revamp .subscribe {\n display: none;\n }\n\n #section-footer-revamp .second-menu {\n padding-bottom: 0px !important;\n }\n}\n\n#section-footer-revamp .awards-wrapper {\n margin-top: 24px;\n width: 280px;\n display: flex;\n flex-wrap: wrap;\n justify-content: space-between;\n align-items: center;\n}\n\n#section-footer-revamp .awards-wrapper img {\n margin: 4px;\n}\n\n#section-footer-revamp .c {\n position: relative;\n margin-top: 0;\n}\n\n#section-footer-revamp .c:last-child::after {\n width: 0;\n}\n\n#section-footer-revamp .range {\n align-items: flex-start;\n}\n\n#section-footer-revamp .page-foot {\n background: rgba(41, 42, 71, 0.9);\n padding: 15px 0;\n color: rgba(255, 255, 255, 0.49);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .page-foot p {\n font-family: var(--heading-font-family);\n}\n\n#section-footer-revamp .page-foot a {\n color: #00c6da;\n}\n\n#section-footer-revamp .page-foot a:hover {\n opacity: 0.5;\n}\n\n#section-footer-revamp .address {\n padding: 24px 0 0;\n font-size: 14px;\n line-height: 20px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n}\n\n.rights * {\n margin-right: 0;\n}\n\n#section-footer-revamp .address a {\n color: #fff;\n}\n\n#section-footer-revamp .address a:hover {\n opacity: 0.7;\n}\n\n#section-footer-revamp .social-footer {\n font-size: 26px;\n}\n\n#section-footer-revamp .social-footer ul {\n padding-top: 30px;\n}\n\n#section-footer-revamp .social-footer li {\n display: inline;\n padding-right: 12px;\n}\n\n#section-footer-revamp .subscribe {\n padding-left: 30px;\n margin-top: 16px;\n}\n\n#section-footer-revamp .subscribe .message-ok {\n color: #fff;\n}\n\n#section-footer-revamp .subscribe .info {\n font-size: 12px;\n line-height: 17px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #000000;\n}\n\n#section-footer-revamp .subscribe .info>div {\n font-family: var(--heading-font-family);\n font-weight: 600;\n margin-bottom: 12px;\n}\n\n#section-footer-revamp .subscribe form label {\n color: #26546d;\n font-family: var(--heading-font-family);\n font-size: 12px;\n margin-top: 15px;\n}\n\n/* #section-footer-revamp .subscribe form input[type=\"email\"] {\nborder: 1px solid #96dce8;\nbackground-color: #fff;\nbox-sizing: border-box;\nborder-radius: 3px;\nfont-size: 12px;\npadding: 5px;\nheight: auto;\n} */\n\n/* #section-footer-revamp .subscribe form input[type=\"submit\"] {\nbackground-color: #00c6da;\nwidth: 100%;\nmargin: 0;\n} */\n\n#section-footer-revamp .subscribe form .grecaptcha-badge {\n margin-top: 15px;\n background: #eee;\n}\n\n#section-footer-revamp .subscribe form .form-validation {\n display: none;\n}\n\n#section-footer-revamp .second-menu {\n font-size: 12px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-weight: 500;\n text-transform: uppercase;\n line-height: 16px;\n padding-left: 0;\n}\n\n#section-footer-revamp .icons-wrapper {\n display: flex;\n padding-bottom: 40px;\n}\n\n#section-footer-revamp .icons-wrapper img {\n padding-right: 40px;\n}\n\n#section-footer-revamp .second-menu a {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu>li {\n padding-bottom: 20px;\n}\n\n#section-footer-revamp .second-menu>li>a {\n font-weight: 600;\n}\n\n#section-footer-revamp .second-menu ul {\n padding: 9px 0 5px;\n font-size: 12px;\n margin-bottom: 15px;\n}\n\n#section-footer-revamp .second-menu ul li {\n text-transform: none;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #f2f4f8;\n padding-bottom: 7px;\n padding-top: 20px;\n}\n\n#section-footer-revamp .second-menu ul li:last-child {\n padding-bottom: 0;\n}\n\n#section-footer-revamp .second-menu ul li span {\n color: rgba(242, 244, 248, 0.5);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n letter-spacing: 1px;\n text-transform: uppercase;\n display: block;\n}\n\n#section-footer-revamp .second-menu ul li a {\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 400;\n line-height: 20px;\n}\n\n#section-footer-revamp .second-menu ul li a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp area#usa+span {\n line-height: 24px;\n content: \"US\";\n position: absolute;\n top: 60px;\n left: 9px;\n cursor: pointer;\n width: 70px;\n height: 23px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n text-transform: uppercase;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#usa+span {\n top: 35px;\n}\n\n#section-footer-revamp area#usa {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 41px;\n top: 80px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#usa {\n top: 55px;\n}\n\n#section-footer-revamp area#india+span {\n line-height: 22px;\n content: \"India\";\n cursor: pointer;\n position: absolute;\n top: 65px;\n left: 120px;\n width: 62px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#india+span {\n top: 40px;\n}\n\n#section-footer-revamp area#india {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 144px;\n top: 83px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#india {\n top: 58px;\n}\n\n#section-footer-revamp area#singapure+span {\n line-height: 22px;\n content: \"Singapore\";\n cursor: pointer;\n position: absolute;\n top: 123px;\n left: 123px;\n width: 84px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#singapure+span {\n top: 98px;\n}\n\n#section-footer-revamp area#singapure {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 164px;\n top: 120px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#singapure {\n top: 95px;\n}\n\n#section-footer-revamp area#netherlands+span {\n line-height: 22px;\n content: \"Europe\";\n cursor: pointer;\n position: absolute;\n top: 94px;\n left: 65px;\n width: 66px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#netherlands+span {\n top: 69px;\n}\n\n#section-footer-revamp area#netherlands {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 106px;\n top: 91px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#netherlands {\n top: 66px;\n}\n\n#section-footer-revamp area.inactive+span,\n#section-footer-revamp area.inactive+span {\n opacity: 30%;\n}\n\n#section-footer-revamp area.inactive,\n#section-footer-revamp area.inactive {\n opacity: 30%;\n}\n\n#section-footer-revamp .fortanix-logos-wrapper.second-menu.first-child {\n padding: 0;\n}\n\n#section-footer-revamp .fortanix-logo {\n display: flex;\n align-items: center;\n margin-bottom: 40px;\n}\n\n#section-footer-revamp .fortanix-logo img {\n height: 28px;\n padding-right: 40px;\n}\n\n#section-footer-revamp .fortanix-logo span {\n display: block;\n padding-left: 40px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 16px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n border-left: 1px solid #18b6ee;\n}\n\n#section-footer-revamp .compliance-logo {\n display: flex;\n align-items: flex-end;\n flex-wrap: wrap;\n}\n\n#section-footer-revamp .compliance-logo img {\n padding-right: 25px;\n margin-bottom: 20px;\n}\n\n#section-footer-revamp .hs_email .input::after {\n right: -5px;\n top: 6px;\n}\n\n.section-40 {\n padding-top: 40px;\n padding-bottom: 40px;\n}\n\n.section-40.border-top {\n border-top: 1px solid rgb(242, 244, 248, 0.1);\n}\n\n.section-20 {\n padding-top: 20px;\n padding-bottom: 20px;\n}\n\n.range {\n margin-left: -15px;\n margin-right: -15px;\n}\n\n[class*=\"cell-\"] {\n padding-left: 15px;\n padding-right: 15px;\n}\n\n@media (min-width: 480px) {\n .range {\n display: -ms-flexbox;\n display: -webkit-flex;\n display: flex;\n -ms-flex: 0 1 auto;\n -webkit-flex: 0 1 auto;\n flex: 0 1 auto;\n -webkit-flex-direction: row;\n -ms-flex-direction: row;\n flex-direction: row;\n -webkit-flex-wrap: wrap;\n -ms-flex-wrap: wrap;\n flex-wrap: wrap;\n }\n\n .range>[class*=\"cell\"] {\n -ms-flex: 0 0 auto;\n -webkit-flex: 0 0 auto;\n flex: 0 0 auto;\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 768px) {\n #section-footer-revamp .second-menu.first-child {\n padding-top: 40px;\n }\n\n .section-sm-top-75 {\n padding-top: 75px;\n }\n\n .text-sm-left {\n text-align: left;\n }\n\n .range-sm-middle {\n -webkit-align-items: center;\n -ms-flex-align: center;\n align-items: center;\n }\n\n .range>.cell-sm-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-sm-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-sm-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-sm-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-sm-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-sm-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-sm-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-sm-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-sm-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-sm-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-sm-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-sm-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 992px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-md-center {\n -webkit-justify-content: center;\n -ms-flex-pack: center;\n justify-content: center;\n }\n\n .range>.cell-md-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-md-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-md-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-md-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-md-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-md-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-md-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-md-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-md-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-md-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-md-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-md-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 1200px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-lg-left {\n -webkit-justify-content: flex-start;\n -ms-flex-pack: start;\n justify-content: flex-start;\n }\n\n .range>.cell-lg-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-lg-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-lg-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-lg-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-lg-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-lg-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-lg-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-lg-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-lg-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-lg-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-lg-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-lg-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (max-width: 767px) {\n .map-container {\n width: max-content;\n margin: 0 auto;\n position: relative;\n }\n\n #section-footer-revamp area#netherlands+span {\n top: 70px;\n left: 50px;\n }\n\n #section-footer-revamp area#netherlands {\n top: 67px;\n left: 91px;\n }\n\n #section-footer-revamp area#singapure+span {\n top: 98px;\n left: 117px;\n }\n\n #section-footer-revamp area#singapure {\n top: 95px;\n left: 149px;\n }\n\n #section-footer-revamp area#india+span {\n top: 39px;\n left: 109px;\n }\n\n #section-footer-revamp area#india {\n top: 58px;\n left: 127px;\n }\n\n #section-footer-revamp area#usa+span {\n top: 38px;\n left: -8px;\n }\n\n #section-footer-revamp area#usa {\n left: 24px;\n top: 58px;\n }\n\n #section-footer-revamp .second-menu {\n padding-left: 0;\n }\n}\n\n\n@media only screen and (max-width: 767px) {\n\n /* .fortanixLogoContainer {\n padding: 20px;\n margin-top: 0;\n}\n */\n #section-footer .icons-wrapper {\n margin-bottom: 30px;\n justify-content: center;\n }\n\n #section-footer .fortanix-logo {\n flex-direction: column;\n }\n\n #section-footer .fortanix-logo img {\n padding: 0;\n }\n\n #section-footer .fortanix-logo span {\n padding: 0;\n border: 0;\n margin-top: 20px;\n }\n\n #section-footer .compliance-logo {\n display: flex;\n align-items: center;\n flex-direction: column;\n }\n\n #section-footer .compliance-logo img {\n padding-right: 0;\n margin-bottom: 20px;\n }\n}\n\n/* SiteFooterRevamp Map styles */\n\n#section-footer-revamp .address {\n text-align: center;\n}\n\n@media only screen and (min-width:768px) {\n #section-footer-revamp .address {\n text-align: left;\n }\n\n #section-footer-revamp .map-container {\n min-width: 250px;\n }\n\n .footerNavigationLinksLast {\n padding-right: 90px;\n }\n}\n\n@media only screen and (min-width:1022px) {\n #section-footer-revamp .map-container {\n min-width: 300px;\n }\n\n}\n\n.fiveColumnWrapper .oneColumnWrapper a,\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper a {\n display: block;\n}"},"editableProperties":[],"children":[]}]}]},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/layouts/footer","rt":"json"},"2285760485":{"b":{"result":true,"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/layouts/isHomePageEnabled","rt":"json"},"2717370311":{"b":{"result":{"integrations":[],"htmlHeader":"\u003C!-- Document360 added code - Don't modify this code(!important) -->\n\u003Clink href=\"https://fonts.googleapis.com/css2?family=Montserrat:ital,wght@0,100;0,200;0,300;0,400;0,500;0,600;0,700;0,800;0,900;1,100;1,200;1,300;1,400;1,500;1,600;1,700;1,800;1,900&display=swap\" rel=\"stylesheet\" />\n\u003Clink rel=\"stylesheet\" href=\"//code.jquery.com/ui/1.13.2/themes/base/jquery-ui.css\">\n\u003Cscript src=\"https://code.jquery.com/ui/1.13.2/jquery-ui.js\">\u003C/script>\n\u003Cscript>\n window.addEventListener(\"articleload\", function() {\n setTimeout(timeOutGlossary, 500);\n });\nfunction timeOutGlossary() { \n var searchUrl = window.location.search;\n var currentUrl = window.location.pathname + searchUrl;\n\n $(\"#tabs ul li a\").each(function() { \n var href = $(this).attr(\"href\");\n // Check if href contains '#tabs1' and prepend currentUrl\n if (href.includes(\"#tabs\") && !href.startsWith(currentUrl)) {\n $(this).attr(\"href\", currentUrl + href);\n }\n });\n\n // Initialize tabs\n $(\"#tabs\").tabs();\n $(\"#tabs, #tabs-1\").click(function() {\n return false;\n });\n \n var glossaryContentsArr = document.querySelectorAll(\"[data-glossary]\");\n glossaryContentsArr.forEach(e => e.textContent = e.textContent.replaceAll(\"-\", \" \"));\n \t\tdocument.querySelectorAll(\"span[data-glossary=DSM]\").forEach(el => el.outerHTML = \"DSM\");\n document.querySelectorAll(\"span[data-glossary=Security-object]\").forEach(el => el.innerHTML = \"security object\");\n document.querySelectorAll(\"span[data-glossary=Virtual-Keys]\").forEach(el => el.innerHTML = \"virtual keys\");\n }\n setTimeout(timeOutGlossary, 500);\n\u003C/script>\n\n","headerIntegrations":[],"bodyIntegrations":[]},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/Integrations","rt":"json"},"3283321709":{"b":{"result":{"articleData":{"isFollowed":false,"followedByInheritance":false,"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","title":"FAQs","content":"","categoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","projectDocumentVersionId":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":0,"publicVersion":0,"latestVersion":0,"versionId":"3c8a2a01-435f-4844-b2bf-43c497a4b6fe","hidden":false,"settings":{"slug":"faqs","seoTitle":"FAQs","allowComments":true,"showTableOfContents":false,"tags":[],"articleStatusIndicator":0,"excludeFromSearch":false,"excludeFromAISearch":false,"excludeFromExternalSearch":false,"enableTwoWayLink":false,"contentType":2,"staleStatus":{"articleStaleStatus":0,"staleReason":"","expiredAt":"0001-01-01T00:00:00Z"},"enableArticleFeedback":true,"markAsDeprecated":false,"preProcessedArticleWordCount":0,"showOutlineView":false,"isAcknowledgementEnabled":false,"siteProtectionLevel":0},"isAutoSave":false,"articleStatus":0,"order":0,"authors":[],"createdAt":"2025-08-20T17:30:37.6520432Z","modifiedAt":"2025-08-20T17:30:37.6520432Z","contentType":0,"hiddenCategory":false,"contributors":[],"langCode":"en","enableRTL":false,"isFallBackContent":false,"translationOption":0,"languageSlugs":[{"code":"en","slug":"faqs"}],"categoryType":2,"isArticleTemplateContent":false,"articleIndex":{"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","title":"FAQs","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false},{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false}],"children":[{"id":"9ebde975-74e3-4746-b0b3-0b95798911ff","title":"What is Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager is a cloud service that enables you to securely generate, store, and use cryptographic keys and certificates, as well as passwords, API keys, tokens, or any blob of data. ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:11:08.605Z","lastPublishedDate":"2024-05-30T15:11:08.605Z","updatedAt":"2024-07-15T19:26:19.586Z","order":1,"childrenCount":0,"categoryType":0},{"id":"abedd2d7-07d4-48b7-8b07-93d1053f0f41","title":"Why should I use Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager ( DSM ) provides HSM-grade security at the cost of software. Fortanix DSM is built to be highly-available, fault-tolerant, and horizontally scalable. If you use HSMs for your encryption needs in your organization, y...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"why-should-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:35:05.639Z","lastPublishedDate":"2024-05-30T15:36:12.032Z","updatedAt":"2024-07-15T19:30:01.026Z","order":2,"childrenCount":0,"categoryType":0},{"id":"9e60abd4-3098-46dd-ad88-e439a71be90d","title":"How do I get started with Fortanix Data Security Manager?","description":" You can try out Fortanix-Data-Security-Manager ( DSM ) by signing up for a free account at \" https://\" . Once signed in, you can add your applications to use Fortanix DSM. Fortanix DSM is also available for on-premises deployment. For more infor...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-do-i-get-started-with-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:12:24.853Z","lastPublishedDate":"2025-07-24T09:52:22.1Z","updatedAt":"2025-07-24T09:52:22.1Z","order":3,"childrenCount":0,"categoryType":0},{"id":"4f1faa21-8e1b-4a29-8158-f49489f5aabc","title":"What is the default version of DSM installed in on-prem?","description":" Fortanix DSM does not have any software installed by default. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-default-version-of-dsm-installed-in-on-prem","firstPublishedDate":"2024-12-17T12:28:08.462Z","lastPublishedDate":"2024-12-17T12:28:08.462Z","updatedAt":"2024-12-17T12:28:08.462Z","order":4,"childrenCount":0,"categoryType":0},{"id":"dbc251d3-bfee-4342-aca1-8a8c7fbab247","title":"How does Fortanix Data Security Manager work?","description":" The Fortanix-Data-Security-Manager ( DSM ) allows you to manage, store, and use your keys and secrets. You can generate keys in Fortanix DSM or import your own keys. You can use these keys to perform cryptographic operations on your data that you ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-does-fortanix-data-security-manager-work","firstPublishedDate":"2024-05-30T15:14:02.95Z","lastPublishedDate":"2024-05-30T15:14:02.95Z","updatedAt":"2024-07-15T19:28:57.371Z","order":5,"childrenCount":0,"categoryType":0},{"id":"2f73eb62-e101-49af-8f8a-e2f76f684cf9","title":"What languages and interfaces are supported by Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager ( DSM ) currently provides PKCS#11, KMIP, JCE, Microsoft CAPI, and CNG interfaces. Additionally, it provides a REST API interface to communicate with DSM for cryptography and key management operations. Fortanix DSM ...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:37:18.139Z","lastPublishedDate":"2024-10-22T16:26:39.395Z","updatedAt":"2024-10-22T16:26:39.395Z","order":6,"childrenCount":0,"categoryType":0},{"id":"e3843c06-22e2-4661-807c-b59a6d8593e7","title":"How will I be charged and billed for using Fortanix DSM as a Service?","description":" Fortanix DSM as a Service is available on a monthly subscription basis. Try a 30 Day Free Trial today. ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service","firstPublishedDate":"2024-05-30T15:10:29.028Z","lastPublishedDate":"2024-05-30T15:10:29.028Z","updatedAt":"2024-05-30T15:10:29.028Z","order":7,"childrenCount":0,"categoryType":0},{"id":"57834e64-5c87-4dd9-8594-6200d64be95b","title":"How to check the Fortanix DSM SaaS version?","description":" To know your Fortanix-Data-Security-Manager (DSM) SaaS version, you can query the sys/v1/version endpoint. For example: curl -v https://amer.smartkey.io/sys/v1/version To check the DSM SaaS version from the user interface (...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-fortanix-dsm-saas-version","firstPublishedDate":"2025-04-08T08:25:52.253Z","lastPublishedDate":"2025-04-08T08:25:52.253Z","updatedAt":"2025-04-08T08:25:52.253Z","order":8,"childrenCount":0,"categoryType":0},{"id":"b4f3f4ce-7ba5-4fd1-9c7e-57c6e1548ff5","title":"What algorithms are supported by Fortanix Data Security Manager?","description":" Please refer to the Algorithm Support page to view the algorithms supported by Fortanix-Data-Security-Manager . ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-algorithms-are-supported-by-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:03:16.392Z","lastPublishedDate":"2024-05-30T16:03:16.392Z","updatedAt":"2024-05-30T16:03:16.392Z","order":9,"childrenCount":0,"categoryType":0},{"id":"4f582d1e-559c-4e18-9f38-06884995e873","title":"What are the list of browsers that Fortanix DSM supports?","description":" The list of browsers that Fortanix DSM supports are based on a dynamic \" browserslist \" query, ( https://github.com/browserslist/browserslist ). The query is: > 0.5%, last 2 versions, Firefox ESR, not dead, not IE 11, not IE_Mob 11 Th...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-list-of-browsers-that-fortanix-dsm-supports","firstPublishedDate":"2024-05-30T15:42:25.314Z","lastPublishedDate":"2024-05-30T15:42:25.314Z","updatedAt":"2024-05-30T15:42:25.314Z","order":10,"childrenCount":0,"categoryType":0},{"id":"be287ad8-790b-4f4a-a77f-f78f1b005635","title":"What KMIP coverage do we provide?","description":" 1.0 KMIP The Key Management Interoperability Protocol (KMIP) is an extensible communication protocol that defines message formats for the manipulation of cryptographic keys on a key management server. This facilitates data encryption by simplifying...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-kmip-coverage-do-we-provide","firstPublishedDate":"2024-05-30T15:48:04.314Z","lastPublishedDate":"2025-07-24T09:51:27.922Z","updatedAt":"2025-07-24T09:51:27.922Z","order":11,"childrenCount":0,"categoryType":0},{"id":"da1bf994-4fa1-46b2-beb7-a881fb359392","title":"Is it possible to talk to Fortanix DSM using PyKMIP?","description":" Yes, Python implementation of the Key Management Interoperability Protocol (KMIP) can interact with Fortanix-Data-Security-Manager (DSM). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-it-possible-to-talk-to-fortanix-dsm-using-pykmip","firstPublishedDate":"2024-11-05T04:05:02.116Z","lastPublishedDate":"2024-11-05T04:05:02.116Z","updatedAt":"2024-11-05T04:05:02.116Z","order":12,"childrenCount":0,"categoryType":0},{"id":"aa320a2d-38ce-4610-9057-6aa695ca60a6","title":"What is Key Check Value for a Fortanix DSM security object ?","description":" The Key Checksum Value (KCV) is the checksum of a cryptographic key. It is used to validate the key integrity or match the keys without knowing their actual values. ","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-key-check-value-for-a-fortanix-dsm-security-object","firstPublishedDate":"2025-04-08T08:51:48.292Z","lastPublishedDate":"2025-04-29T04:25:57.498Z","updatedAt":"2025-04-29T04:25:57.498Z","order":13,"childrenCount":0,"categoryType":0},{"id":"d3a4bb75-b16a-4151-8439-695076bc18fe","title":"Can Fortanix do secrets lifecycle management?","description":" Fortanix-Data-Security-Manager (DSM) can help you import and update secrets. DSM does not currently support the creation and rotation of secrets. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-do-secrets-lifecycle-management","firstPublishedDate":"2024-11-05T04:18:02.136Z","lastPublishedDate":"2024-11-05T04:18:02.136Z","updatedAt":"2024-11-05T04:18:02.136Z","order":14,"childrenCount":0,"categoryType":0},{"id":"d6d6b509-18fd-4b90-925e-5bb3bbd1e2e4","title":"Does a Fortanix DSM application search for secrets that are only created by it?","description":" A Fortanix DSM application (app) can search all secrets within the groups it has access to, not only the secrets it created. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-a-fortanix-dsm-application-search-secrets-which-are-only-created-by-it-in-the-kms","firstPublishedDate":"2025-05-20T11:43:33.279Z","lastPublishedDate":"2025-05-20T11:43:33.279Z","updatedAt":"2025-05-20T11:43:33.279Z","order":15,"childrenCount":0,"categoryType":0},{"id":"c654000e-56f1-41c1-9061-2d18dd4649cf","title":"Can I add a Quorum approval policy for system-level log management changes in Fortanix Data Security Manager?","description":" Yes, you can set up an account-level Quorum approval policy for logging system-level log management changes. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-i-add-a-quorum-approval-policy-for-system-level-log-management-changes-in-fortanix-data-security-manager","firstPublishedDate":"2025-06-09T06:49:19.906Z","lastPublishedDate":"2025-06-09T06:49:19.906Z","updatedAt":"2025-06-09T06:49:19.906Z","order":16,"childrenCount":0,"categoryType":0},{"id":"c2df6658-e66b-4991-b659-a12651542429","title":"What is the difference between Invite User and Create New User API","description":" In Fortanix Data Security Manager (DSM), the “Invite User” method is the recommended way to create users in any DSM environment. The “Create User” API is intended for the user sign-up flow, which is typically disabled in most clusters and not usable...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-difference-between-invite-user-and-create-new-user-api","firstPublishedDate":"2025-07-01T08:23:14.914Z","lastPublishedDate":"2025-07-01T08:23:14.914Z","updatedAt":"2025-07-01T08:23:14.914Z","order":17,"childrenCount":0,"categoryType":0},{"id":"1a1f8ce5-ae19-4eef-868c-e4af585eb465","title":"How to download all secrets?","description":" You can upload one or multiple secrets into a single secret object in Fortanix DSM. If you have multiple secret objects, you can programmatically use the /crypto/v1/keys/exports API in a loop to export secrets from a specific DSM group or account....","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-download-all-secrets","firstPublishedDate":"2024-12-17T13:12:54.689Z","lastPublishedDate":"2025-01-28T08:21:50.817Z","updatedAt":"2025-01-28T08:21:50.817Z","order":18,"childrenCount":0,"categoryType":0},{"id":"381f6783-8e9e-4f46-bc2c-1d6e03dac202","title":"Can an account in Fortanix DSM be a tenant account?","description":" Fortanix DSM supports the creation of multiple tenant accounts within a cluster. Each tenant account is a cryptographically isolated entity and can be used for different purposes, such as a tenant per line of business or a tenant per technology. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-an-account-in-dsm-be-a-tenant-account","firstPublishedDate":"2025-03-12T08:06:06.773Z","lastPublishedDate":"2025-03-12T08:06:06.773Z","updatedAt":"2025-03-12T08:06:06.773Z","order":19,"childrenCount":0,"categoryType":0},{"id":"47464be3-6fb5-40d4-aa5e-20208ce951bd","title":"Does Fortanix DSM support PKCS#12 ?","description":" Yes, Fortanix-Data-Security-Manager (DSM) supports PKCS#12 (PFX) files, which contain private keys, certificates, and associated certificate chains. However, it does not support uploading PFX files through the user interface (UI) or REST API. The ...","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-support-pkcs12","firstPublishedDate":"2024-11-05T03:57:41.559Z","lastPublishedDate":"2024-12-17T12:17:44.044Z","updatedAt":"2024-12-17T12:17:44.044Z","order":20,"childrenCount":0,"categoryType":0},{"id":"547db959-69e0-4b79-adcd-35a33dad4f21","title":"Does Fortanix DSM support the Certificate Management Protocol (CMP)?","description":" No, Fortanix does not support Certificate Management Protocol (CMP). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-support-the-certificate-management-protocol-cmp","firstPublishedDate":"2024-11-05T04:02:18.045Z","lastPublishedDate":"2024-11-05T04:02:18.045Z","updatedAt":"2024-11-05T04:02:18.045Z","order":21,"childrenCount":0,"categoryType":0},{"id":"830c2742-369f-4731-b515-e22233581cb3","title":"Can I import keys into Fortanix Data Security Manager?","description":" Yes, keys can be imported into Fortanix-Data-Security-Manager (DSM) using any of the supported interfaces. For more information on how to import a key into Fortanix DSM, refer to the User's Guide: Fortanix Data Security Manager Key Lifecycle...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-i-import-keys-into-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:56:09.058Z","lastPublishedDate":"2025-07-24T09:50:21.809Z","updatedAt":"2025-07-24T09:50:21.809Z","order":22,"childrenCount":0,"categoryType":0},{"id":"05b08c8d-dd2b-479a-9f0c-d5db13d1a508","title":"What is application-level encryption in Fortanix DSM?","description":" Business-critical applications can integrate with Fortanix Data Security Manager (DSM) using legacy cryptographic interfaces such as PKCS#11, CNG, and JCE, or through the native Fortanix DSM RESTful interface. This enables the encryption of sensitiv...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-application-level-encryption-in-fortanix-dsm","firstPublishedDate":"2025-07-01T08:54:15.556Z","lastPublishedDate":"2025-07-01T08:54:15.556Z","updatedAt":"2025-07-01T08:54:15.556Z","order":23,"childrenCount":0,"categoryType":0},{"id":"935c9961-4c19-4446-8057-e340e368c685","title":"What is MFA device attestation, self-attestation, and the attestation ID, response, and type? What does the binary response from a U2F device include?","description":" In Fortanix Data Security Manager (DSM), MFA (Multi-Factor Authentication) device attestation is the process of validating the authenticity and integrity of a hardware authenticator. During attestation, the device provides an attestation object , w...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-mfa-device-attestation-including-self-attestation-and-the-attestation-id-response-and-type-what-does-the-binary-response-from-a-u2f-device","firstPublishedDate":"2025-07-01T08:31:58.413Z","lastPublishedDate":"2025-07-01T08:31:58.413Z","updatedAt":"2025-07-01T08:31:58.413Z","order":24,"childrenCount":0,"categoryType":0},{"id":"8c261fc5-e811-4583-a638-eda9ae5a6913","title":"Can you change the non-exportable key attribute to export?","description":" No, once a key is marked as non-exportable, it cannot be changed to exportable. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-you-change-the-non-export-key-attribute-to-export","firstPublishedDate":"2024-12-17T13:15:04.377Z","lastPublishedDate":"2024-12-17T13:15:04.377Z","updatedAt":"2024-12-17T13:15:04.377Z","order":25,"childrenCount":0,"categoryType":0},{"id":"e008c3c5-ce14-4c15-9b1b-5d9495ca8d0c","title":"Which key will be created on Fortanix DSM in the MinIO integration?","description":" The MinIO KEK server stores OPAQUE key as the root of trust in Fortanix DSM. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"which-key-will-be-created-on-fortanix-dsm-in-the-minio-integration","firstPublishedDate":"2024-10-21T06:14:38.545Z","lastPublishedDate":"2024-10-21T06:14:38.545Z","updatedAt":"2024-10-21T06:14:38.545Z","order":26,"childrenCount":0,"categoryType":0},{"id":"3e01b8af-8a67-4269-8d4b-b15dee07fe61","title":"What kind of policies can be applied to Secret security objects in Fortanix DSM?","description":" There is no automated rotation feature currently available for secrets in Fortanix-Data-Security-Manager (DSM). However, you can set activation and deactivation dates for secrets, and use the Key metadata policy at the group level to ensu...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-kind-of-policies-can-be-applied-to-secret-security-objects-in-fortanix-dsm","firstPublishedDate":"2025-04-08T08:50:10.294Z","lastPublishedDate":"2025-04-08T08:50:10.294Z","updatedAt":"2025-04-08T08:50:10.294Z","order":27,"childrenCount":0,"categoryType":0},{"id":"89451d2f-3a37-463e-b711-3ae9e12791bb","title":"How to restart an sdkms-ui service on a hardware cluster?","description":" The sdkms-ui is an integrated service in the Fortanix DSM cluster. You must do a rolling restart of the sdkms-ui service from the DSM command line interface (CLI), or you can run the following command one by one on each node: kubectl delete pod sd...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-restart-an-sdkms-ui-service-on-a-hardware-cluster","firstPublishedDate":"2024-10-21T06:07:01.706Z","lastPublishedDate":"2024-10-21T06:07:01.706Z","updatedAt":"2024-10-21T06:07:01.706Z","order":28,"childrenCount":0,"categoryType":0},{"id":"b9f9579e-631e-488a-a1a3-f961e1f2c39d","title":"Can Fortanix DSM API retrieve more than 1001 account information?","description":" Yes, you can use the Fortanix DSM GET /sys/v1/accounts API to retrieve details for more than 1001 accounts by implementing pagination to fetch information beyond the initial 1,001 entries. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-dsm-api-retrieve-more-than-1001-account-information","firstPublishedDate":"2025-05-20T11:39:31.791Z","lastPublishedDate":"2025-05-20T11:39:31.791Z","updatedAt":"2025-05-20T11:39:31.791Z","order":29,"childrenCount":0,"categoryType":0},{"id":"c75b0822-2129-46f6-865b-18599454b4b3","title":"How to check the crypto operations by transient keys in DSM?","description":" Currently, cryptographic operations of transient keys in Fortanix-Data-Security-Manager (DSM) are not logged. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-crypto-operations-by-transient-keys-in-dsm","firstPublishedDate":"2024-11-05T04:23:50.747Z","lastPublishedDate":"2024-11-05T04:23:50.747Z","updatedAt":"2024-11-05T04:23:50.747Z","order":30,"childrenCount":0,"categoryType":0},{"id":"64145265-5c0f-4602-98f8-32af0f2c3644","title":"Is there an option to expire a security object at a specific date or after a certain time period?","description":" Fortanix-Data-Security-Manager ( DSM ) does support the expiry of security objects, including SECRET type. You can set the expiry for a future date or you can expire an object immediately. On expiry/deactivation, the object goes into the \"Deact...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period","firstPublishedDate":"2024-05-30T15:44:57.551Z","lastPublishedDate":"2024-05-30T15:44:57.551Z","updatedAt":"2024-05-30T15:44:57.551Z","order":31,"childrenCount":0,"categoryType":0},{"id":"6108dcf5-861e-4b06-bdd1-129959f36b10","title":"What is cluster attestation and why should I use it? (on-prem only)","description":" Customers can enable attestation of Fortanix-Data-Security-Manager ( DSM ) installed on Intel ® Software Guard Extension (SGX) enabled FX2200 appliances and Azure Confidential Computing Virtual Machines (VM). For more information about why and ...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only","firstPublishedDate":"2024-05-30T15:52:09.647Z","lastPublishedDate":"2025-07-24T09:48:55.999Z","updatedAt":"2025-07-24T09:48:55.999Z","order":32,"childrenCount":0,"categoryType":0},{"id":"1239ebe1-3d83-4789-9f99-777a219771e8","title":"What key management features are available in Fortanix Data Security Manager?","description":" The following key management features are provided by Fortanix-Data-Security-Manager : Create symmetric and asymmetric keys Import your own keys Derive new keys from existing keys Role-based access control to determine which users, grou...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-key-management-features-are-available-in-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:02:20.981Z","lastPublishedDate":"2024-05-30T16:02:20.981Z","updatedAt":"2024-07-15T19:38:13.552Z","order":33,"childrenCount":0,"categoryType":0},{"id":"482a71b6-e41b-4c04-a532-b3f3fee9a76c","title":"What does unregistered user mean in Fortanix DSM?","description":" An unregistered user refers to someone who has not been added to Fortanix Data Security Manager (DSM), either by invitation or manual creation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-does-unregistered-user-mean-in-fortanix-dsm","firstPublishedDate":"2025-07-01T08:41:41.802Z","lastPublishedDate":"2025-07-01T08:41:41.802Z","updatedAt":"2025-07-01T08:41:41.802Z","order":34,"childrenCount":0,"categoryType":0},{"id":"84690147-6845-4ecd-aeaf-b72d01519ceb","title":"Why is the FPE policy not set for a key?","description":" When a tokenization key is created, a Format-Preserving Encryption (FPE) policy is set by default. This policy is not applied to a normal AES key but only to a tokenization key. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"why-is-the-fpe-policy-not-set-for-a-key","firstPublishedDate":"2025-03-12T07:52:49.125Z","lastPublishedDate":"2025-03-12T07:52:49.125Z","updatedAt":"2025-03-12T07:52:49.125Z","order":35,"childrenCount":0,"categoryType":0},{"id":"521879ed-bd6b-4c4b-bd90-7cd45e39cb17","title":"Where is encryption and decryption done if I use Fortanix Data Security Manager?","description":" The encryption and decryption operations are done inside an Intel® SGX enclave created by Fortanix-Data-Security-Manager . ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:57:55.513Z","lastPublishedDate":"2024-05-30T15:57:55.513Z","updatedAt":"2024-05-30T15:57:55.513Z","order":36,"childrenCount":0,"categoryType":0},{"id":"438454cc-cc59-4dea-aa56-67e72a0d3282","title":"Where do my keys live if I use Fortanix Data Security Manager?","description":" The keys, as well as other types of secrets stored in Fortanix-Data-Security-Manager ( DSM ), are held in an encrypted database when not in use. When in use, the keys are only available inside a secure enclave created using Intel® SGX technology, ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:59:35.746Z","lastPublishedDate":"2024-05-30T15:59:35.746Z","updatedAt":"2024-07-15T19:36:42.634Z","order":37,"childrenCount":0,"categoryType":0},{"id":"8b391f3d-a8a9-42de-9e78-414f16ae1858","title":"What cryptographic operations are available in Fortanix Data Security Manager?","description":" The following cryptographic operations are provided by Fortanix-Data-Security-Manager : Generation of symmetric (AES, DES, 3DES, HMAC) and asymmetric (RSA, EC) keys Encryption and decryption using symmetric and asymmetric keys Sign and ver...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:01:31.304Z","lastPublishedDate":"2024-05-30T16:01:31.304Z","updatedAt":"2024-05-30T16:01:31.304Z","order":38,"childrenCount":0,"categoryType":0},{"id":"cb10a231-655b-4fc4-ac3a-9400cc2956a3","title":"What is tokenization transaction per second in DSM?","description":" The Tokenization transaction in Fortanix-Data-Security-Manager (DSM) per second is the number of security object tokenization operations completed in one second in DSM or Webservice. For more information about the latest performance statistics f...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-tokenization-transaction-per-second-in-dsm","firstPublishedDate":"2024-11-05T09:57:51.268Z","lastPublishedDate":"2025-07-24T09:48:21.42Z","updatedAt":"2025-07-24T09:48:21.42Z","order":39,"childrenCount":0,"categoryType":0},{"id":"62877012-d2ee-4d62-a168-861cb4e4e17b","title":"Can Fortanix employees access my keys?","description":" Fortanix does not have access to customer keys. The keys, including the key material and the related metadata, are encrypted both in use and at rest using an encryption key which is derived by the Fortanix-Data-Security-Manager process and the Int...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-employees-access-my-keys","firstPublishedDate":"2024-05-30T15:58:44.369Z","lastPublishedDate":"2024-05-30T15:58:44.369Z","updatedAt":"2024-07-15T19:35:49.951Z","order":40,"childrenCount":0,"categoryType":0},{"id":"da50f81a-7c42-4b77-b2e4-33c3d64bd748","title":"What are the differences between the two types of objects we can use to store sensitive information, OPAQUE and SECRET?","description":" The difference between an Opaque object and a Secret object is as follows: When you do a GET on an Opaque object, you get its value along with metadata. For all other types, the value is not returned. You can get the value of the Secret object...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret","firstPublishedDate":"2024-05-30T15:39:38.809Z","lastPublishedDate":"2024-05-30T15:39:38.809Z","updatedAt":"2024-07-15T19:31:36.784Z","order":41,"childrenCount":0,"categoryType":0},{"id":"e61313c4-31f3-4e36-87d2-1dccac9c69d4","title":"What has Fortanix DSM done to mitigate UI slowdown if an account contains many (> 700) very large (>300kb) security objects?","description":" Fortanix-Data-Security-Manager ( DSM ) has resolved this issue by limiting the number of security objects that can be displayed on a page to 100. If there are more than 100 security objects in an account, searching and sorting functionality is ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects","firstPublishedDate":"2024-05-30T15:49:08.787Z","lastPublishedDate":"2024-05-30T15:49:08.787Z","updatedAt":"2024-07-15T19:33:38.201Z","order":42,"childrenCount":0,"categoryType":0},{"id":"d6c695c1-e2d3-4819-ad61-3ee27d875045","title":"FAQs - Fortanix Data Security Manager UI","description":" 1. What are the default Fortanix Data Security Manager accounts and how do I delete or disable them? Users do not have any accounts by default. A user must either create an account or get invited to an account. A System Administrator can disa...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"faqs-fortanix-data-security-manager-ui","firstPublishedDate":"2024-05-30T15:45:36.311Z","lastPublishedDate":"2024-05-30T15:45:36.311Z","updatedAt":"2024-07-15T19:32:26.502Z","order":43,"childrenCount":0,"categoryType":0},{"id":"549d60b9-dca2-4744-8591-c8e844a772ba","title":"What are Transient keys?","description":" Transient keys are short-lived keys. For example, if you need to do a key agreement, you encrypt with the agreed key, and then throw away the agreed key. A benefit of such a key is that no other user/app can see a transient key, only its creator ca...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-transient-keys","firstPublishedDate":"2024-05-30T15:50:36.198Z","lastPublishedDate":"2024-05-30T15:50:36.198Z","updatedAt":"2024-05-30T15:50:36.198Z","order":44,"childrenCount":0,"categoryType":0},{"id":"ad32a763-611c-414f-bafd-26324f1da43a","title":"How to check the subscription type for a DSM on-premises deployment?","description":" Subscription type can be seen on home page of the Fortanix-Data-Security-Manager (DSM) account or from the DSM System Administration dashboard. However, on-premises systems are licensed based on application (app) credits. Please reach out to the r...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-subscription-type-for-a-dsm-on-premises-deployment","firstPublishedDate":"2024-11-05T04:08:30.7Z","lastPublishedDate":"2024-11-05T04:08:30.7Z","updatedAt":"2024-11-05T04:08:30.7Z","order":45,"childrenCount":0,"categoryType":0},{"id":"88cae2c0-a1aa-40f9-bc7d-338fee2c8b69","title":"How does Fortanix Data Security Manager compare with AWS KMS and Azure Key Vault?","description":" Fortanix-Data-Security-Manager ( DSM ) is the first cloud service built using the Intel® SGX technology. This enables Fortanix DSM to provide HSM-grade security in software. Fortanix DSM is distributed software, written to scale on-demand, and is ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault","firstPublishedDate":"2024-05-30T15:54:54.422Z","lastPublishedDate":"2024-05-30T15:54:54.422Z","updatedAt":"2024-05-30T15:54:54.422Z","order":46,"childrenCount":0,"categoryType":0},{"id":"1347ee84-3e6d-4a5a-a8f2-2449474c38a3","title":"Does Fortanix support Cassandra encryption using DSM?","description":" Yes Fortanix supports Cassandra encryption using Fortanix-Data-Security-Manager (DSM). For more information about the integration steps, refer to Using Fortanix Data Security Manager with Cassandra TDE . ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-support-cassandra-encryption-using-dsm","firstPublishedDate":"2024-11-05T04:01:11.353Z","lastPublishedDate":"2025-07-24T09:46:41.298Z","updatedAt":"2025-07-24T09:46:41.298Z","order":47,"childrenCount":0,"categoryType":0},{"id":"b5bec9f9-c4bb-4359-9f85-51686c374799","title":"What is the difference between Lua and Rust programming language in Fortanix Data Security Manager?","description":" Fortanix DSM is developed using the Rust programming language, while Lua is used to develop its plugins. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-difference-between-lua-and-rust-programming-language-in-fortanix-data-security-manager","firstPublishedDate":"2025-06-09T08:13:42.896Z","lastPublishedDate":"2025-06-09T08:13:42.896Z","updatedAt":"2025-06-09T08:13:42.896Z","order":48,"childrenCount":0,"categoryType":0},{"id":"0aad2e42-52bd-49dd-84f8-284cc5410dab","title":"Where to find CA certs to run Fortanix DSM Accelerator Webservice?","description":" CA certs can be downloaded from the Fortanix-Data-Security-Manager (DSM) URL Certificate to which the DSM Accelerator Webservice connects. It is usually available if you click the padlock icon next to the DSM URL. From the signed installed certs,...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-to-find-ca-certs-to-run-fortanix-dsm-accelerator-webservice","firstPublishedDate":"2024-11-05T04:22:19.395Z","lastPublishedDate":"2025-04-10T06:44:28.611Z","updatedAt":"2025-04-10T06:44:28.611Z","order":49,"childrenCount":0,"categoryType":0},{"id":"636ce56b-21fa-4ea5-8e8c-2ff0d93adee3","title":"What are the bandwidth network requirements when deploying Fortanix DSM in multiple sites?","description":" The minimum bandwidth network requirement when deploying Fortanix-Data-Security-Manager (DSM) in multiple sites is 1G for site to site connectivity with a 10% commit. Ideal network bandwidth is 10G. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-bandwidth-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","firstPublishedDate":"2024-11-05T04:11:30.408Z","lastPublishedDate":"2024-11-05T04:11:30.408Z","updatedAt":"2024-11-05T04:11:30.408Z","order":50,"childrenCount":0,"categoryType":0},{"id":"70e57633-f61b-42f7-afc4-62e56d57075d","title":"What are the latency network requirements when deploying Fortanix DSM in multiple sites?","description":" The maximum latency network requirements when deploying Fortanix-Data-Security-Manager (DSM) in multiple sites are 100 milliseconds or less, ideally 60 milliseconds. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-latency-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","firstPublishedDate":"2024-11-05T04:14:45.496Z","lastPublishedDate":"2024-11-05T04:15:09.903Z","updatedAt":"2024-11-05T04:15:09.903Z","order":51,"childrenCount":0,"categoryType":0},{"id":"3228bd22-b713-465f-b720-02f01ffce011","title":"Could a failed power supply even though indicator light is green be a firmware issue in DSM?","description":" This is not likely a firmware issue. If you notice such behavior, you should open a support ticket with Fortanix support ( support@fortanix.com ) for further investigation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"could-a-failed-power-supply-even-though-indicator-light-is-green-be-a-firmware-issue","firstPublishedDate":"2024-11-05T04:48:01.483Z","lastPublishedDate":"2024-11-05T09:58:44.345Z","updatedAt":"2024-11-05T09:58:44.345Z","order":52,"childrenCount":0,"categoryType":0},{"id":"fe5365f6-82b2-4860-a3f9-3ebc23faf824","title":"LMS Keys - FAQs","description":" 1.0 Frequently Asked Questions What are Fortanix's limitations on LMS Key tree size? Fortanix LMS implementation is a two-level Hierarchical Signature System (HSS) whose heights are a list of heights [ h₁ , h₂ ] respectively. Where h...","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"lms-keys-faqs","firstPublishedDate":"2024-06-21T14:44:22.262Z","lastPublishedDate":"2025-03-12T07:54:57.41Z","updatedAt":"2025-03-12T07:54:57.41Z","order":53,"childrenCount":0,"categoryType":0},{"id":"f83febaa-a9d5-4f3f-85b0-65a479777807","title":"Where can I find the IPMI logs?","description":" The Intelligent Platform Management Interface ( IPMI) logs can be found in the IPMI console under Logs and Reports. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-can-i-find-the-ipmi-logs","firstPublishedDate":"2025-03-12T07:49:55.702Z","lastPublishedDate":"2025-03-12T07:49:55.702Z","updatedAt":"2025-03-12T07:49:55.702Z","order":54,"childrenCount":0,"categoryType":0},{"id":"47e94fc6-7f82-4e71-b0b6-a400bbd675fd","title":"Can Fortanix protect against quantum computing?","description":" Yes, Fortanix supports new algorithms certified by NIST against Post-Quantum Computing (PQC). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-protect-against-quantum-computing","firstPublishedDate":"2024-12-17T12:45:37.559Z","lastPublishedDate":"2024-12-17T12:45:37.559Z","updatedAt":"2024-12-17T12:45:37.559Z","order":55,"childrenCount":0,"categoryType":0},{"id":"8bb4b284-066f-49ff-ae33-76c07952e923","title":"What is the Fortanix security vulnerability reporting process?","description":" To report any security vulnerability, please send in the details to support@fortanix.com and it will be forwarded to the necessary team for investigation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-fortanix-security-vulnerability-reporting-process","firstPublishedDate":"2024-11-05T04:19:25.58Z","lastPublishedDate":"2024-11-05T04:19:25.58Z","updatedAt":"2024-11-05T04:19:25.58Z","order":56,"childrenCount":0,"categoryType":0},{"id":"8bc23b9d-1eb4-422b-8be3-3c27605d35ad","title":"How to get the authorized redirect URI for Workspace CSE?","description":" The redirect URI for Google Workspace CSE can be found at https://support.google.com/a/answer/10743588#zippy=%2Coption-to-connect-to-your-idp-using-a-well-known-file under \"Step 2: Create client IDs for CSE\". ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-get-the-authorized-redirect-uri-for-workspace-cse","firstPublishedDate":"2024-12-17T07:37:55.511Z","lastPublishedDate":"2024-12-17T07:37:55.511Z","updatedAt":"2024-12-17T07:37:55.511Z","order":57,"childrenCount":0,"categoryType":0},{"id":"875296fa-8d59-459f-bc7c-2a800130418d","title":"How to perform Cassandra replication in Fortanix DSM?","description":" Run the following command on Fortanix DSM CLI to get the current replication details: sudo -E kubectl exec cassandra-0 -- cqlsh -e \"select * from system_schema.keyspaces where keyspace_name ='public'\"; ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-perform-cassandra-replication-in-fortanix-dsm","firstPublishedDate":"2025-03-12T08:02:36.068Z","lastPublishedDate":"2025-03-12T08:40:34.802Z","updatedAt":"2025-03-12T08:40:34.802Z","order":58,"childrenCount":0,"categoryType":0},{"id":"b7dbd4bd-bcc7-4108-b0ad-b55bdd176d4d","title":"Your Hardware Enablement Stack (HWE) is supported until April 2025. What does this mean?","description":" When you log in to Fortanix DSM you see the message “ Your Hardware Enablement Stack (HWE) is supported until April 2025”. This allows for long-term support (LTS) releases to take advantage of hardware compatibility and performance improvements with...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"your-hardware-enablement-stack-hwe-is-supported-until-april-2025-what-does-this-mean","firstPublishedDate":"2024-12-17T09:49:35.36Z","lastPublishedDate":"2024-12-17T09:49:35.36Z","updatedAt":"2024-12-17T09:49:35.36Z","order":59,"childrenCount":0,"categoryType":0},{"id":"fc14710f-ede8-4490-95d2-6bafd0b77755","title":"Is Fortanix ISO 27001 certified?","description":" Yes, Fortanix is ISO 27001 certified. For more information about the certification, refer to Fortanix Trust Center . ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-fortanix-iso-27001-certified","firstPublishedDate":"2024-12-17T13:18:46.246Z","lastPublishedDate":"2025-07-24T09:45:26.772Z","updatedAt":"2025-07-24T09:45:26.772Z","order":60,"childrenCount":0,"categoryType":0},{"id":"4a364cfa-95b5-41dc-9e9f-ea3133bf4876","title":"Does Fortanix DSM have any hardened OS best practices?","description":" Fortanix follows the Center for Internet Security (CIS) Ubuntu Linux 24.04 Long Term Support (LTS) Benchmark v1.0.0. ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-have-any-hardened-os-best-practices","firstPublishedDate":"2025-03-12T08:17:43.689Z","lastPublishedDate":"2025-07-09T09:06:13.54Z","updatedAt":"2025-07-09T09:06:13.54Z","order":61,"childrenCount":0,"categoryType":0},{"id":"061acbab-e538-4730-95ba-c114408a8cf9","title":"Security","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":2,"slug":"security","updatedAt":"0001-01-01T00:00:00","order":62,"childrenCount":2,"categoryType":2}]},"aiSummaryData":{"isSummaryEligible":false,"isSummaryCreditAvailable":false},"protectionLevel":0,"articleType":0,"operationType":0,"isStarred":false,"preprocessedArticleContentWordCount":0,"isArticleContentCompressed":false,"isGitHubArticle":false,"repoId":0,"isDefaultGitHubPath":false,"isCategory":true,"languageVersionId":"e9721964-e18b-4ec5-82af-fd95c931c045","changeVersionForInternalLink":false,"isAcknowledged":false,"acknowledgedDate":"0001-01-01T00:00:00","isShowAcknowledgementInfo":false,"isBlockEditor":false,"isMarkdownEditor":true,"isBlockEditorSetting":true,"versionCreatedAt":"0001-01-01T00:00:00","hasConditionalBlock":false,"unpublishedVersion":0,"aiArticleCreationStatus":0,"readingTime":0,"isPreview":false},"categories":{"isFollowed":false,"followedByInheritance":false,"order":0,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f04f777e-8870-4a58-8192-2f4bc8c478ac","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"e32f4db3-f90a-4bd4-afdd-caf50628a506","order":1,"documentationType":1,"children":[],"parentCategoryId":"f04f777e-8870-4a58-8192-2f4bc8c478ac","slug":"fortanix-support-sign-up-process","title":"Fortanix Support Sign Up Process","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"slug":"getting-started","title":"Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"1c660f27-d8b4-4f43-92c2-5670cb490388","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"0ed190d7-be57-4b2b-94aa-181a06f2c985","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f5b85bd8-3872-4a95-b483-b4b6b682fc71","order":1,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-overview","title":"Fortanix DSM SaaS Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"59268374-f3c1-4c46-ab0c-ad5f53c351f9","order":2,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"why-fortanix-dsm-saas","title":"Why Fortanix DSM SaaS?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b36c6fb0-ac62-48e4-8543-4c9ca044da80","order":3,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-does-fortanix-dsm-saas-offer","title":"What does Fortanix DSM SaaS Offer?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9a807513-8631-4a0f-82b9-4bacd4a953a2","order":4,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-does-fortanix-dsm-saas-work","title":"How does Fortanix DSM SaaS Work?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3a1b51d8-44ae-4f82-8ed6-c4d503d35760","order":5,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-will-i-be-billed","title":"How will I be Billed?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"06ab2f06-32f3-40ec-ab31-7c73bd1028a5","order":6,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-global-availability-map","title":"Fortanix DSM SaaS Global Availability Map","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cec839a2-3d31-4867-ab67-fe727d854a35","order":7,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"scalability","title":"Scalability","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d9102cc1-046e-4703-ae2d-07a98715206c","order":8,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-architecture","title":"Fortanix DSM SaaS Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88e3694b-2139-4a6f-9060-8843263fb99d","order":9,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-support","title":"Fortanix Support","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1c18567-bd7e-40c4-9a33-d6448aa00c06","order":10,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-are-the-fortanix-dsm-saas-account-states","title":"What are the Fortanix DSM SaaS Account States?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47e6b72d-6ba8-492f-b8ad-76a3fb7f426d","order":11,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-is-the-lifecycle-of-a-fortanix-dsm-saas-trial-account","title":"What is the lifecycle of a Fortanix DSM SaaS Trial Account?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"338fd1d0-1a18-442c-87b3-402bf7d059bf","order":12,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-do-i-check-the-fortanix-dsm-saas-status-in-real-time","title":"How do I Check the Fortanix DSM SaaS Status in Real-time?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1cad39f-2ec2-435d-8bc6-b62ee804a1c0","order":13,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-homepage","title":"Fortanix DSM SaaS Homepage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"about-fortanix-dsm-saas","title":"About Fortanix DSM SaaS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"68cb16ce-e258-4716-ad03-04bbe04cb292","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ec78cf1a-95da-4363-a18a-bdb49c81971c","order":1,"documentationType":1,"children":[],"parentCategoryId":"68cb16ce-e258-4716-ad03-04bbe04cb292","slug":"fortanix-data-security-manager-quickstart","title":"Fortanix Data Security Manager - Quickstart","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"quickstart","title":"Quickstart","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7ebf8863-d216-4c02-b5da-814befbcb1bf","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a2ec0e3-9074-42d2-8af5-d8127e2a29c3","order":1,"documentationType":1,"children":[],"parentCategoryId":"7ebf8863-d216-4c02-b5da-814befbcb1bf","slug":"definitions","title":"Definitions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"overview-and-definitions","title":"Overview and Definitions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"39d0253b-d378-44c2-acd7-8196a27b54b3","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9907a655-633d-406b-8813-f4e1cc8ca0f8","order":31,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"58eba385-5877-40c0-bf84-6240c14dcd6f","order":1,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"reserve-static-ip-addresses","title":"Reserve Static IP Addresses","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3486f0f-58d6-4e1f-998f-e1cbbe5b7ceb","order":2,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"firewall-rules","title":"Firewall Rules","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"22d27836-9ba2-4488-85b7-6715e7894a63","order":3,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"define-hostnames","title":"Define Hostnames","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ba4aaf5b-9e12-489d-8767-37e96fc36fcd","order":4,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"identify-ntp-network-time-protocol-sources","title":"Identify NTP (Network Time Protocol) Sources","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","slug":"infrastructure","title":"Infrastructure","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ed8a5ec1-e8af-4759-b0ee-71bf48d40a0f","order":32,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7bfe67c4-4da5-44e7-adf4-632cde0f07ac","order":1,"documentationType":1,"children":[],"parentCategoryId":"ed8a5ec1-e8af-4759-b0ee-71bf48d40a0f","slug":"services-to-be-implemented","title":"Services to be Implemented","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","slug":"cluster-setup","title":"Cluster Setup","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"pre-installation","title":"Pre-Installation","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"979d08ce-c966-4148-8927-dffaf32bdae0","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","order":34,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"620200a0-e449-4bf6-a70e-8b7508815803","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aca3304b-c16f-497d-a7d5-eebb0d62722d","order":1,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-return-merchandise-authorization-rma-fx2200-process","title":"Fortanix Return Merchandise Authorization (RMA) FX2200 Process","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6714f829-5b8c-45f4-97fc-b03798b56f6e","order":2,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-setup-for-fx2200-series-i","title":"Fortanix IPMI Setup for FX2200 Series I","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0556ad97-e8de-4791-9a0d-d6e1e3e24f9a","order":3,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-data-security-manager-fx2200-hardware-guide","title":"Fortanix Data Security Manager FX2200 Hardware Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0cdd9b1a-361b-4b66-bc3b-1db0bbac65f1","order":4,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-setup-for-fx2200-series-ii","title":"Fortanix IPMI Setup for FX2200 Series II","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"743e3718-f63c-45d8-86b8-9d2a6efb69a1","order":5,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-ssl-certificate-renewal-for-fx2200-series-ii","title":"Fortanix IPMI SSL Certificate Renewal For FX2200 Series II","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2c43bc5-b2b9-4df0-801b-4ae8fda81ff2","order":6,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-data-security-manager-fx2200-console-port-db9-configuration-guide","title":"Fortanix Data Security Manager FX2200 - Console Port (DB9) Configuration Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"37cdf195-47ea-4af9-b30e-d3a8189f40d6","order":7,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-fx2200-series-ii-appliance-physical-security-guide","title":"Fortanix FX2200 Series II Appliance - Physical Security Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"hardware-guide","title":"Hardware Guide","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d7d9732e-83da-492f-b37b-49b83661686c","order":1,"documentationType":1,"children":[],"parentCategoryId":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","slug":"fortanix-data-security-manager-installation-guide-on-prem","title":"Fortanix Data Security Manager Installation Guide - On-Prem","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"401c5618-069c-4e3c-bd67-ab4663d6f6e8","order":2,"documentationType":1,"children":[],"parentCategoryId":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","slug":"fortanix-data-security-manager-fips-replication","title":"Fortanix Data Security Manager FIPS Replication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"fortanix-cluster-setup","title":"Cluster Setup","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"53227c80-ccee-449a-80a1-5bd98fbba856","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"35bf9167-7b3f-4b42-9c24-21a7b062b4ac","order":1,"documentationType":1,"children":[],"parentCategoryId":"53227c80-ccee-449a-80a1-5bd98fbba856","slug":"securing-fx2200-oob-management-ports","title":"Securing FX2200 OOB Management Ports","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"security-deploymentimplementationarchitecture","title":"Security (deployment/implementation/architecture)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"979d08ce-c966-4148-8927-dffaf32bdae0","slug":"fortanix-data-security-on-premises","title":"Fortanix Data Security Manager On-premises","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","order":37,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc212a6b-9a3a-4c1d-8bcb-a0052185de87","order":1,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-on-aws","title":"Fortanix Data Security Manager Installation on AWS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"afb5f1f4-4248-4cca-8947-4704c988da59","order":2,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-from-azure-marketplace","title":"Fortanix Data Security Manager Installation from Azure Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3bcde1d8-4c22-4b6a-812e-5eed9099ca81","order":3,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-on-vmware","title":"Fortanix Data Security Manager Installation on VMware","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"979d08ce-c966-4148-8927-dffaf32bdae0","slug":"fortanix-data-security-manager-cloud-publicprivate","title":"Fortanix Data Security Manager Cloud (Public/Private)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"deployment","title":"Deployment","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"820410be-9915-45bf-add4-e60daa4a0a0b","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9ad4892f-9eb8-4c8b-89b4-39c2b05139b9","order":1,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-authentication","title":"Fortanix Data Security Manager - Sysadmin Settings - Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e0745154-8eff-43c3-ba0b-366e026377dc","order":2,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-ip-policy","title":"Fortanix Data Security Manager - Sysadmin Settings - IP Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bdc0b500-50ea-430c-b07e-54705f90cecd","order":3,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-policies","title":"Fortanix Data Security Manager - Sysadmin Settings - Policies","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5ded81c2-26c3-494c-886a-c047ac35e380","order":4,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-interfaces","title":"Fortanix Data Security Manager - Sysadmin Settings - Interfaces","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0fea841e-8b67-4f9a-a70e-4ef794a24dee","order":5,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-email","title":"Fortanix Data Security Manager - Sysadmin Settings - Email","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"66343ff7-674c-4b36-8ba0-98ffe331dc71","order":6,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-frontend","title":"Fortanix Data Security Manager - Sysadmin Settings - Frontend","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"227a5e70-7c82-47d0-9ed0-5faf02d336bf","order":7,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-log-management","title":"Fortanix Data Security Manager - Sysadmin Settings - Log Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6850aeda-06b9-4084-b23b-efe1617e109f","order":8,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-enrollment-policy","title":"Fortanix Data Security Manager - Sysadmin Settings - Enrollment Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ef8b7d5a-fdc1-4e54-91fd-75a5ca83a844","order":9,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-customization","title":"Fortanix Data Security Manager - Sysadmin Settings - Customization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb93029e-26e9-402f-ae84-e568c3a26f70","order":10,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-delete-users-and-accounts","title":"Fortanix Data Security Manager - Sysadmin - Delete Users and Accounts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"system-administration-settings","title":"System Administration Settings","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"99d63564-7634-4e10-95f9-2803cbd2f0f0","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"65cbe4cc-8c79-41c3-a548-6d05fadf2392","order":1,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"fortanix-data-security-manager-monitoring-and-alerting-solution","title":"Fortanix Data Security Manager Monitoring and Alerting Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"78e0acdb-eb43-4fc1-ba87-b6264ff5c7b2","order":2,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"splunk-integration-with-sensu-server","title":"Splunk Integration with Sensu Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"80c8f615-c95b-4002-a79e-1ec2e4106fe1","order":3,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"okta-integration-with-sensu-server","title":"Okta Integration with Sensu Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ebe32440-7db7-4680-ba2c-376fcef391f8","order":4,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"fortanix-data-security-manager-upgrade-prechecks-using-sensu-automated","title":"Fortanix Data Security Manager Upgrade Prechecks Using Sensu - Automated","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"monitoring-and-alerting","title":"Monitoring and Alerting","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e7c349fc-1435-4df8-982a-0cfb68c97250","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8acc6cf0-8ab3-4710-9e07-7fa366ddbec7","order":1,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"introduction-to-fortanix-dsm-backup-and-restore","title":"Introduction to Fortanix DSM Backup and Restore","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3446e3f-8b4c-42e9-87a6-6c45526cf6ad","order":2,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-password-based-backup-and-restore-using-scp-sgx","title":"Fortanix DSM Password-Based Backup and Restore Using SCP - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7b6f8e18-dcbe-4c8e-adf1-1e9fdd6deaf2","order":3,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-passwordless-based-backup-and-restore-using-scp-sgx","title":"Fortanix DSM Passwordless-Based Backup and Restore Using SCP - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"86bf06b7-c1c6-4efd-9cc8-1c99c1ce9f9a","order":4,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-aws-s3-bucket-sgx","title":"Fortanix DSM Backup and Restore for AWS S3 Bucket - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"007e34ce-933c-405c-8fb6-5933eced0457","order":5,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-azure-blob-storage-sgx","title":"Fortanix DSM Backup and Restore for Azure Blob Storage - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb4565d0-9ca2-4594-b82e-3c511f694501","order":6,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-non-sgx","title":"Fortanix DSM Backup and Restore - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"182b4b25-7d8a-43c8-875b-d203b01de130","order":7,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-cdk-non-sgx","title":"Fortanix DSM Backup and Restore for CDK - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a7da75c6-42da-49a4-bea9-af069224d9be","order":8,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-for-audit-log","title":"Fortanix DSM Backup for Audit Log","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"backup-and-restore-manual","title":"Backup and Restore - Manual","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"092d755e-219b-48a0-a117-13b3d5896bb5","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"29e02bfd-fa12-4406-84ec-444cea181e59","order":1,"documentationType":1,"children":[],"parentCategoryId":"092d755e-219b-48a0-a117-13b3d5896bb5","slug":"fortanix-dsm-restoration-guide-automated","title":"Fortanix DSM Restoration Guide - Automated","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"restoration-using-script-automated","title":"Restoration Using Script - Automated","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c80242d2-d0dc-4353-8a78-5f40de497cfa","order":5,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-port-requirements","title":"Fortanix Data Security Manager Port Requirements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d06e7f5-8425-43d2-b43a-6ed48b2e6c65","order":6,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-cluster-recovery-best-practices","title":"Fortanix Data Security Manager Cluster Recovery Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"39988196-d2ec-498c-9d07-0bb67dbee7df","order":7,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-cluster-management-quick-reference","title":"Fortanix Data Security Manager Cluster Management Quick Reference","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c6fa1f6f-b026-486b-a8b6-964e2c5376ea","order":8,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-continuous-restoration","title":"Fortanix Data Security Manager Continuous Restoration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"476ecd39-e00d-4996-9643-c4206f2f7f36","order":9,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-read-only-mode-of-operation","title":"Fortanix Data Security Manager Read-Only Mode of Operation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"738dbb74-3525-42e4-8cb1-7664ac60ada2","order":10,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-data-center-labeling","title":"Fortanix Data Security Manager Data Center Labeling","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6888369-98f4-4f49-aaa0-6d90a3f769a1","order":11,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"cluster-deployment-key-protection-non-sgx","title":"Cluster Deployment Key Protection - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3297f40b-437b-4de6-874d-eeeea225cb00","order":12,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"cluster-master-key-rotation","title":"Cluster Master Key Rotation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"cluster-configuration-and-management","title":"Cluster Configuration and Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c2ad6465-f071-4cd4-ae87-ba1c7388bbf3","order":3,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-pre-upgrade-checks-manual","title":"Fortanix Data Security Manager Software Pre-Upgrade Checks - Manual","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1a6b4001-b255-4c3a-926b-d7fa721f5b22","order":4,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-upgrade","title":"Fortanix Data Security Manager Software Upgrade","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e7506ef8-8f44-4cfe-b185-e4e2b71b009a","order":5,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-post-upgrade-checks","title":"Fortanix Data Security Manager Software Post-Upgrade Checks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9806349a-306a-400c-8ee3-03d145d33594","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"67f004a6-f099-4805-b968-3673a59f0dc1","order":1,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-43-kubernetes-version-upgrade-to-114-k8s","title":"Fortanix Data Security Manager (Release 4.3) Kubernetes Version Upgrade to 1.14 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d01286a2-3d2b-4ccf-8942-72a96c5aa443","order":2,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-411-kubernetes-version-upgrade-to-119-k8s","title":"Fortanix Data Security Manager (Release 4.11) Kubernetes Version Upgrade to 1.19 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ac8008ce-312d-48e6-8ba2-1294ba5affda","order":3,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-415-kubernetes-version-upgrade-to-121-k8s","title":"Fortanix Data Security Manager (Release 4.15) Kubernetes Version Upgrade to 1.21 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"eb7c9adb-63ef-4f10-a7e8-7749253771e8","order":4,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-423-kubernetes-version-upgrade-to-127-k8s","title":"Fortanix Data Security Manager (Release 4.23) Kubernetes Version Upgrade to 1.27 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"321b00b3-ade9-47f0-ad16-c43b50c86d0e","order":5,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-431-kubernetes-version-upgrade-to-129-k8s","title":"Fortanix Data Security Manager (Release 4.31) Kubernetes Version Upgrade to 1.29 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c9f11cd-20ba-4bc1-93b0-c79b0dbf6e01","order":6,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-434-kubernetes-version-upgrade-to-130-k8s","title":"Fortanix Data Security Manager (Release 4.34) Kubernetes Version Upgrade to 1.30 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3c5697cb-00ac-4e35-8050-80627331fec5","order":7,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-52-kubernetes-version-upgrade-to-132-k8s","title":"Fortanix Data Security Manager (Release 5.2) Kubernetes Version Upgrade to 1.32 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"kubernetes-upgrade","title":"Fortanix DSM Kubernetes Upgrade","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"fortanix-data-security-manager-upgrade","title":"Fortanix Data Security Manager Upgrade","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"41cd4410-4eb7-4013-97f2-166d326dc607","order":1,"documentationType":1,"children":[],"parentCategoryId":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","slug":"fortanix-faqs-installupgradeadministration","title":"FAQs - Install/Upgrade/Administration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e8857a9d-1d6e-41a1-b4d7-089dec058eeb","order":2,"documentationType":1,"children":[],"parentCategoryId":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","slug":"how-to-check-fortanix-dsms-node-join-policy","title":"How to Check Fortanix DSM's Node Join Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"faqs-installupgradeadministration","title":"FAQs - Install/Upgrade/Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"setting-up-fortanix-dsm-system-administration-on-prem-only","title":"Setting Up Fortanix DSM - System Administration (on-prem only)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e54895e6-6f7a-4dab-82ea-d45c57f284f3","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d8ef83a7-ae17-4cfb-b70e-8c1d6f9ec554","order":1,"documentationType":1,"children":[],"parentCategoryId":"e54895e6-6f7a-4dab-82ea-d45c57f284f3","slug":"users-guide-sign-up-for-fortanix-data-security-manager-saas","title":"User's Guide: Sign Up for Fortanix Data Security Manager SaaS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"sign-up-for-fortanix-dsm-saas","title":"Sign Up for Fortanix DSM SaaS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4f6f671e-461c-4fea-b522-a09a15d2eadc","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9f9a930f-7eea-4688-b45b-d64409f64781","order":1,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-high-availability-concepts-on-prem-only","title":"Fortanix Data Security Manager High Availability Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7ece15e2-ddd7-4ec3-955c-311a6b774fef","order":2,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-cluster-attestation-guide-on-prem-only","title":"Fortanix Data Security Manager Cluster Attestation Guide (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"be00507b-283a-4150-9b61-eacd3616a416","order":3,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-deployment-options","title":"Fortanix Data Security Manager Deployment Options","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aade5591-3352-4f57-abae-28d79232fd38","order":1,"documentationType":1,"children":[],"parentCategoryId":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","slug":"fortanix-data-security-manager-architecture","title":"Fortanix Data Security Manager Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5f620c5f-ea69-4168-9625-675fcf2ef5a5","order":2,"documentationType":1,"children":[],"parentCategoryId":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","slug":"security-architecture-of-running-fortanix-dsm-in-a-non-sgx-virtual-environment-on-prem-only","title":"Security Architecture of Running Fortanix DSM in a non-SGX Virtual Environment (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"architecture-on-prem-only","title":"Architecture (on-prem only)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"concepts","title":"Concepts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"efe108a5-ec7c-4ced-b950-a258c16b7b41","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c5aaf9b-c05b-4e35-908f-3f1b2409804d","order":1,"documentationType":1,"children":[],"parentCategoryId":"efe108a5-ec7c-4ced-b950-a258c16b7b41","slug":"users-guide-inviting-a-user-to-fortanix-data-security-manager","title":"User's Guide: Inviting a User to Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"invite-a-user-to-fortanix-dsm","title":"Invite a User to Fortanix DSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc485f16-f29c-4eae-961e-f1fdc3245b19","order":1,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-getting-started-with-fortanix-data-security-manager-ui","title":"User's Guide: Getting Started with Fortanix Data Security Manager - UI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"800256f2-2a38-472e-85d6-fae73018de17","order":2,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-account-replication","title":"User's Guide: Account Replication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"53d9d597-c609-4b51-a90e-12529d17853e","order":3,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-custom-role","title":"User's Guide: Custom Role","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"fortanix-dsm-setting-up-the-account","title":"Fortanix DSM - Setting Up the Account","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"getting-started-with-fortanix-dsm","title":"Getting Started with Fortanix DSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8c5663cf-6346-4f16-b984-d8cc19cfe91a","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9a1036ba-5a2d-4e5f-83e9-cd2fbee429e0","order":1,"documentationType":1,"children":[],"parentCategoryId":"8c5663cf-6346-4f16-b984-d8cc19cfe91a","slug":"users-guide-logging","title":"User's Guide: Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"log-management","title":"Log Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a59ce090-d9ca-4c51-aa05-4919ff6360e9","order":1,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-quorum-policy","title":"User's Guide: Account Quorum Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d6180df-5fe6-49d5-9792-d043ced6e352","order":2,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-cryptographic-policy","title":"User's Guide: Account Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f74f114f-cf57-4ef7-9e40-71bb478bbc3a","order":3,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-key-metadata-policy","title":"User's Guide: Account Key Metadata Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"security-and-audit-control","title":"Security and Audit Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"05610a26-f773-47db-a0b8-0387935895ee","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c8b735c-cbf0-49d3-9c5e-8e80d4343efd","order":1,"documentationType":1,"children":[],"parentCategoryId":"05610a26-f773-47db-a0b8-0387935895ee","slug":"users-guide-account-client-configurations","title":"User's Guide: Account Client Configurations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"client-configurations","title":"Client Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3d6be27e-a54b-4a1f-a4fe-110744ad4c36","order":4,"documentationType":1,"children":[],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"users-guide-account-customization","title":"User's Guide: Account Customization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4d6c6b7c-0697-4bbc-8b5c-712bcd7e105e","order":5,"documentationType":1,"children":[],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"fortanix-data-security-manager-sysadmin-settings-alert-management","title":"User's Guide: Alert Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"account-level-configurations","title":"Account-Level Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2608dd35-dfdc-4abc-be1b-90263f68cd64","order":1,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-group-quorum-policy","title":"User's Guide: Group Quorum Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ef6e180-2e44-4b50-a517-929296699e26","order":2,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-key-metadata-policy","title":"User's Guide: Group Key Metadata Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"09f7cc28-a061-413b-9500-d49a978ad66d","order":3,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-group-cryptographic-policy","title":"User's Guide: Group Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"fortanix-security-and-audit-control","title":"Security and Audit Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8e69262b-1c4d-44a6-91d7-50b3a1f16a46","order":1,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-key-components","title":"User's Guide: Key Components","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2d2185eb-8a30-4b7c-9d37-d45e9d9607dd","order":2,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-group-key-encryption-key","title":"User's Guide: Group Key Encryption Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a93d36f7-03d7-47ee-8672-050347673324","order":3,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-key-undo-policy","title":"User's Guide: Key Undo Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"key-management","title":"Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"7e29c55d-1475-49c2-95fe-48d7e03498b9","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b5e3efa-9b32-43d7-8957-c680dae8f28d","order":1,"documentationType":1,"children":[],"parentCategoryId":"7e29c55d-1475-49c2-95fe-48d7e03498b9","slug":"users-guide-group-client-configurations","title":"User's Guide: Group Client Configurations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"fortanix-client-configurations","title":"Client Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"group-level-configurations","title":"Group-Level Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0df90479-24df-4ce6-afca-7608d5d2a198","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b574589e-d7c5-44a2-afe1-d31ae367acc4","order":1,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-fortanix-data-security-manager-key-lifecycle-management","title":"User's Guide: Fortanix Data Security Manager Key Lifecycle Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0988458e-0a35-479c-85d9-c00a2dbdfc0d","order":2,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-export-key","title":"User's Guide: Export Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"58947b09-1185-4ea6-9867-a49f729ce73f","order":3,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-data-export","title":"User's Guide: Data Export","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"435a1aa9-d1eb-4509-aaab-788f4dfabfcf","order":4,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-copy-key","title":"User's Guide: Copy Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"800817c0-0e92-4c1e-ba69-96c66bb4c584","order":5,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-key-move","title":"User's Guide: Key Move","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8f6c4d0-b997-448b-a6da-8ba1c5b0bb83","order":6,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-export-policy","title":"User's Guide: Export Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"key-management-service","title":"Key Management Service","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"31a9274a-ad74-4dcf-abb5-32480901e053","order":1,"documentationType":1,"children":[],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"could-data-control-feature-comparison-matrix","title":"Cloud Data Control - Feature Comparison Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a4217518-e12e-4ce8-9f74-0c776bf52e5a","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"06c4334b-3ece-40a7-8347-7f99d937ce76","order":1,"documentationType":1,"children":[],"parentCategoryId":"a4217518-e12e-4ce8-9f74-0c776bf52e5a","slug":"fortanix-dsm-cloud-data-control-getting-started","title":"Fortanix DSM - Cloud Data Control - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"cloud-data-control-getting-started","title":"Cloud Data Control - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"37aeafca-00ff-4bd0-a4ff-0e8fd1fdd791","order":1,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-key-management-service-cdc-group-setup","title":"Fortanix DSM - AWS Key Management Service CDC Group Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"63fcbf2c-3f8e-4a84-9bbb-aeea328fd801","order":2,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-key-management-service-cdc-group-setup-using-easy-wizard","title":"Fortanix DSM - AWS Key Management Service CDC Group Setup - Using Easy Wizard","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1645af1c-516e-4e31-8d3e-92aac69d9600","order":3,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-cloud-native-key-management","title":"Fortanix DSM - AWS Cloud Native Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e1d2757-307b-4790-8256-65de9eae5889","order":4,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-kms-byok-bring-your-own-key","title":"Fortanix DSM - AWS KMS BYOK (Bring Your Own Key)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-aws-kms","title":"Fortanix DSM with AWS KMS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"89cf2fba-bcbc-417a-a2bf-4893534256ff","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8506ff1b-d9ba-4c46-aa72-1f26cbea6780","order":1,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-cdc-group-setup","title":"Fortanix DSM - Azure Key Vault CDC Group Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c37f9bd8-5730-4b02-bb50-9d5bc7e4775b","order":2,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-cloud-native-key-management","title":"Fortanix DSM - Azure Key Vault Cloud Native Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"24a47cb4-9605-4172-a286-0c2a0d04676d","order":3,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-byok-bring-your-own-key","title":"Fortanix DSM - Azure Key Vault BYOK (Bring Your Own Key)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-azure-key-vault","title":"Fortanix DSM with Azure Key Vault","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"972d9a07-3f1c-4d54-9e70-6867e97390c4","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"40d5f0ec-a549-4a51-b0d4-d8aa6bbc170e","order":1,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-fortanix-dsm-azure-managed-hsm-setup-guide","title":"Fortanix DSM - Azure Managed HSM Group Setup Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"995a0546-cba4-41b1-8064-34aa96b08182","order":2,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-azure-managed-hsm","title":"Fortanix DSM - Azure Managed HSM Cloud Native Key Management Service","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"994f4d61-87a5-427e-9107-18dc2939c007","order":3,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-fortanix-dsm-azure-managed-hsm-bring-your-own-keyguide","title":"Fortanix DSM - Azure Managed HSM BYOK (Bring Your Own Key Guide)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-azure-managed-hsm","title":"Fortanix DSM with Azure Managed HSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"71514718-a33a-41c0-919e-142f022d6a06","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8f027f3e-113f-48cd-b074-6f1f3fff0c8d","order":1,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"fortanix-data-security-manager-gcp-kms-keyring-setup-user-guide","title":"Fortanix Data Security Manager GCP KMS Keyring Setup User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7ca4f9b6-64e0-4be4-88f4-00dea13d0fbf","order":2,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"fortanix-data-security-manager-gcp-kms-cnkms-keyring-setup-user-guide","title":"Fortanix Data Security Manager GCP KMS Cloud Native Key Management User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e1dd178b-c064-46e0-bda3-2a6773c8dced","order":3,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"users-guide-google-cloud-kms","title":"Fortanix Data Security Manager GCP KMS Bring Your Own Key User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-google-cloud-kms","title":"Fortanix DSM with Google Cloud KMS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ec7fc978-e82a-4104-a27e-0afe0cee8576","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7a99adb-4350-46b9-9b65-24fc87820c96","order":1,"documentationType":1,"children":[],"parentCategoryId":"ec7fc978-e82a-4104-a27e-0afe0cee8576","slug":"manually-importing-fortanix-data-security-manager-keys-into-cloud-providers","title":"Manually Importing Fortanix Data Security Manager Keys into Cloud Providers","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"manual-cloud-key-management","title":"Manual Cloud Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"cloud-data-control","title":"Cloud Data Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"65506edd-d65d-4d5c-893d-38c40a4fc76f","order":1,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"extended-virtual-keys-concepts","title":"Extended Virtual Keys - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b39b33ee-0a66-422c-8b25-041c4b992886","order":2,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"users-guide-store-keys-externally-setup","title":"User's Guide: Store Keys Externally - Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93b7b877-f8f1-46f7-bb81-5f1193430e40","order":3,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"users-guide-store-keys-externally-key-management","title":"User's Guide: Store Keys Externally - Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"store-keys-externally-and-extended-virtual-keys","title":"Store Keys Externally and Extended Virtual Keys","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fde662a2-f9eb-44bd-a429-700c7caf807d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c1bf1b6a-428a-4212-810e-e915b26ce0b2","order":1,"documentationType":1,"children":[],"parentCategoryId":"fde662a2-f9eb-44bd-a429-700c7caf807d","slug":"users-guide-security-controls-for-fortanix-data-security-manager-applications","title":"User's Guide: Security Controls for Fortanix Data Security Manager Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"security-controls-for-fortanix-dsm-applications","title":"Security Controls for Fortanix DSM Applications","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d61c049d-f1f2-416e-b71e-3703fd3c2693","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","order":39,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6065d82c-e486-4372-b144-d0f81b3481d9","order":1,"documentationType":1,"children":[],"parentCategoryId":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","slug":"users-guide-authentication","title":"User's Guide: Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a6b12642-f3b0-41f9-affb-d4c740d4b5dc","order":1,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"users-guide-single-sign-on","title":"User's Guide: Single Sign-On","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00657ac8-1229-452c-8122-3fe0d8a4184f","order":2,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-ping-identity","title":"Using Fortanix Data Security Manager with Ping Identity","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6a585e39-7d20-4a69-b54c-6b9e8175d349","order":3,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-rsa-secure-id-access","title":"Using Fortanix Data Security Manager with RSA SecurID Access","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93c06ceb-240e-4312-9cd7-819c6f665b2a","order":4,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-sso-with-okta","title":"Using Fortanix Data Security Manager with Okta","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c3f5bd82-3a23-4108-badf-60cdbbe9b09c","order":5,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"users-guide-configuring-a-saml-provider-application-in-azure","title":"User's Guide: Configuring a SAML Provider Application in Azure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9463f1bf-eb92-4a25-a96f-3de1703801d6","order":6,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-forgerock-oauth-20","title":"Using Fortanix Data Security Manager with ForgeRock OAuth 2.0","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","slug":"single-sign-on","title":"Single Sign-On","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"d61c049d-f1f2-416e-b71e-3703fd3c2693","slug":"authentication","title":"Authentication","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b63f3165-5fe1-44b4-b1a8-9634be82e9aa","order":41,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6934675e-deba-4b4d-8558-df5037650ba2","order":1,"documentationType":1,"children":[],"parentCategoryId":"b63f3165-5fe1-44b4-b1a8-9634be82e9aa","slug":"users-guide-authorization","title":"User's Guide: Authorization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d61c049d-f1f2-416e-b71e-3703fd3c2693","slug":"authorization","title":"Authorization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"authentication-and-authorization","title":"Authentication and Authorization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"798e9043-e9fd-48bc-b9c2-e93b040e7ff8","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"603e8eb2-3265-4045-838f-838bf5af2f72","order":1,"documentationType":1,"children":[],"parentCategoryId":"798e9043-e9fd-48bc-b9c2-e93b040e7ff8","slug":"users-guide-usage-metrics","title":"User's Guide : Usage Metrics","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"dsm-usage-metrics","title":"DSM Usage Metrics","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e0320e4d-761b-4b53-90ec-ed3231aef0c5","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"205a3c2d-45a4-4454-a501-87f3f1c59852","order":1,"documentationType":1,"children":[],"parentCategoryId":"e0320e4d-761b-4b53-90ec-ed3231aef0c5","slug":"users-guide-hsm-gateway","title":"User's Guide: HSM Gateway","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"hsm-gateway-server","title":"HSM Gateway Server","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"fortanix-dsm-administration","title":"Fortanix DSM Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d687c192-f87f-4631-a96c-b0ce63896846","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ba1e2823-e0bd-42b0-8d45-31c31ee832c1","order":1,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-quickstart","title":"Security Objects Tokenization Quickstart","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e6f5482-f718-4020-a961-d49678391e0f","order":2,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"users-guide-tokenization","title":"User's Guide: Tokenization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99e80bdc-437b-41e3-a958-dc3e9edc85f6","order":3,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-examples","title":"Security Objects Tokenization Examples","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"22ccbe45-9b2f-4ff9-bea4-ff626840d6ad","order":4,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-best-practices","title":"Security Objects Tokenization Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-tokenization","title":"Tokenization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"033ca568-e1b1-4c87-bedd-6632a241d5cc","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"374081e1-646e-4c89-9d47-a0337742067e","order":1,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"users-guide-plugin-library","title":"User's Guide: Plugin Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f06af77e-947f-4002-810f-ca06ed5e35f9","order":2,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"plugins-getting-started","title":"Plugins - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"54c27d4f-e3f7-463c-88bf-fdaabb1c0d33","order":3,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"plugins-lua-programming-reference","title":"Plugins – Lua Programming Reference","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"plugin-library","title":"Plugin library","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"297c81e1-6ed4-445e-80c2-05c2ed169259","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b4fbdd7-766d-4ea4-aafe-97bb9f11e423","order":1,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-compatibility-matrix","title":"Clients: Compatibility Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64efc224-d7d6-4363-9c5e-dae11590afc5","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"da3eb785-645b-4488-bc5f-f73230d4aa6b","order":1,"documentationType":1,"children":[],"parentCategoryId":"64efc224-d7d6-4363-9c5e-dae11590afc5","slug":"clients-pkcs11-library","title":"Clients: PKCS#11 Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7cae51cd-cee5-4100-8cd6-5396b34b63e0","order":2,"documentationType":1,"children":[],"parentCategoryId":"64efc224-d7d6-4363-9c5e-dae11590afc5","slug":"pkcs11-supported-functions-and-mechanisms","title":"Clients: PKCS#11 Supported Functions and Mechanisms","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"pkcs11","title":"Clients: PKCS#11","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c8407ee0-57cc-474e-ba56-dc5f94057dbb","order":3,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-microsoft-cng-key-storage-provider","title":"Clients: Microsoft CNG Key Storage Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bc03f3a0-9a29-420d-ac4e-a8380b24dc79","order":4,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-java-cryptography-extension-jce-provider","title":"Clients: Java Cryptography Extension (JCE) Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d4749783-4238-4331-a8ad-ce821e41e17c","order":5,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-sequoia-pgp","title":"Clients: Sequoia-PGP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c4159b38-a958-4485-9880-dd24850cdb5a","order":6,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-terraform-provider","title":"Clients: Terraform Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"967b68b0-2927-484b-928e-6d44b5bed94f","order":7,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-command-line-interface-cli-for-fortanix-data-security-manager","title":"Clients: Command-Line Interface (CLI) for Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d683d41-6bc5-4558-9c7b-f84aad24ae21","order":8,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-sdks-for-rest-api","title":"Clients: SDKs for REST API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"clients","title":"Clients","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"20dab1cf-53cb-4cda-9da3-05e350b67943","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f4723bb3-b178-4a07-b398-a3b6c71e180b","order":1,"documentationType":1,"children":[],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-compatibility-matrix","title":"DSM Accelerator - Compatibility Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"10536081-39ca-498c-97f1-a85b497ecca5","order":2,"documentationType":1,"children":[],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-concepts","title":"DSM Accelerator - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b99f8271-aa76-4375-9920-ef5b2be7395a","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c1757c5-8f48-4844-91db-3e7f8b45c8e5","order":1,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-deployment-guide","title":"DSM-Accelerator Webservice Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"74726b67-0fd8-441e-a134-1d24a436dd3e","order":2,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-developer-guide","title":"DSM Accelerator Webservice Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3a5a7ce6-1ba6-4d5e-8e0d-2e992cc533c1","order":3,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-for-nitro-with-ccm-setup-guide","title":"DSM Accelerator Webservice for Nitro with CCM Setup Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b726352d-e668-43ee-9ec8-f842bc1cf374","order":4,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"deploying-dsm-accelerator-on-aws-lambda","title":"DSM Accelerator Deployment on AWS Lambda","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6509ae07-71db-4312-b274-643da4c7dbb2","order":5,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"fortanix-data-security-manager-accelerator-webservice-with-snowflake","title":"DSM Accelerator Webservice with Snowflake","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93aed4aa-63fb-4301-83e4-51d59adbd92d","order":6,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-external-logging","title":"DSM Accelerator Webservice - External Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-webservice","title":"DSM Accelerator Webservice","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"dbded0c8-b383-4082-8e8f-8810798317c5","order":1,"documentationType":1,"children":[],"parentCategoryId":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","slug":"dsm-accelerator-jce-provider-deployment-guide","title":"DSM Accelerator JCE Provider Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00f173b4-8d29-4a6b-9c5a-9ab458c3e210","order":2,"documentationType":1,"children":[],"parentCategoryId":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","slug":"dsm-accelerator-jce-provider-developer-guide","title":"DSM Accelerator JCE Provider Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-jce-provider","title":"DSM Accelerator JCE Provider","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"e9c53f6e-c43b-4072-bfc2-a467f7c5ca9a","order":1,"documentationType":1,"children":[],"parentCategoryId":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","slug":"dsm-accelerator-pkcs11-deployment-guide","title":"DSM Accelerator PKCS#11 Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c6487420-4063-40ae-85b9-4aca65230cbc","order":2,"documentationType":1,"children":[],"parentCategoryId":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","slug":"dsm-accelerator-pkcs11-developer-guide","title":"DSM Accelerator PKCS#11 Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-pkcs11","title":"DSM Accelerator PKCS#11","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"dsm-accelerator","title":"DSM Accelerator","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e5a58617-9db0-4d9d-a51c-40811717fe16","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"1340a313-8f0d-43f8-a6e0-150d41d61a52","order":1,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"introduction","title":"Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b54bf06c-5436-4336-8b6f-66e801cc96f5","order":2,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"create-a-group","title":"Create a Group","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"954c1506-912a-42b7-81b5-af02df4e1075","order":3,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"listing-all-security-objects","title":"Listing all Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ea8755c3-c3ba-4a04-a732-31a69ced8ccf","order":4,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"configure-api-client","title":"Configure API Client","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"35b13061-9bc3-4ea3-bb6f-515a4f2e8661","order":5,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"encryption","title":"Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e05fbf5f-9832-4f00-8791-136720d9c4bd","order":6,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"user-authentication","title":"User Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3281aada-6145-4ab7-9a06-5db2c62d79d2","order":7,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"add-quorum-approval-policy","title":"Add Quorum Approval Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9e2dd961-2db9-40ed-951d-d64ef05b0d97","order":8,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"details-of-security-object-by-uuid","title":"Details of Security Object by UUID","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"52307e72-214b-4e71-9034-0c98a1bd63a7","order":9,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"app-authentication-with-an-api-key","title":"App Authentication with an API Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0e0428b3-c8a1-4529-9c2e-26383a0d7725","order":10,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"decryption","title":"Decryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4e784639-7c4d-48ff-a8a6-e885e220eef0","order":11,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"update-quorum-approval-policy","title":"Update Quorum Approval Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bdfc71f0-592e-4cf9-82b2-dba5d70c8169","order":12,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"signature-generation","title":"Signature Generation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"43beebc6-1c8f-4e2a-a7e0-18df9c8dc7c4","order":13,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"details-of-security-object-by-name","title":"Details of Security Object by Name","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64ca0d7e-5351-4ff9-9f17-3bfeb327cf6d","order":14,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"app-authentication-with-client-certificate","title":"Application Authentication with Client Certificate","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"97b65beb-4f7f-461c-93e0-f0d98f305913","order":15,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"addupdate-cryptographic-policy","title":"Add/Update Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ad05dea-1c20-4f6e-81c1-55ae69a178b0","order":16,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"signature-verification","title":"Signature Verification","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c1e5f6d-a643-4236-8d06-debab816a771","order":17,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"creating-a-security-object","title":"Creating a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2f61578-69e2-41b4-b10d-2e5f15a0f081","order":18,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"importing-a-security-object","title":"Importing a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2722b36-fd1f-4c2c-ab21-7de1e0baa0ea","order":19,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"wrapping-a-key","title":"Wrapping a Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7a169999-a1ab-4aa5-8bc2-b80f7b602a87","order":20,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"unwrapping-a-key","title":"Unwrapping a Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6beec5d2-bdb7-48af-8faa-1ef091d736b2","order":21,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"exporting-a-security-object","title":"Exporting a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"32ba7659-d486-494f-a3cb-4d648cd475f7","order":22,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"generic-batch-operations","title":"Generic Batch Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"68367017-374a-49b3-995a-7670105f8419","order":23,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"specific-batch-operations","title":"Specific Batch Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"761a1952-3c2e-40d0-83bf-44d5097ab2ff","order":24,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"deleting-a-security-object","title":"Deleting a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"26a52e77-afe4-4279-93cc-75d007ad3328","order":25,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"log-out","title":"Log out","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"example-code","title":"Example Code","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b344162c-cce7-445f-ab3a-6b1fd91ddfc1","order":1,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"fortanix-data-security-manager-sdk-contents","title":"Fortanix Data Security Manager SDK Contents","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"36392b0d-ea9b-45ec-a396-fb69dd241047","order":2,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"client-api-basics","title":"Client API Basics","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"735b57de-e033-44fe-a32d-e3a91f42c47a","order":3,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"configure-api-client-and-client-authentication","title":"Configure API Client and Client Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ffeb7532-3359-4bba-a037-e005643d49c1","order":4,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"listing-security-objects","title":"Listing Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e89acd0b-0831-40f6-bd2b-c2d65f9a1593","order":5,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"generating-security-objects","title":"Generating Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c1469ed-0ec6-4427-b290-a48aca7afb1d","order":6,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"wrapping-security-objects","title":"Wrapping Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f626e13-d20d-48a0-b3f8-4ad608723fec","order":7,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"unwrapping-security-objects","title":"Unwrapping Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6365df25-dad3-4904-bec6-e3d3cb9ca266","order":8,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"deriving-security-objects","title":"Deriving Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7632b15b-e00c-4798-a1e7-6edc28614cbc","order":9,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"importing-security-objects","title":"Importing Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a4f43251-0305-4f69-b2eb-d8af086edb54","order":10,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"updating-security-objects","title":"Updating Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7c5a0772-fd71-4df9-ae53-bbbdd8e39323","order":11,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"deleting-security-objects","title":"Deleting Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"50dec9e0-9bd5-4b83-904c-f995e0fd3beb","order":12,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"symmetric-cryptography","title":"Symmetric Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2240fbd-f1a3-4b9c-9fc2-dc4ab56227ec","order":13,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"message-digests","title":"Message Digests","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6794fe9a-4f30-4897-9054-d321e4c703de","order":14,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"message-authentication-codes","title":"Message Authentication Codes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d13769b8-4267-48ed-9445-7ce74f2c62d1","order":15,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"public-key-cryptography","title":"Public Key Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4efbbcb4-a35d-4843-bc78-8ad0ec551f46","order":16,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"public-key-signing-and-verification","title":"Public Key Signing and Verification","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c896b54-9cad-4307-9a97-9c68b8443295","order":17,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"batch-cryptography","title":"Batch Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e43a6b20-f7b7-42fa-958e-106101482319","order":18,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"x-request-id","title":"X-Request-ID","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-data-security-manager-sdk-for-java","title":"Fortanix Data Security Manager SDK for Java","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"97477383-05c5-4972-b956-6eaa7193936f","order":7,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-authentication-app-and-user","title":"Authentication - App and User","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b5321ea0-3b5e-44b3-81ae-476d92175539","order":8,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-authorization-user","title":"Authorization - User","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"30a03738-058a-469e-b5c3-52458b2b419a","order":9,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"key-operations","title":"Key Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f6195dc-b2e8-4d91-b027-20e5f6c45162","order":10,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"filtering-security-objects-using-fortanix-dsm-rest-api","title":"Filtering Security Objects Using Fortanix DSM REST API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"237cb0f9-c18c-4e5b-a10b-608402ef21cb","order":11,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"using-opaque-and-secret-objects","title":"Using Opaque and Secret Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"27f8b5c8-1449-48a7-99ac-1e71a151f061","order":12,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"algorithm-support","title":"Algorithm Support","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c048b6fb-99ae-4ef3-98ca-f8dc2b6d98c6","order":13,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"algorithm-support-strict-fips-mode","title":"Algorithm Support - Strict FIPS Mode","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ebc0ad22-e4dd-4279-815e-9b72d6f77cd1","order":14,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"list-of-third-party-software-installed","title":"List of Third-Party Software Installed","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"developer-guide-developer-operations","title":"Developer Guide - Developer Operations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"cb5c9616-7768-432a-a272-c754e2b4308d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4bc2b4f9-8f6b-4374-a6eb-c50c638f7988","order":1,"documentationType":1,"children":[],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"fortanix-dsm-integrations-and-use-cases-matrix","title":"Fortanix DSM - Integrations and Use-cases Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"77195e79-4095-4797-af66-02c9f7016cc7","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"eedc6efc-7aff-489b-83c5-37e0d00cb077","order":1,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-introduction","title":"Filesystem Encryption for Linux - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bd805d9f-c882-4369-96b9-48fd73ad9fec","order":2,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-concepts","title":"Filesystem Encryption for Linux - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"db44fdb8-ebb4-499e-9067-d03f6bc5bb35","order":3,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-using-fortanix-data-security-manager-setup-and-usage","title":"Filesystem Encryption for Linux Using Fortanix Data Security Manager - Setup and Usage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-linux","title":"Filesystem Encryption for Linux","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"9a8be1a5-6072-48c1-af7f-53418d6639bc","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"60d05359-ebe9-4e2b-aaf6-98eea56bfa56","order":1,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-introduction","title":"Filesystem Encryption for Windows - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2782c4b5-22aa-4998-ac6c-d2fb913e4ea4","order":2,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-concepts","title":"Filesystem Encryption for Windows as a Service - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"97ee8b68-0038-4f1e-bf1f-1269a34747a1","order":3,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-using-fortanix-data-security-manager-setup-and-usage","title":"Filesystem Encryption for Windows as a Service Using Fortanix Data Security Manager - Setup and Usage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-windows","title":"Filesystem Encryption for Windows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"957669ac-53be-4e77-87e2-0f39a815d276","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"eafba5c5-5238-48b3-96e2-b738151c0a0f","order":1,"documentationType":1,"children":[],"parentCategoryId":"957669ac-53be-4e77-87e2-0f39a815d276","slug":"using-fortanix-data-security-manager-with-couchbase-filesystem-encryption","title":"Filesystem Encryption for Couchbase Using Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-database","title":"Filesystem Encryption for Databases","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f630f4f6-0959-4253-9c02-603c4d11d0f3","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6b30383d-108a-4fa5-8021-edee469e528a","order":1,"documentationType":1,"children":[],"parentCategoryId":"f630f4f6-0959-4253-9c02-603c4d11d0f3","slug":"filesystem-encryption-for-nutanix","title":"Filesystem Encryption for Nutanix Using Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-virtual-machines","title":"Filesystem Encryption for Virtual Machines","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"filesystem-encryption","title":"Filesystem Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"14925bae-bbb4-40b9-896b-514af3dca0d0","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"51a305d7-9576-45d6-98b5-7fdf54518171","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a3a1d793-c076-45dd-bcaf-3d90d35a4c15","order":1,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"using-fortanix-data-security-manager-with-oracle-tde-introduction","title":"Using Fortanix Data Security Manager with Oracle TDE - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1f75b048-8e0c-4aac-85d2-829f90b638e7","order":2,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"fortanix-using-fortanix-data-security-manager-with-oracle-tde","title":"Using Fortanix Data Security Manager with Oracle TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"06af913c-717d-4434-b490-46e3672574a2","order":3,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"using-fortanix-data-security-manager-with-oracle-tde-advanced-integration","title":"Using Fortanix Data Security Manager with Oracle TDE - Advanced","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ada9d40d-4f94-45d4-b0a3-6c6a7e563674","order":4,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"fortanix-data-security-manager-with-oracle-tde-best-practices","title":"Using Fortanix Data Security Manager with Oracle TDE - Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"40190f63-e34e-4146-968a-8c7dca149622","order":5,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"migrating-non-container-oracle-database-to-container-oracle-database","title":"Migrating Non-Container Oracle Database to Container Oracle Database","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-oracle-tde","title":"Using Fortanix Data Security Manager with Oracle TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"5db797b2-fee0-4bb4-8e96-5e79bd548407","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ba54b12c-f767-4f44-b0ba-66b497c4665c","order":1,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-introduction","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4015ae70-fa66-4078-9605-5d214c08880f","order":2,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-before-you-begin","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Before You Begin","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"feff4019-0be2-4e55-aef0-48da10aa8303","order":3,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-standalone-server","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Standalone Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"45809849-d385-41c5-a589-d5635fa75441","order":4,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-key-rotation","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Key Rotation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"552994f0-5239-48ab-9d93-5fc63a847ec6","order":5,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-always-on-group-aog","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Always On Availability Group (AG)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dfec2867-66ed-44b6-8d31-f7659c8a96b3","order":6,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-backup-restore","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Backup & Restore","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"61b54ad9-6981-40f3-a230-d3b73afc64c9","order":7,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-advanced","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Advanced","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9eeee61e-3885-452f-b698-4528c52d34e4","order":8,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"fortanix-data-security-manager-with-microsoft-sql-server-always-encrypted","title":"Fortanix Data Security Manager with Microsoft SQL Server - Always Encrypted","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a902df42-9fd7-4daf-962d-a0ebcea5e260","order":9,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"using-fortanix-data-security-manager-with-mssql-server-tde-mirror-database","title":"Fortanix Data Security Manager with MSSQL Server TDE - Mirror Database","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f6bc85d7-6723-4b10-8bc3-be788bc19360","order":10,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"migrating-mssql-server-tde-keys-from-local-environment-to-fortanix-dsm","title":"Migrating MSSQL Server TDE Keys from Local Environment to Fortanix DSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"60f6cfd9-847a-47e7-a0f2-f7079f782567","order":11,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"microsoft-sql-tde-automation-deployment-and-key-rotation","title":"Automating Microsoft SQL TDE with Fortanix DSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-microsoft-sql-server-tde","title":"Using Fortanix Data Security Manager with Microsoft SQL Server TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"58f8f8f5-2d92-477a-9a7a-17423a02022d","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c72c41f4-0600-4d61-9496-0c186134fd32","order":1,"documentationType":1,"children":[],"parentCategoryId":"58f8f8f5-2d92-477a-9a7a-17423a02022d","slug":"fortanix-using-fortanix-data-security-manager-with-cassandra-tde","title":"Using Fortanix Data Security Manager with Cassandra TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-cassandra-tde","title":"Using Fortanix Data Security Manager with Cassandra TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"61591bcc-0758-443b-a128-6b59dc354fc1","order":4,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-intersystems-cache-using-kmip","title":"Using Fortanix Data Security Manager for InterSystems Cache using KMIP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7eb5ca53-f1e8-4abf-bb2c-19aa46faef6a","order":5,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-ibm-db2","title":"Using Fortanix Data Security Manager with IBM Db2","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f4f34917-bb36-49b2-b026-193b767b7ba0","order":6,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-data-security-manager-with-oracle-key-vault","title":"Using Data Security Manager With Oracle Key Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4450dfce-4c13-41e9-9e82-88f989f3104c","order":7,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux","title":"Using Fortanix Data Security Manager for MongoDB Encryption at Rest - Linux","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9db36e79-4ad5-4e96-a462-cbd6d7e08fd3","order":8,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest","title":"Using Fortanix Data Security Manager for Percona MySQL Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b709cdba-8744-4cca-b5ec-d920b42ff392","order":9,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mysql-encryption-at-rest","title":"Using Fortanix Data Security Manager for MySQL Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e51d89a1-2c8e-425a-95d6-635e3de45a20","order":10,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-ibm-informix","title":"Using Fortanix Data Security Manager with IBM Informix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5b7cb8c1-7180-4506-befb-53e5693bdd39","order":11,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mariadb-encryption-at-rest","title":"Using Fortanix Data Security Manager for MariaDB Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fa011950-9f12-4ac8-9664-d37fea99f261","order":12,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-mongodb-encryption-at-rest-windows","title":"Using Fortanix Data Security Manager with MongoDB Encryption at Rest - Windows","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"587a219c-cc4a-4c3b-9b20-eb5ed450f26f","order":13,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-edb-postgres-for-tde","title":"Using Fortanix Data Security Manager with EDB Postgres for TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"84bba412-c4dc-4a66-a6de-0919d4f38bd1","order":14,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-data-security-manager-for-mongodb-client-side-field-level-encryption","title":"Using Fortanix Data Security Manager for MongoDB Client-Side Field-Level Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"transparent-data-encryption","title":"Transparent Data Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"34c3f4bf-3bd6-4057-aaac-81846b8f865b","order":2,"documentationType":1,"children":[],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"using-fortanix-data-security-manager-with-servicenow","title":"Using Fortanix Data Security Manager with ServiceNow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d683390-3a49-4d0b-851c-354d7508c49b","order":3,"documentationType":1,"children":[],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-primera-a630","title":"Using Fortanix Data Security Manager for Hewlett Packard Enterprise (HPE) Primera A630","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"database-encryption","title":"Database Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a711b857-a52e-42a4-9765-428f25568bf5","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b6b72ca7-9281-42ec-b3e0-d3125500746f","order":1,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"using-fortanix-data-security-manager-with-google-cloud-ekm-interface","title":"Using Fortanix Data Security Manager with Google Cloud EKM Interface","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4024ae53-920a-4bcf-9700-e369aa2dee01","order":2,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-best-practices-and-faq","title":"Fortanix Data Security Manager with Google Cloud EKM - Best Practices and FAQ","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2d976d73-b09c-4de3-b905-d0184c6cf001","order":3,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-support-model","title":"Fortanix Data Security Manager with Google Cloud EKM - Support Model","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"46afcb19-06d5-46ae-9ea9-159e4e9d8e63","order":4,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"using-fortanix-dsm-for-google-workspace-client-side-encryption","title":"Using Fortanix DSM for Google Workspace Client-Side Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1e20cc5a-60f1-4a28-9312-cd58b021a4a5","order":5,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-interface-using-virtual-private-cloud","title":"Fortanix Data Security Manager with Google Cloud EKM Interface Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"68f83c41-b1b2-4ac4-a546-7ff4e50f3992","order":6,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-control-plane-using-virtual-private-cloud","title":"Fortanix Data Security Manager with Google Control Plane Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ec08ad5e-1ff2-4e4c-b490-69e21dfd4c2c","order":7,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-google-cloud","title":"Exporting Fortanix Data Security Manager keys to Cloud Providers for BYOK - Google Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe4ef917-04c2-4ff2-95fe-203b8ade32bc","order":8,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-aws-key-management-service-for-byok","title":"Fortanix Data Security Manager with AWS Key Management Service for BYOK","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"875aa39d-a7a0-456d-bf3a-74e358de8054","order":9,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-using-zoho","title":"Fortanix Data Security Manager using Zoho","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7b041aa-0436-47ff-849e-990657b87ec8","order":1,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"fortanix-dsm-with-aws-external-key-store-xks-concepts","title":"Fortanix DSM with AWS External Key Store (XKS) - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8d1572ee-e2cf-49f9-a335-bcff748c0dba","order":2,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"using-fortanix-dsm-with-aws-external-key-store-xks","title":"Using Fortanix Data Security Manager with AWS External Key Store (XKS)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"39a22601-1ff3-4219-b730-f522765d1f2f","order":3,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"data-security-manager-with-amazon-xks-using-virtual-private-cloud","title":"Using Fortanix Data Security Manager with Amazon XKS Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-dsm-with-aws-external-key-store-xks","title":"Fortanix DSM with AWS External Key Store (XKS)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4909f66e-895f-4303-bfcf-6b03c1a3105d","order":11,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-azure-key-vault-for-byok","title":"Fortanix Data Security Manager with Azure Key Vault for BYOK","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ba69630-7864-4b16-8ce9-778cbde9fba9","order":12,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce","title":"Exporting Fortanix Data Security Manager Keys to Cloud Providers for BYOK - Salesforce","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d757a32-b98f-4640-b0dd-782a324ae411","order":13,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce-using-cache-only-keys","title":"Exporting Fortanix Data Security Manager keys to Cloud Providers for BYOK - Salesforce (Using Cache-Only Keys)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4ce7364b-479a-4a1a-b36f-1e282380e4a4","order":14,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-dsm-keys-to-cloud-providers-for-byok-alibaba","title":"Exporting DSM keys to Cloud Providers for BYOK - Alibaba","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"aade4a5d-3d08-461b-8ec7-efd7266263cd","order":15,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-double-key-encryption-for-microsoft-365","title":"Fortanix Data Security Manager with Double Key Encryption for Microsoft 365","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3fc5992-416d-438f-8363-dabd18f91233","order":17,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-dsm-with-sap","title":"Fortanix DSM with SAP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"cloud-key-management-byok","title":"Cloud Key Management / BYOK","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"18d917bb-71a3-4467-8d57-ab261f0258f5","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"12300bce-b4f7-4b1a-947f-c742360557e6","order":1,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-data-security-manager-with-idcentral-key-management","title":"Using Data Security Manager with IDcentral Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a9e10432-b014-4fc0-8506-7facd396c30c","order":2,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-for-secrets-injection-in-kubernetes","title":"Using Fortanix Data Security Manager for Secrets Injection in Kubernetes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ba42720f-d313-4fee-a3a2-7707f4b2e6e9","order":3,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-cyberark-enterprise-password-vault","title":"Using Fortanix Data Security Manager with CyberArk Enterprise Password Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d5089173-ea81-4f62-ac1f-4bf5c5de6ec6","order":4,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-cortex-xsoar","title":"Using Fortanix Data Security Manager with Cortex XSOAR","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"636bb35b-7e2c-4c9d-9205-108f710a5cc1","order":5,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-gitlab","title":"Using Fortanix Data Security Manager with GitLab","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f7ec1366-8305-41b1-832e-45e8b25ac1f5","order":6,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-hashicorp-vault-enterprise","title":"Using Fortanix Data Security Manager with HashiCorp Vault Enterprise","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"02f8f334-75de-4906-9f5e-c9e4fd2a6e32","order":7,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-for-encrypting-kubernetes-secrets-stored-in-etcd","title":"Using Fortanix Data Security Manager for Encrypting Kubernetes Secrets Stored in etcd","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"588410af-c631-43a5-9806-2d0942925416","order":8,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-beyondtrust-password-safe","title":"Using Fortanix Data Security Manager with BeyondTrust Password Safe","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2013e79-d723-4cb4-b243-1a88435cba35","order":9,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-using-delinea-secret-server","title":"Fortanix Data Security Manager Using Delinea Secret Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f3657122-c0c3-438e-af3d-dc37556fbaf7","order":10,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-ansible-lookup-plugin","title":"Using Fortanix Data Security Manager with Ansible Lookup Plugin","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62c4e8ea-4459-4ec3-8274-fa640e4f6750","order":11,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-jenkins-plugin-library","title":"Fortanix Data Security Manager Jenkins Plugin Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4bb23154-ff65-467f-98c8-87d7cfc254aa","order":12,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-versasec","title":"Using Fortanix Data Security Manager with Versasec","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a8708f8c-5e4f-47ea-a234-29d2dfa9275b","order":13,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-using-secret-store-csi-driver","title":"Fortanix Data Security Manager Using Secret Store CSI Driver","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"secrets-management","title":"Secrets Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2164867c-d440-4a29-a4ce-ac9b9a759887","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5e88bc0c-9d39-440b-a1e7-8beffbde237c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-to-secure-servers-and-client-keys","title":"Using Fortanix Data Security Manager to Secure Servers and Client Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"13dc0cfe-cefe-4b32-8fc7-3f75cf488269","order":2,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"generating-certificates-using-a-fortanix-data-security-manager-key","title":"Generating Certificates using a Fortanix Data Security Manager Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1d30be3-a39d-4725-b626-831d9ec4673c","order":3,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"migrating-private-key-from-microsoft-ad-cs-certificate-authority-to-fortanix-data-security-manager","title":"Migrating Private Key from Microsoft AD CS Certificate Authority to Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b613d8c0-0689-49b2-a9ec-6c76d428ce15","order":4,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-appviewx-on-premises","title":"Using Fortanix Data Security Manager With AppViewX On-Premises","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cdfa9dcc-357c-4e95-ab73-03eb1d98de39","order":5,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-venafi-keyless-tls","title":"Using Fortanix Data Security Manager with Venafi - Keyless TLS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f777b0da-8fe0-47c8-a6f6-3806f0ebf03f","order":6,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-keyfactor-iis-orchestrator","title":"Using Fortanix Data Security Manager with Keyfactor IIS Orchestrator","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4d511f66-8485-442d-8f0d-c89025e4b11f","order":7,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-microsoft-pki","title":"Using Fortanix Data Security Manager with Microsoft PKI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe0cd84d-c312-46a5-8262-2a2931c8643c","order":8,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey","title":"Using Fortanix Data Security Manager with Keyfactor EJBCA (Primekey)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a95677cf-7bb8-4301-916f-305ce35ccc18","order":9,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-appviewx-clmaas","title":"Using Fortanix Data Security Manager With AppViewX CLMaaS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"012b3da2-18cf-4a7f-9992-42b51b1e899b","order":10,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-venafi-hsm","title":"Using Fortanix Data Security Manager with Venafi - HSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ee901223-210e-4d19-873d-2f54429ff290","order":11,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-manager-with-nexus-certificate-manager","title":"Using Fortanix Data Manager with Nexus Certificate Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"856c2946-3f1c-43db-913c-aface8cc7e8a","order":12,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-microsoft-network-device-enrollment-service","title":"Using Fortanix Data Security Manager with Microsoft Network Device Enrollment Service","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"certificate-management","title":"Certificate Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0500104a-28fd-489f-a24f-58deaf445b22","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"1971b0b0-459e-4eb4-b60a-493b138535a5","order":1,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-with-vmware-cloud-director-encryption-management","title":"Using Fortanix Data Security Manager with VMware Cloud Director Encryption Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"722a0a05-abe8-4fc3-8678-be377a91c02f","order":2,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-for-vmware-cloud-director","title":"Using Fortanix Data Security Manager for VMware Cloud Director","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"799acc4b-bb72-4466-90b8-ebaf8d36232a","order":3,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-for-vmware-encryption-on-gcp","title":"Using Fortanix Data Security Manager For VMware Encryption on GCP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f3a13dd-f8d2-445a-a253-9769dca19dfd","order":4,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments","title":"Using Fortanix Data Security Manager as a KMS to Secure VMware Virtual Environments","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"vmware-encryption-and-key-management","title":"VMware Encryption and Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"516e442e-34d4-4695-bf31-6145c7ef2d43","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"019c6c0f-20bf-4040-b4ff-8cb9e3352297","order":1,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-with-microsoft-iis-integration-guide","title":"Using Fortanix Data Security Manager with Microsoft IIS Integration Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc35afd6-01ae-462a-b99e-c3826a6a0f87","order":2,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-nginx-and-apache-tls-keys","title":"Using Fortanix Data Security Manager for NGINX and Apache TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c61a8cec-fba3-4004-b585-74a4ff8c9684","order":3,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"managing-fortanix-data-security-manager-keys-with-openssl-and-pkcs11-tool","title":"Managing Fortanix Data Security Manager Keys With OpenSSL and PKCS#11 Tool","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4a41afa7-0a11-4def-8206-56e200212537","order":4,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-apache-web-server-tls-keys","title":"Using Fortanix Data Security Manager for Apache Web Server TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"159cb9ff-fa1d-4be6-8625-e2f4b341f810","order":6,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"mutual-transport-layer-security-using-fortanix-data-security-manager-on-prem-only","title":"Mutual Transport Layer Security using Fortanix Data Security Manager (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"28d8a8ef-2a1a-47a1-8403-330a30329f64","order":7,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-nginx-tls-keys","title":"Using Fortanix Data Security Manager for NGINX TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"ssltls-encryption-and-key-management","title":"SSL/TLS Encryption and Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"cd743a1a-2b33-4410-84f5-df5a177cf43c","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7bdff10-bb2e-4b0f-b571-1a9bc471e937","order":2,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-shardsecure","title":"Using Fortanix Data Security Manager with ShardSecure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d1cc998d-926b-43c0-ae52-99884fa2a129","order":3,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-nutanix","title":"Using Fortanix Data Security Manager With Nutanix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"988cf633-a77c-4d59-a82d-c031986ac280","order":4,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-block-storage-encryption-on-linux-servers","title":"Using Fortanix Data Security Manager for Block Storage Encryption on Linux Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0d0040be-52ba-4c99-aaec-66562c31394d","order":5,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-commvault","title":"Using Fortanix Data Security Manager with Commvault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3b85fd3-7c0f-4a9c-a7ab-bd5d9414a012","order":6,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-veritas-netbackup","title":"Using Fortanix Data Security Manager with Veritas NetBackup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3b07ada1-7b79-4fd0-84e1-856a3546aac4","order":7,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-veeam-backup-encryption","title":"Using Fortanix Data Security Manager for Veeam Backup Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2cf64a88-1685-4ec8-bbe7-fbced998780a","order":8,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-bloombase-storesafe","title":"Using Fortanix Data Security Manager with Bloombase Storesafe","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"453a367a-4f1e-460e-b5a7-b2fd14c5210b","order":9,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-as-external-kmip-in-rubrik","title":"Using Fortanix Data Security Manager as External KMIP in Rubrik","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dd68b62b-89e3-4b95-a49c-fe8c96cdc00d","order":10,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-minio-kes-server","title":"Using Fortanix Data Security Manager with MinIO (KES Server)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"29e0a744-98cd-4d99-9ab5-785adc59b0fc","order":11,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-scality-s3c","title":"Using Fortanix Data Security Manager with Scality S3C","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3bc6bb7b-aa3f-4394-afaa-c0cc7d3a4c06","order":12,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-netapp-ontap","title":"Using Fortanix Data Security Manager with NetApp ONTAP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"20e3ce07-4b08-4032-a546-06abd11347ad","order":13,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-pure-storage","title":"Using Fortanix Data Security Manager with Pure Storage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d88a70c-7920-4c16-83c1-6ef3848e4c07","order":14,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-cohesity-encryption-keys","title":"Using Fortanix Data Security Manager for Cohesity Encryption Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9b561119-09e3-44cd-bb11-501438599319","order":15,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-alletra-9000","title":"Using Fortanix Data Security Manager for Hewlett Packard Enterprise (HPE) Alletra 9000","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b999b37-8b59-48f8-9f66-aa76a8801dbf","order":16,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-dell-powerflex-using-cloudlink","title":"Using Fortanix Data Security Manager with Dell PowerFlex Using CloudLink","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"storage-encryption","title":"Storage Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f8ec8d81-7e77-4581-8f59-6609819bb96a","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"172b1e0d-ddc2-484a-8bdf-ef491f2ae1b2","order":1,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-quadient-inspire-designer","title":"Using Fortanix Data Security Manager with Quadient Inspire Designer","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"87598207-106e-4b2d-9557-b4931815c300","order":2,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-for-git-commit-signing","title":"Using Fortanix Data Security Manager for Git Commit Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"65a8329d-e5b0-4fe2-8abd-bf3b83b85c78","order":3,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-sectigo-ca-for-secure-certificate-generation","title":"Using Fortanix Data Security Manager with Sectigo CA for Secure Certificate Generation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"109b9088-2618-49ed-80d0-5f9537447d3e","order":4,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-dsm-for-verifying-key-attestation-statements","title":"Using Fortanix DSM for Verifying Key Attestation Statements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"38c720f9-0d15-48b9-9a7b-dcdd8bdb6322","order":5,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-gitlab-for-code-signing","title":"Using Fortanix Data Security Manager with GitLab for Code Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ee5f03dd-b3cb-472f-939d-b9c925eaa66b","order":6,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-microsoft-cng-provider-and-signtool","title":"Using Fortanix Data Security Manager with Microsoft CNG Provider and SignTool","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bd13567d-7598-4ee1-b863-fe8d5c00a84d","order":7,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-dsm-for-issuing-key-attestation-statements","title":"Using Fortanix DSM for Issuing Key Attestation Statements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"183b156d-5b61-49a0-b566-f7bcbfa4bb02","order":8,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"data-security-manager-with-docker-notary-for-pkcs11","title":"Fortanix Data Security Manager with Docker Notary for PKCS#11","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f4170a7-b0f9-41cc-9e34-085dcee94694","order":9,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-for-kernel-module-signing-module-guide","title":"Using Fortanix Data Security Manager for Kernel Module Signing Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d8dc8199-aba7-4e6c-8d81-2b5f24e21681","order":10,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-32-bit-signtool-for-signing-and-verifying-microsoft-office-macro-files","title":"Using Fortanix Data Security Manager with 32-Bit SignTool for Signing and Verifying Microsoft Office Macro Files","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b0e6bae2-fabd-4ce8-a121-7205b641d7fc","order":11,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-microsoft-cng-and-java-8-for-jar-signing","title":"Using Fortanix Data Security Manager with Microsoft CNG and Java 8 for JAR Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"code-signing","title":"Code Signing","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"858057fd-91fc-4afb-8d13-b9677a324a6d","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"71ff49a4-ebd9-48ab-b18b-9eaf29029ae7","order":1,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-data-security-manager-with-databricks","title":"Using Data Security Manager with Databricks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"411c4905-a5c0-41e9-b127-ca8483b90a80","order":3,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-data-security-manager-with-snowflake","title":"Using Data Security Manager with Snowflake","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"40e8f28e-edc7-496e-972a-592666a062eb","order":4,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-fortanix-data-security-manager-to-create-tokenization-secret","title":"Using Fortanix Data Security Manager to Create Tokenization Secret","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"tokenization","title":"Tokenization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a8e6ca86-3b4a-4525-868a-f7bb13367ebb","order":2,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-windows-server","title":"Using Fortanix DSM with Sumo Logic (SIEM) Integration Guide for Windows Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3b9c6e11-a924-4acb-9db8-4a093f4c2f02","order":3,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-data-security-manager-with-rapid7-insightidr","title":"Using Fortanix Data Security Manager with Rapid7 InsightIDR","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00bc7501-92b2-4fa7-8209-b06e8df9de25","order":4,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-linux-server","title":"Using Fortanix DSM with Sumo Logic (SIEM) Integration Guide for Linux Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"72c9c3e5-aeb2-4343-afa1-2f574a18d838","order":5,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-data-security-manager-with-logrhythm","title":"Using Fortanix Data Security Manager with LogRhythm","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"fortanix-log-management","title":"Log Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","order":13,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f402500b-dcdc-4672-9b6d-2c833eba1496","order":1,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"fortanix-data-security-manager-with-cloudflare-integration","title":"Fortanix Data Security Manager with Cloudflare Integration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9b529758-a084-4c0c-8823-3be88d4b4440","order":2,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"using-fortanix-data-security-manager-with-skyhigh-secure-web-gateway-swg","title":"Using Fortanix Data Security Manager with Skyhigh Secure Web Gateway (SWG)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"71165056-b87e-46e3-a944-596cafdd2f31","order":2,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"using-fortanix-data-security-manager-with-f5-big-ip-virtual-edition","title":"Using Fortanix Data Security Manager with F5 BIG-IP Virtual Edition","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"60b61fc6-8b93-4c31-9b4e-63d8aa609196","order":3,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"fortanix-data-security-manager-with-imperva-cloud-waf","title":"Fortanix Data Security Manager with Imperva Cloud WAF","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"firewall","title":"Web Application Firewall (WAF)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c8301ae3-0e60-40eb-89cb-6d4683b03584","order":14,"documentationType":1,"children":[],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"pgp-integration-with-jce-provider-and-bouncy-castle","title":"PGP Integration with JCE Provider and Bouncy Castle","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"use-cases-and-integrations","title":"Use-cases and Integrations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b0f2a62b-1633-4fd9-8696-61173ae92df6","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"570ed4e0-3007-45bc-8bd9-09342e9299c0","order":1,"documentationType":1,"children":[],"parentCategoryId":"b0f2a62b-1633-4fd9-8696-61173ae92df6","slug":"dsm-rest-apis","title":"DSM REST APIs","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3aa415f1-1f4d-450f-99c5-d64069526dda","order":2,"documentationType":1,"children":[],"parentCategoryId":"b0f2a62b-1633-4fd9-8696-61173ae92df6","slug":"dsm-java-sdk-and-jce-provider-documentation","title":"DSM Java SDK and JCE Provider Documentation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"dsm-api-documentation","title":"DSM API Documentation","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9ebde975-74e3-4746-b0b3-0b95798911ff","order":1,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-fortanix-data-security-manager","title":"What is Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"abedd2d7-07d4-48b7-8b07-93d1053f0f41","order":2,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"why-should-i-use-fortanix-data-security-manager","title":"Why should I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9e60abd4-3098-46dd-ad88-e439a71be90d","order":3,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-do-i-get-started-with-fortanix-data-security-manager","title":"How do I get started with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4f1faa21-8e1b-4a29-8158-f49489f5aabc","order":4,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-default-version-of-dsm-installed-in-on-prem","title":"What is the default version of DSM installed in on-prem?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dbc251d3-bfee-4342-aca1-8a8c7fbab247","order":5,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-does-fortanix-data-security-manager-work","title":"How does Fortanix Data Security Manager work?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f73eb62-e101-49af-8f8a-e2f76f684cf9","order":6,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager","title":"What languages and interfaces are supported by Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3843c06-22e2-4661-807c-b59a6d8593e7","order":7,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service","title":"How will I be charged and billed for using Fortanix DSM as a Service?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"57834e64-5c87-4dd9-8594-6200d64be95b","order":8,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-fortanix-dsm-saas-version","title":"How to check the Fortanix DSM SaaS version?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b4f3f4ce-7ba5-4fd1-9c7e-57c6e1548ff5","order":9,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-algorithms-are-supported-by-fortanix-data-security-manager","title":"What algorithms are supported by Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4f582d1e-559c-4e18-9f38-06884995e873","order":10,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-list-of-browsers-that-fortanix-dsm-supports","title":"What are the list of browsers that Fortanix DSM supports?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"be287ad8-790b-4f4a-a77f-f78f1b005635","order":11,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-kmip-coverage-do-we-provide","title":"What KMIP coverage do we provide?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da1bf994-4fa1-46b2-beb7-a881fb359392","order":12,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-it-possible-to-talk-to-fortanix-dsm-using-pykmip","title":"Is it possible to talk to Fortanix DSM using PyKMIP?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"aa320a2d-38ce-4610-9057-6aa695ca60a6","order":13,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-key-check-value-for-a-fortanix-dsm-security-object","title":"What is Key Check Value for a Fortanix DSM security object ?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3a4bb75-b16a-4151-8439-695076bc18fe","order":14,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-do-secrets-lifecycle-management","title":"Can Fortanix do secrets lifecycle management?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6d6b509-18fd-4b90-925e-5bb3bbd1e2e4","order":15,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-a-fortanix-dsm-application-search-secrets-which-are-only-created-by-it-in-the-kms","title":"Does a Fortanix DSM application search for secrets that are only created by it?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c654000e-56f1-41c1-9061-2d18dd4649cf","order":16,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-i-add-a-quorum-approval-policy-for-system-level-log-management-changes-in-fortanix-data-security-manager","title":"Can I add a Quorum approval policy for system-level log management changes in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2df6658-e66b-4991-b659-a12651542429","order":17,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-difference-between-invite-user-and-create-new-user-api","title":"What is the difference between Invite User and Create New User API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1a1f8ce5-ae19-4eef-868c-e4af585eb465","order":18,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-download-all-secrets","title":"How to download all secrets?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"381f6783-8e9e-4f46-bc2c-1d6e03dac202","order":19,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-an-account-in-dsm-be-a-tenant-account","title":"Can an account in Fortanix DSM be a tenant account?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47464be3-6fb5-40d4-aa5e-20208ce951bd","order":20,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-support-pkcs12","title":"Does Fortanix DSM support PKCS#12 ?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"547db959-69e0-4b79-adcd-35a33dad4f21","order":21,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-support-the-certificate-management-protocol-cmp","title":"Does Fortanix DSM support the Certificate Management Protocol (CMP)?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"830c2742-369f-4731-b515-e22233581cb3","order":22,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-i-import-keys-into-fortanix-data-security-manager","title":"Can I import keys into Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"05b08c8d-dd2b-479a-9f0c-d5db13d1a508","order":23,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-application-level-encryption-in-fortanix-dsm","title":"What is application-level encryption in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"935c9961-4c19-4446-8057-e340e368c685","order":24,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-mfa-device-attestation-including-self-attestation-and-the-attestation-id-response-and-type-what-does-the-binary-response-from-a-u2f-device","title":"What is MFA device attestation, self-attestation, and the attestation ID, response, and type? What does the binary response from a U2F device include?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c261fc5-e811-4583-a638-eda9ae5a6913","order":25,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-you-change-the-non-export-key-attribute-to-export","title":"Can you change the non-exportable key attribute to export?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e008c3c5-ce14-4c15-9b1b-5d9495ca8d0c","order":26,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"which-key-will-be-created-on-fortanix-dsm-in-the-minio-integration","title":"Which key will be created on Fortanix DSM in the MinIO integration?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3e01b8af-8a67-4269-8d4b-b15dee07fe61","order":27,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-kind-of-policies-can-be-applied-to-secret-security-objects-in-fortanix-dsm","title":"What kind of policies can be applied to Secret security objects in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"89451d2f-3a37-463e-b711-3ae9e12791bb","order":28,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-restart-an-sdkms-ui-service-on-a-hardware-cluster","title":"How to restart an sdkms-ui service on a hardware cluster?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b9f9579e-631e-488a-a1a3-f961e1f2c39d","order":29,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-dsm-api-retrieve-more-than-1001-account-information","title":"Can Fortanix DSM API retrieve more than 1001 account information?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c75b0822-2129-46f6-865b-18599454b4b3","order":30,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-crypto-operations-by-transient-keys-in-dsm","title":"How to check the crypto operations by transient keys in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64145265-5c0f-4602-98f8-32af0f2c3644","order":31,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period","title":"Is there an option to expire a security object at a specific date or after a certain time period?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6108dcf5-861e-4b06-bdd1-129959f36b10","order":32,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only","title":"What is cluster attestation and why should I use it? (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1239ebe1-3d83-4789-9f99-777a219771e8","order":33,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-key-management-features-are-available-in-fortanix-data-security-manager","title":"What key management features are available in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"482a71b6-e41b-4c04-a532-b3f3fee9a76c","order":34,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-does-unregistered-user-mean-in-fortanix-dsm","title":"What does unregistered user mean in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"84690147-6845-4ecd-aeaf-b72d01519ceb","order":35,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"why-is-the-fpe-policy-not-set-for-a-key","title":"Why is the FPE policy not set for a key?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"521879ed-bd6b-4c4b-bd90-7cd45e39cb17","order":36,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager","title":"Where is encryption and decryption done if I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"438454cc-cc59-4dea-aa56-67e72a0d3282","order":37,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager","title":"Where do my keys live if I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b391f3d-a8a9-42de-9e78-414f16ae1858","order":38,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager","title":"What cryptographic operations are available in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb10a231-655b-4fc4-ac3a-9400cc2956a3","order":39,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-tokenization-transaction-per-second-in-dsm","title":"What is tokenization transaction per second in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62877012-d2ee-4d62-a168-861cb4e4e17b","order":40,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-employees-access-my-keys","title":"Can Fortanix employees access my keys?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da50f81a-7c42-4b77-b2e4-33c3d64bd748","order":41,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret","title":"What are the differences between the two types of objects we can use to store sensitive information, OPAQUE and SECRET?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e61313c4-31f3-4e36-87d2-1dccac9c69d4","order":42,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects","title":"What has Fortanix DSM done to mitigate UI slowdown if an account contains many (> 700) very large (>300kb) security objects?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6c695c1-e2d3-4819-ad61-3ee27d875045","order":43,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"faqs-fortanix-data-security-manager-ui","title":"FAQs - Fortanix Data Security Manager UI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"549d60b9-dca2-4744-8591-c8e844a772ba","order":44,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-transient-keys","title":"What are Transient keys?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ad32a763-611c-414f-bafd-26324f1da43a","order":45,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-subscription-type-for-a-dsm-on-premises-deployment","title":"How to check the subscription type for a DSM on-premises deployment?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88cae2c0-a1aa-40f9-bc7d-338fee2c8b69","order":46,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault","title":"How does Fortanix Data Security Manager compare with AWS KMS and Azure Key Vault?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1347ee84-3e6d-4a5a-a8f2-2449474c38a3","order":47,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-support-cassandra-encryption-using-dsm","title":"Does Fortanix support Cassandra encryption using DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b5bec9f9-c4bb-4359-9f85-51686c374799","order":48,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-difference-between-lua-and-rust-programming-language-in-fortanix-data-security-manager","title":"What is the difference between Lua and Rust programming language in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0aad2e42-52bd-49dd-84f8-284cc5410dab","order":49,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-to-find-ca-certs-to-run-fortanix-dsm-accelerator-webservice","title":"Where to find CA certs to run Fortanix DSM Accelerator Webservice?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"636ce56b-21fa-4ea5-8e8c-2ff0d93adee3","order":50,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-bandwidth-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","title":"What are the bandwidth network requirements when deploying Fortanix DSM in multiple sites?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"70e57633-f61b-42f7-afc4-62e56d57075d","order":51,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-latency-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","title":"What are the latency network requirements when deploying Fortanix DSM in multiple sites?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3228bd22-b713-465f-b720-02f01ffce011","order":52,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"could-a-failed-power-supply-even-though-indicator-light-is-green-be-a-firmware-issue","title":"Could a failed power supply even though indicator light is green be a firmware issue in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe5365f6-82b2-4860-a3f9-3ebc23faf824","order":53,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"lms-keys-faqs","title":"LMS Keys - FAQs","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f83febaa-a9d5-4f3f-85b0-65a479777807","order":54,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-can-i-find-the-ipmi-logs","title":"Where can I find the IPMI logs?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47e94fc6-7f82-4e71-b0b6-a400bbd675fd","order":55,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-protect-against-quantum-computing","title":"Can Fortanix protect against quantum computing?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8bb4b284-066f-49ff-ae33-76c07952e923","order":56,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-fortanix-security-vulnerability-reporting-process","title":"What is the Fortanix security vulnerability reporting process?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8bc23b9d-1eb4-422b-8be3-3c27605d35ad","order":57,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-get-the-authorized-redirect-uri-for-workspace-cse","title":"How to get the authorized redirect URI for Workspace CSE?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"875296fa-8d59-459f-bc7c-2a800130418d","order":58,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-perform-cassandra-replication-in-fortanix-dsm","title":"How to perform Cassandra replication in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b7dbd4bd-bcc7-4108-b0ad-b55bdd176d4d","order":59,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"your-hardware-enablement-stack-hwe-is-supported-until-april-2025-what-does-this-mean","title":"Your Hardware Enablement Stack (HWE) is supported until April 2025. What does this mean?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc14710f-ede8-4490-95d2-6bafd0b77755","order":60,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-fortanix-iso-27001-certified","title":"Is Fortanix ISO 27001 certified?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4a364cfa-95b5-41dc-9e9f-ea3133bf4876","order":61,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-have-any-hardened-os-best-practices","title":"Does Fortanix DSM have any hardened OS best practices?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"061acbab-e538-4730-95ba-c114408a8cf9","order":62,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"34ea6969-f0f1-4106-bbd7-0f786dd7d820","order":1,"documentationType":1,"children":[],"parentCategoryId":"061acbab-e538-4730-95ba-c114408a8cf9","slug":"does-fortanix-data-security-manager-include-a-web-application-firewall-waf-should-i-configure-a-waf-with-fortanix-data-security-manager","title":"Does Fortanix Data Security Manager include a Web Application Firewall (WAF)? Should I configure a WAF with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"21950b53-819f-4274-83fe-49cb20d6a07a","order":2,"documentationType":1,"children":[],"parentCategoryId":"061acbab-e538-4730-95ba-c114408a8cf9","slug":"can-i-use-a-proxy-with-fortanix-data-security-manager","title":"Can I use a proxy with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"security","title":"Security","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"faqs","title":"FAQs","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-data-security-manager-dsm","title":"Fortanix Data Security Manager (DSM)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"46d0d3d3-3c76-4767-983e-c95de9be2445","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"33ab26db-3c4d-4230-962a-9331ba7b7f83","order":2,"documentationType":1,"children":[],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-saas-ip-whitelisting","title":"Fortanix SaaS IP Whitelisting","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2385c68c-ad4e-4a10-8ff6-4e007ad1df76","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7b9f6be0-466f-451e-ad28-1c9f98e9797c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2385c68c-ad4e-4a10-8ff6-4e007ad1df76","slug":"fortanix-armor-overview","title":"Fortanix Armor Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"about-fortanix-armor","title":"About Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"469eb425-34a1-4341-8a5c-18ce2aa12953","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5f1acea8-5722-437a-b8b4-5b170f3207a9","order":1,"documentationType":1,"children":[],"parentCategoryId":"469eb425-34a1-4341-8a5c-18ce2aa12953","slug":"fortanix-armor-getting-started","title":"Fortanix Armor - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"getting-started-with-fortanix-armor","title":"Getting Started with Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"25b04517-45ef-46b6-8fa3-e2186d9b6534","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"120c1003-4e39-4e41-b2f4-421dbb5e1060","order":1,"documentationType":1,"children":[],"parentCategoryId":"25b04517-45ef-46b6-8fa3-e2186d9b6534","slug":"fortanix-armor-solutions","title":"Fortanix Armor - Solutions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-armor--solutions","title":"Fortanix Armor Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4d459ac7-bec0-4b68-b634-2fc0a0f84622","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"670f7799-ff5e-488e-87cc-74c0274d6168","order":1,"documentationType":1,"children":[],"parentCategoryId":"4d459ac7-bec0-4b68-b634-2fc0a0f84622","slug":"fortanix-armor-identity-and-access-management-iam","title":"Fortanix Armor Identity and Access Management (IAM)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-armor-identity-and-access-management","title":"Fortanix Armor Identity and Access Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-armor","title":"Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ec4b7d6b-13c6-44b6-a4fb-d10142e1b86d","order":1,"documentationType":1,"children":[],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-overview","title":"Fortanix Key Insight Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b7353a0c-64e5-4f77-8e46-93dfa040793f","order":2,"documentationType":1,"children":[],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-architecture","title":"Fortanix Key Insight Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"30502515-b145-463b-8389-c5b7e49c360f","order":1,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-concepts","title":"Fortanix Key Insight Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3dcd1537-1644-4825-8594-b59696b33b93","order":2,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-aws-concepts","title":"Fortanix Key Insight for AWS Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99bd7edd-1937-4e71-ae1d-4b7117afc292","order":3,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-azure-concepts","title":"Fortanix Key Insight for Azure Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2e3d1999-b4b2-4271-9cd7-1d39332d3d16","order":4,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-on-premises-concepts","title":"Fortanix Key Insight for On-Premises Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8bf4d44-cd62-435f-b4fc-f7e29c82f5a7","order":5,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-external-key-source-concepts","title":"Fortanix Key Insight for External Key Source Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5925d92f-a45f-4c91-b03a-43cba7df20fa","order":6,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-pqc-central-concepts","title":"Fortanix Key Insight for PQC Central Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-definitions","title":"Fortanix Key Insight Concepts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"748d51eb-aa0f-468e-ba4f-f285a13edd6f","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"18828884-4e91-4eb9-ab85-72136dea03f2","order":1,"documentationType":1,"children":[],"parentCategoryId":"748d51eb-aa0f-468e-ba4f-f285a13edd6f","slug":"fortanix-key-insight-getting-started-with-cloud-connection","title":"Fortanix Key Insight - Getting Started With Cloud Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"fortanix-key-insight-getting-started-with-cloud","title":"Cloud Connection - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"eacfad66-53d2-4729-88a1-a85197cefef1","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ae20ee86-fd4b-4895-b198-fa44a70d41de","order":1,"documentationType":1,"children":[],"parentCategoryId":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","slug":"fortanix-key-insight-aws-connection-permissions","title":"Fortanix Key Insight - AWS Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2c13255f-23da-4988-b3db-fb46ea3b1e25","order":2,"documentationType":1,"children":[],"parentCategoryId":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","slug":"fortanix-key-insight-azure-connection-permissions","title":"Fortanix Key Insight - Azure Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"cloud-connection-permissions","title":"Cloud Connection - Permissions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c481542b-a8de-442b-b934-40488bf73815","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"3b14e71e-bed7-45d8-821b-6dd5dc814ca0","order":1,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-azure-configuration-for-microsoft-entra-id-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - Azure Configuration For Microsoft Entra ID as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"66184394-7fc7-4f2b-8540-23a280f2c872","order":2,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-azure-configuration-for-pingone-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - Azure Configuration For PingOne as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e02c41a1-a820-4166-8a2a-1e7940fd1766","order":3,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-aws-configuration-for-pingone-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - AWS Configuration For PingOne as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d7ac61a4-3b20-447c-a7e3-da333b081661","order":4,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-aws-configuration-for-microsoft-entra-id-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - AWS Configuration For Microsoft Entra ID as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"cloud-connection-configuration-for-open-id-connect","title":"Cloud Connection - Open ID Connect IdP Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3b6264ef-002f-4717-9e67-4dd73930ca1c","order":3,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-aws-configuration-for-scanning","title":"Fortanix Key Insight - AWS Configuration for Scanning","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"96801005-b8c0-4ae6-b40f-f3ed66835581","order":4,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-azure-configuration-for-scanning-using-custom-roles","title":"Fortanix Key Insight - Azure Configuration for Scanning Using Custom Roles","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb94cc66-0158-4029-aa8d-f4ad88f71508","order":5,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles","title":"Fortanix Key Insight - Azure Configuration for Scanning Using Built-In Roles","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"cloud-connection-scanning-configuration","title":"Cloud Connection - Scanning Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9e69bb13-5af6-477c-b437-b7a90755b98c","order":1,"documentationType":1,"children":[],"parentCategoryId":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","slug":"fortanix-key-insight-user-interface-components-aws","title":"Fortanix Key Insight User Interface Components - AWS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9c49abd7-877c-4922-840c-c2e74de88e6d","order":2,"documentationType":1,"children":[],"parentCategoryId":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","slug":"fortanix-key-insight-user-interface-components-azure","title":"Fortanix Key Insight User Interface Components - Azure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"cloud-connection-user-interface-components","title":"Cloud Connection - User Interface Components ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-cloud-connection","title":"Fortanix Key Insight - Cloud Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2d7ff7db-6f3e-40f5-93d1-2affd79a9d2a","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f051e8e8-74bf-4aa3-a0fc-79afcc89561c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2d7ff7db-6f3e-40f5-93d1-2affd79a9d2a","slug":"fortanix-key-insight-getting-started-with-on-premises-connection","title":"Fortanix Key Insight - Getting Started With On-Premises Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-getting-started","title":"On-Premises Connection - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"571a3715-bc8d-464e-95e2-a83897dc82d1","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"09eaf7b4-a85a-458f-b876-38644280e6ad","order":1,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-connection-permissions","title":"Fortanix Key Insight - On-Premises Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"82a93b31-f4e9-4584-87cd-46c3c6642458","order":2,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-configuration-for-scanning","title":"Fortanix Key Insight - On-Premises Configuration for Scanning","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb13b841-409d-402b-889f-8797f52d1b2b","order":3,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-scanner-integration-with-hashicorp-vault","title":"Fortanix Key Insight - On-Premises Scanner Integration With HashiCorp Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-scanning-configuration","title":"On-Premises Connection - Scanning Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"894cc29f-c2a7-4308-a7d5-8d2ecb5b676a","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b1cfb70b-2eb0-4a27-8fa5-3549526de6a7","order":1,"documentationType":1,"children":[],"parentCategoryId":"894cc29f-c2a7-4308-a7d5-8d2ecb5b676a","slug":"fortanix-key-insight-user-interface-components-on-premises","title":"Fortanix Key Insight User Interface Components - On-Premises Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-user-interface-components","title":"On-Premises Connection - User Interface Components ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-on-premises-connection","title":"Fortanix Key Insight - On-Premises Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ae620651-a681-45a4-a9f0-c490b7b27401","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ecdf3a9b-ff4f-40d1-ab7f-16ed43e29bb5","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a3338d3-e7e9-413e-abf2-2533787da892","order":1,"documentationType":1,"children":[],"parentCategoryId":"ecdf3a9b-ff4f-40d1-ab7f-16ed43e29bb5","slug":"fortanix-key-insight-getting-started-with-external-key-source-connection","title":"Fortanix Key Insight - Getting Started With External Key Source Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"ae620651-a681-45a4-a9f0-c490b7b27401","slug":"external-key-source-getting-started","title":"External Key Source - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"16d91802-75c4-4f37-bf4b-4acc3f47f967","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc9f23f8-8b79-4d3b-9d62-07db7c034975","order":1,"documentationType":1,"children":[],"parentCategoryId":"16d91802-75c4-4f37-bf4b-4acc3f47f967","slug":"fortanix-key-insight-user-interface-components-external-key-source","title":"Fortanix Key Insight User Interface Components - External Key Source","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"ae620651-a681-45a4-a9f0-c490b7b27401","slug":"external-key-source-user-interface-components","title":"External Key Source - User Interface Components","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-external-key-source-connection","title":"Fortanix Key Insight - External Key Source Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"075544a4-05f1-44fd-b605-2f02f3639bcd","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"fc69cc6e-dbe0-4aee-87a4-669deb5cfc9e","order":1,"documentationType":1,"children":[],"parentCategoryId":"075544a4-05f1-44fd-b605-2f02f3639bcd","slug":"fortanix-key-insight-user-interface-components-pqc-central","title":"Fortanix Key Insight User Interface Components - PQC Central","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-pqc-central","title":"Fortanix Key Insight - PQC Central","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-key-insight","title":"Fortanix Key Insight","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"77f19afa-0031-4851-9792-3bb13c20b06c","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a4bf6d1e-cd7a-48b2-9ab9-0de1f4fba133","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"db4b272d-e235-4deb-b3f5-538ded135102","order":1,"documentationType":1,"children":[],"parentCategoryId":"a4bf6d1e-cd7a-48b2-9ab9-0de1f4fba133","slug":"quickstart-guide","title":"Quickstart Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"fortanix-quickstart","title":"Quickstart","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b2d62b8-68b7-411e-a61c-b2fa85dd6df4","order":1,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"fortanix-overview-and-definitions","title":"Overview and Definitions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c1f549f-2d58-48a7-8892-3a52b80a1c52","order":2,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-logging-in","title":"User's Guide: Logging in","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"371eaed7-cb93-49e2-8a45-43fa84de67b8","order":3,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-groups-and-third-party-groups-concepts","title":"User's Guide: Groups and Third-Party Groups - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fd83d4f0-c783-4244-91b7-cc39f0033509","order":4,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-create-groups","title":"User's Guide: Create Groups","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"089f7531-5380-4649-ab12-88c4c5595a09","order":5,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"application-and-compute-node-policy-enforcement","title":"Application and Compute Node Policy Enforcement","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62def226-c84a-4b56-9ee5-3f9b45c68ebc","order":6,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-aws-nitro-file-persistence","title":"User's Guide: AWS Nitro File Persistence","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"53ae5c32-b9a7-4443-abbf-fd3bb2cecbe7","order":7,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-azure-active-directory-authentication","title":"User's Guide: Azure Active Directory Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0038b733-c122-48ec-a0d9-3fb5b376a9dc","order":8,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"error-handling-in-fortanix-confidential-computing-manager","title":"Error Handling in Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fccd9091-750b-4118-b3c9-47ab76630968","order":9,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-deploying-the-aci-application-using-azure-portal","title":"User's Guide - Deploying the ACI Application Using Azure Portal","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c8b1557-5f57-44b4-a3ae-c9f95fa41c3e","order":10,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-invite-users","title":"User's Guide: Invite Users","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e5b4ea2-2394-44a2-b875-e6535c69e72d","order":11,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"fortanix-users-guide-logging","title":"User's Guide: Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99be8fe1-09f8-4bb6-b0d8-f58820be8eab","order":12,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"troubleshooting","title":"Troubleshooting","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"getting-started-with-fortanix-ccm","title":"Getting Started with Fortanix CCM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d842c8b1-e453-4600-8579-e055464e891c","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","order":74,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7b486683-2e2a-4ef8-8ed8-2a59a4542f9a","order":1,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-provision-nitro-compute-node-using-aws-marketplace","title":"User's Guide: Provision Nitro Compute Node Using AWS Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"947f0439-81ba-413d-86e2-e84e1b04e8b4","order":2,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-using-azure-marketplace","title":"User's Guide: Enroll a Compute Node Using Azure Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88a74500-0b58-4ef0-9d81-a92975bf2669","order":3,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-bare-metal-or-vm-sgx","title":"User's Guide: Enroll a Compute Node (bare metal or VM) - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1983cc1c-f511-4a27-9799-1128fd333a9c","order":4,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-using-aws-nitro-on-amazon-linux","title":"User's Guide: Enroll a Compute Node Using AWS Nitro on Amazon Linux","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"enroll-compute-node","title":"Enroll Compute Node","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"66d26412-2d7d-4372-a75a-6f617b86053d","order":75,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"kernel-version-supported","title":"Kernel Version Supported","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6877db90-a795-4b1a-8997-a312ce69d39f","order":76,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"supported-vms-for-azure-confidential-computing","title":"Supported VMs for Azure Confidential Computing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5062afae-0576-4e7a-86e8-c93605b2bc56","order":77,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"users-guide-compute-nodes","title":"User's Guide: Compute Nodes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"compute-nodes","title":"Compute Nodes","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a96dca99-c704-4e29-9929-f9af49bfaab8","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"32701d3a-1ed8-4421-b634-90ed6d77d56d","order":1,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-deploy-the-workflow-manual","title":"User's Guide: Deploy the Workflow - Manual","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e55d4f9f-3287-4cc9-b148-e78fff3556e4","order":2,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-deploy-the-workflow-web-interface","title":"User's Guide: Deploy the Workflow - Web Interface","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"86a85ada-8d4d-45a1-9ca7-37443869fc61","order":3,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-create-update-clone-and-delete-workflows","title":"User's Guide: Create, Update, Clone, and Delete Workflows","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b71f4897-8cf1-4ff1-aff1-583243451539","order":4,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-run-the-workflow-web-interface-aci-applications","title":"User's Guide: Run the Workflow - Web Interface - ACI Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a604cdd6-3c36-4f6a-9070-c4c8b636b1de","order":5,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-run-the-workflow-web-interface-aws-nitro-applications","title":"User's Guide: Run the Workflow - Web Interface - AWS Nitro Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"fortanix-workflows","title":"Workflows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"34dc874f-315d-491a-a3c1-3d963320fcc2","order":3,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-update-revoke-third-party-groups","title":"User's Guide: Create, Update, Revoke Third-Party Groups","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3e966992-8656-424d-9a18-2bbc65ab5030","order":4,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-add-and-edit-an-application","title":"User's Guide: Add and Edit an Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b8b08bd-5c94-4c9b-b3c4-420624cb3df9","order":5,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-image-registry","title":"User's Guide: Image Registry","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f0213796-1975-41e5-9e9d-adc064e42a99","order":6,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-an-image","title":"User's Guide: Create an Image","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a35cf027-e436-44ac-9401-775137f32de8","order":7,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-domain-and-application-image-approval","title":"User's Guide: Domain and Application Image Approval","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"283e458a-753d-4632-9fac-0cfd091168b4","order":8,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"running-an-example-application-using-sgx-platform","title":"Running an Example Application Using SGX Platform","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ecef2782-6cc7-40f8-859c-576e2330ade3","order":9,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"running-an-example-application-using-aws-nitro-platform","title":"Running an Example Application using AWS Nitro Platform","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b0463243-a2e9-40c4-a3d0-b34389adfeb3","order":10,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-convert-applications-deprecated","title":"User's Guide: Convert Applications - (Deprecated)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"469d13c9-e934-497f-ae6a-813076294446","order":11,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-application-configuration","title":"User's Guide: Create Application Configuration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da4a3b27-c21e-4765-9300-5b70a5e19460","order":12,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-datasets","title":"User's Guide: Create Datasets","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"users-guide-using-applications-and-datasets","title":"User's Guide: Using Applications and Datasets","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e40248c2-ab73-4e8e-a435-1c444141cac1","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8e8ff0d6-de1d-49e9-869c-ab4a86e52861","order":1,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-configuring-third-party-groups-using-data-connectors-and-scripts","title":"User's Guide: Configuring Third-Party Groups Using Data Connectors and Scripts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"05919f8a-eab3-4872-94bc-e77dd8261adf","order":2,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-concepts","title":"User's Guide: Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3571d0b2-2904-4030-96e0-9ebc465eef79","order":3,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-inbound-connector","title":"User's Guide: Inbound Connector","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"131ef499-548d-4cc2-a92e-a19ed1473341","order":4,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-scripts","title":"User's Guide: Scripts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2baf2f9b-638d-45bc-b3c5-e1edd6c9f420","order":5,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-outbound-connector","title":"User's Guide: Outbound Connector","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3d746905-25e3-4be2-b886-4436a09e97cc","order":6,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-configure-and-run-the-workflow","title":"User's Guide: Configure and Run the Workflow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"users-guide-using-data-connectors-and-scripts","title":"User's Guide: Using Data Connectors and Scripts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ceddf3c5-42c2-47f3-a59d-24df35c48595","order":1,"documentationType":1,"children":[],"parentCategoryId":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","slug":"system-administration-account-and-users","title":"System Administration - Account and Users","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"21a221ec-8345-42da-9101-96464e9527e8","order":2,"documentationType":1,"children":[],"parentCategoryId":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","slug":"system-administration-log-management","title":"System Administration - Log Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"system-administration","title":"System Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"29546823-c18e-4615-82d5-ea402bd7eba5","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"00daf9c7-db50-4c5c-ac01-8a9709cf880f","order":1,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"bringing-edp-rust-apps-to-confidential-computing-manager","title":"Bringing EDP Rust Apps to Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9bab6842-2f19-4a41-bd00-c79d845ec92b","order":2,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"using-ccm-cli-with-fortanix-confidential-computing-manager","title":"Using CCM-CLI with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7668efe6-04bf-483e-a7b3-6a3df328d398","order":3,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"how-to-configure-trusted-ca-to-outside-parties","title":"How to configure trusted CA to outside parties","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3301c27a-fbdc-4444-9ee0-bb32305a8737","order":5,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"tips-and-tricks","title":"Tips and tricks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"developers-guide","title":"Developer's Guide","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"212119b5-214a-4725-aeab-7d6b97d2da27","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"460f25e1-1c20-4831-9871-026aadcf6de2","order":1,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"azure-service-principal-with-fortanix-confidential-computing-manager","title":"Azure Service Principal with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7b25a86e-a8d5-4268-b94d-f3a2dd05b5ad","order":2,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"azure-kubernetes-service-with-fortanix-confidential-computing-manager","title":"Azure Kubernetes Service with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2cd59fdb-ae8a-4ab3-94d8-7674001ddafa","order":3,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"amazon-elastic-kubernetes-service-with-fortanix-confidential-computing-manager","title":"Amazon Elastic Kubernetes Service with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"fortanix-infrastructure","title":"Infrastructure","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"6ddcae21-359c-434f-ada4-18ae96d81c29","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9cbf8e2f-f4ed-4bfa-9df9-1bd3bd4fced6","order":1,"documentationType":1,"children":[],"parentCategoryId":"6ddcae21-359c-434f-ada4-18ae96d81c29","slug":"fortanix-confidential-computing-manager-sgx-attestation-process","title":"Fortanix Confidential Computing Manager - SGX Attestation Process (Deprecated)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0907c6e8-0e26-4f6e-9648-274f5c657104","order":2,"documentationType":1,"children":[],"parentCategoryId":"6ddcae21-359c-434f-ada4-18ae96d81c29","slug":"fortanix-confidential-computing-manager-usage-workflow","title":"Fortanix Confidential Computing Manager Usage Workflow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"knowledge-base","title":"Knowledge Base","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"589523a5-c96b-4198-a1b5-dc51834cf1b4","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"059a7a0a-d58c-4cf7-b454-947145c16af4","order":1,"documentationType":1,"children":[],"parentCategoryId":"589523a5-c96b-4198-a1b5-dc51834cf1b4","slug":"confidential-computing-manager-azure-managed-application","title":"Confidential Computing Manager Azure Managed Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"azure-managed-application","title":"Azure Managed Application","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c90b467-c76d-48e9-8a74-1bf8171a3f06","order":1,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-fortanix-confidential-computing-manager","title":"What is Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc67e2bf-6f4b-46f6-9f57-7e7ee7a785cb","order":2,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-compute-nodes-in-fortanix-confidential-computing-manager","title":"What are Compute Nodes in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da3d3e50-48b9-4bb5-b203-a0e8fb17374a","order":3,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-fortanix-node-agent","title":"What is Fortanix Node Agent?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d61d8da4-d93f-4610-b012-a63c5a71c031","order":4,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"which-linux-version-does-the-node-agent-support","title":"Which Linux version does the node agent support?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d9987e1-487a-4476-b6ca-dfd28f045b67","order":5,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-applications-are-supported-in-fortanix-confidential-computing-manager","title":"What Applications are Supported in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7eec44c7-3acf-4076-a77c-a6f192ac31dd","order":6,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-configure-an-application-in-fortanix-confidential-computing-manager","title":"How to Configure an Application in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"49e871a7-e398-4c25-81f5-e1d36ffc543d","order":7,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-application-whitelisting-in-fortanix-confidential-computing-manager","title":"What is Application Whitelisting in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9999133e-b9c0-4ae3-a356-d65c6e4a5ffb","order":8,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-a-join-token","title":"What is a Join token?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f614bc1-fc48-4468-868e-1c88ae520407","order":9,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-the-structure-of-cert-chain","title":"What is the structure of Cert Chain?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"171bba9a-c86b-4204-9442-7aca9292d85a","order":10,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-restrict-access-to-fortanix-confidential-computing-manager","title":"How to restrict access to Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4fa3ca2a-1348-4cc8-abf7-2ec2749d4866","order":11,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-obtain-data-describing-the-remote-enclave-from-the-cert","title":"How to obtain data describing the remote enclave from the cert?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6ccd806d-da0c-4dbc-b387-73308af4b55b","order":12,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-verify-the-communication-for-applications-running-on-two-different-nodes","title":"How to verify the communication for applications running on two different nodes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"92c2fff5-5ee4-4c22-9ebe-5bc8a4af234a","order":13,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-the-fortanix-confidential-computing-manager-node-agent-port-requirement","title":"What is the Fortanix Confidential Computing Manager Node Agent Port Requirement?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a361ef09-27ba-4294-864d-f87834513fb4","order":14,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-can-an-applications-cert-be-issued-when-we-deploy-an-app-from-the-console","title":"How can an application's cert be issued when we deploy an app from the console?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ceafc71d-d1de-4240-9ab0-4798fe66eb17","order":15,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-application-policy-enforcement-and-monitoring","title":"What is Application Policy Enforcement and Monitoring?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c10ca63-25b5-4620-bc13-c93a2fa4630f","order":16,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-enclave-build-procedure-ensure-that-the-content-of-an-image-cannot-be-altered-between-the-conversion-and-a-future-run","title":"How does the enclave build procedure ensure that the content of an image cannot be altered between the conversion and a future run?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bc1ffd56-3ee0-489c-9d10-7c56becc4ccd","order":17,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-attestation-process-guarantee-hardware-integrity","title":"How does the attestation process guarantee hardware integrity?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b12dd997-2eae-4173-a4ae-6e1c33b32694","order":18,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-attestation-process-guarantee-code-integrity","title":"How does the attestation process guarantee code integrity?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d68cc77a-13a3-40ec-8ad7-dbb4457b9462","order":19,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-validity-periods-in-fortanix-ccm","title":"What are validity periods in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1421d944-0f0f-4776-8ce4-e0de0668dab5","order":20,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-various-limits-and-quotas-in-fortanix-ccm","title":"What are various limits and quotas in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"08229434-152b-43a0-91cf-c6b018c39e0a","order":21,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"which-container-registries-does-fortanix-ccm-support","title":"Which container registries does Fortanix CCM support?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"efe1146b-3dea-4519-8bb2-e379da12eef1","order":22,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"quick-support-through-slack-channel","title":"Quick support through Slack Channel","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ab569992-e584-4835-ae3d-f3fc0eacdf43","order":23,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-edp","title":"What is EDP?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2b3ad04-6243-4387-a4ca-cdc0732f6bfd","order":24,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-can-i-bring-my-edp-application-to-fortanix-confidential-computing-manager","title":"How can I bring my EDP application to Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8dc5a86-1dbc-4f41-956c-cfe93680c5c6","order":25,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-the-supported-cloud-providers-for-datasets-in-fortanix-ccm","title":"What are the supported cloud providers for Datasets in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"faq","title":"FAQ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f46b5e83-cd1d-411e-9093-64b40e4e8235","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c6cc4e06-72b8-40d0-9078-bcc842f46792","order":1,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-from-scratch","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Application from Scratch","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e520fe98-56ef-4611-b5d5-31d15f197ca8","order":2,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-that-talks-over-tls-from-within-an-enclave","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Application that Talks Over TLS from Within an Enclave","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"054b379d-f492-4696-b3a1-f4b917e2ed0a","order":4,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-and-run-hashicorp-vault","title":"Using Fortanix Confidential Computing Manager to Build and Run Hashicorp Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb767ff6-9085-4f0a-bf63-ab9cffcea64b","order":5,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-for-easy-deployment-of-elasticsearch-on-aws-nitro","title":"Using Fortanix Confidential Computing Manager for Easy Deployment of Elasticsearch on AWS Nitro","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"35d6c41a-a56a-491e-8a07-f9a82ad7740f","order":6,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-nginx-application","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Nginx Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e960df9d-82ce-4f29-ab43-3030bc355849","order":7,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-spring-application","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Spring Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8dc8a938-85ee-4d7a-bf5f-422739b2e001","order":9,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-with-postgresql","title":"Using Fortanix Confidential Computing Manager with PostgreSQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"enclave-os","title":"Enclave OS ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a317b966-ddc8-4762-81ba-ee1b4897d666","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"67b4607d-6b5a-4289-80ac-0556cb83f142","order":1,"documentationType":1,"children":[],"parentCategoryId":"a317b966-ddc8-4762-81ba-ee1b4897d666","slug":"running-edp-applications-on-confidential-computing-manager","title":"Running EDP Applications on Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1ffc23a-d5f8-4b52-bd45-fcadf6805211","order":2,"documentationType":1,"children":[],"parentCategoryId":"a317b966-ddc8-4762-81ba-ee1b4897d666","slug":"build-a-rust-serverclient-edp-application-using-confidential-computing-manager-issued-certificates-and-trusted-ca","title":"Build a RUST Server/Client EDP Application Using Confidential Computing Manager Issued Certificates and Trusted CA","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"edp","title":"EDP","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"44053274-6375-4ba2-8375-937244a0d1c4","order":13,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","order":153,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ac875539-3266-43a4-9eef-2866d44a46c4","order":1,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-enclave-os-aws-nitro","title":"Workflow Applications Using Fortanix Enclave OS - AWS Nitro","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6bdd9853-6edc-4dce-8146-8bd8f56e8cd7","order":2,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-edp","title":"Workflow Applications Using Fortanix EDP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4357daed-3159-4513-a0d8-ecdc8cdb845e","order":3,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-aci","title":"Workflow Applications Using Fortanix ACI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"44053274-6375-4ba2-8375-937244a0d1c4","slug":"using-applications-and-datasets","title":"Using Applications and Datasets","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","order":154,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a1b7837-1a21-4987-8265-a8cf802ece99","order":1,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-simple-use-case-python","title":"Fortanix Confidential Computing Manager - Simple Use Case - Python","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2dacf68a-b9f7-43af-93a1-2a5070c7dfbe","order":2,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-simple-use-case-sql","title":"Fortanix Confidential Computing Manager - Simple Use Case - SQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f58738c-2fcf-49c4-96ee-9fea67e57708","order":3,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-complex-use-case-sql","title":"Fortanix Confidential Computing Manager - Complex Use Case - SQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"44053274-6375-4ba2-8375-937244a0d1c4","slug":"using-data-connectors-and-scripts","title":"Using Data Connectors and Scripts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"workflows","title":"Workflows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"examples","title":"Examples","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-confidential-computing-manager","title":"Fortanix Confidential Computing Manager","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"58bb2b95-6c39-4e25-9de8-4422a07d10e2","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"3ad31889-ed2b-4a4a-898e-d634818280c4","order":1,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-custodial-warm-wallet-solution","title":"Using Fortanix Custodial Warm Wallet Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0de60930-3477-4cb4-a384-ff485f4f7fe5","order":2,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-ignite-one-time-signer-solution","title":"Using Fortanix Ignite One-Time Signer Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9a85b09d-68d3-429b-ba6e-bdbde88006ba","order":3,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-signing-provider-for-tendermint-kms","title":"Using Fortanix Signing Provider for Tendermint KMS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2dbcdc81-3277-4117-89b8-9db2ce0a7231","order":4,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-data-security-manager-with-hyperledger-fabric","title":"Using Fortanix Data Security Manager with Hyperledger Fabric","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"58bb2b95-6c39-4e25-9de8-4422a07d10e2","slug":"web-30-solutions","title":"Web 3.0 Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"secure-web-30-infrastructure-solutions","title":"Secure Web 3.0 Infrastructure Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"isPublic":false,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0},"metaDefinitions":[{"content":"FAQs","property":"title"},{"property":"description"},{"content":"article","property":"og:type"},{"content":"FAQs","property":"og:title"},{"property":"og:description"},{"property":"og:image"},{"content":"FAQs","property":"twitter:title"},{"content":"summary_large_image","property":"twitter:card"},{"property":"twitter:description"},{"property":"twitter:image"}],"canonicalUrl":"https://support.fortanix.com/docs/faqs","isLayoutPreview":false},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/document/get-article-body?article-slug=faqs&","rt":"json"},"3431770288":{"b":{"result":{"layout":{"elementType":2,"elementName":"documentationPageBody","displayName":"Documentation","viewProperties":{"searchBarPosition":1,"docsSectionLayout":2,"categorydisplayType":1,"isBackground":false},"children":[{"elementType":25,"elementName":"docsSection","displayName":"Documentation section","viewStyles":{},"viewProperties":{},"children":[{"elementType":25,"elementName":"leftPanelContainerSection","displayName":"Left panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":19,"elementName":"inputTextboxElement","displayName":"Search box","viewStyles":{},"viewProperties":{},"children":[]},{"elementType":28,"elementName":"categoryTreeElement","displayName":"Category tree","viewStyles":{},"viewProperties":{"categoryNav":"tree","isBackground":"false"},"children":[]},{"elementType":17,"elementName":"poweredByLogo","displayName":"poweredByLogo","viewProperties":{},"children":[]}]},{"elementType":25,"elementName":"contentPanelContainerSection","displayName":"Content panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":25,"elementName":"articlePanelContainerSection","displayName":"Article panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":26,"elementName":"articleHeaderElement","displayName":"Article header","viewStyles":{},"viewProperties":{"displayContributors":false,"displayDownloadPdfButton":true,"displayEstimatedReadingTime":true,"displaySummaryButton":false,"displayThemeSelection":true,"enableReadOutLoudInKb":false,"displayBreadcrumb":true},"children":[]},{"elementType":27,"elementName":"articleContentElement","displayName":"Article content","viewStyles":{},"viewProperties":{},"children":[]},{"elementType":29,"elementName":"feedbackElement","displayName":"Feedback section","children":[]},{"elementType":24,"elementName":"previousNextNavigationElement","displayName":"ArticleNavigation Section","children":[]}]}]}]}]},"articleSettings":{"displayBreadcrumb":true,"displayAIAssistiveSearch":true,"displayArticleAttachments":true,"displayArticleTags":true,"displayComments":true,"displayContributors":false,"displayDownloadPdfButton":true,"displayEstimatedReadingTime":true,"displaySummaryButton":false,"displayTableOfContent":true,"displayRelatedArticles":true,"showPreviousNextNavigations":true,"showEmailShareButton":true,"showFacebookShareButton":true,"showLinkedinShareButton":true,"showTwitterShareButton":true,"displayThemeSelection":true,"displayFeedbackForm":true,"showPdfTemplatesInKb":true,"enableReadOutLoudInKb":false}},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/layouts/doc","rt":"json"},"3766487849":{"b":{"result":{"elementType":3,"elementName":"footerNavigation","elementGUID":"d6b4d29f-9f90-417c-ba57-676cb5edd902","displayName":"Footer","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"isBasic":false,"choosenThemeName":"none","facebook":"","twitter":"","linkedIn":"","youtube":""},"editableProperties":[],"children":[{"elementType":6,"elementName":"none","elementGUID":"656256a7-7721-40bf-b6ea-a351ca3c86d8","displayName":"Custom code section","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false},"editableProperties":[],"children":[{"elementType":15,"elementName":"customHTML","elementGUID":"34c292c8-cc65-4cba-b8c1-a9dda73fabdd","displayName":"HTML","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"customHTML":"\u003C!-- Footer Starts -->\n\u003Clink rel=\"stylesheet\" href=\"https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css\" integrity=\"sha384-wvfXpqpZZVQGK6TAh5PVlGOfQNHSoD2xbE+QkPxCAFlNEevoEH3Sl0sibVcOQVnN\" crossorigin=\"anonymous\">\n\u003Csection class=\"new-footer siteFooterRevampMainWrapper\" id=\"section-footer-revamp\">\n \u003Cdiv class=\"shell-wide\">\n \u003Csection class=\"fiveColumnWrapper\">\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/platform\">\n \u003Ch2>PLATFORM\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>Fortanix Platform\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/platform/data-security-manager/key-insight\">\n \u003Ch3>Key Insight\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/platform/data-security-manager\">\n \u003Ch3>Data Security Manager™ \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/platform/confidential-computing-manager\">\n \u003Ch3>Confidential Computing Manager\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>Open source platform\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/platform/runtime-encryption/enclave-development-platform\">\n \u003Ch3>Enclave Development Platform®\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>learn more\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/request-a-demo\">\n \u003Ch3>Request A demo \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/contact-us\">\n \u003Ch3>Contact Us\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/start-your-free-trial\">\n \u003Ch3>Free Trial\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/solutions\">\n \u003Ch2>SOLUTIONS\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>by use case\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/xks-for-aws\">\n \u003Ch3>AWS KMS External Key Store (XKS) \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/ekm-for-gcp\">\n \u003Ch3>Google External Key Manager \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/bring-your-own-key-hold-your-own-key\">\n \u003Ch3>Bring Your Own Key (BYOK)\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/hsm-modernization\">\n \u003Ch3>HSM Modernization\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/multicloud-key-management\">\n \u003Ch3>Multicloud Key Management \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/post-quantum-cryptography\">\n \u003Ch3>Post Quantum Cryptography\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/secure-your-code-signing-process\">\n \u003Ch3>Code Signing\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/secrets-management\">\n \u003Ch3>Secrets Management\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/tokenization\">\n \u003Ch3>Tokenization Transparent\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/transparent-database-encryption\">\n \u003Ch3>Database Encryption\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/filesystem-encryption\">\n \u003Ch3>Filesystem Encryption\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/confidential-data-search\">\n \u003Ch3>Confidential Data Search\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/confidential-ai\">\n \u003Ch3>Confidential AI\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Cdiv class=\"subColumnWrapper3\">\n \u003Cp>by industry\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-healthcare\">\n \u003Ch3>Healthcare\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-banking-and-financial-services\">\n \u003Ch3>Banking & Financial Services \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-fintech\">\n \u003Ch3>Fintech\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/secure-manufacturing\">\n \u003Ch3>Manufacturing \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/web3\">\n \u003Ch3>Web 3.0\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/government-data-security\">\n \u003Ch3>Federal Government\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/resources\">\n \u003Ch2>RESOURCES\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/blog\">\n \u003Ch3>Blog\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Whitepaper\">\n \u003Ch3>Whitepapers\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Datasheet\">\n \u003Ch3>Datasheets\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=SolutionBrief\">\n \u003Ch3>Solution Briefs\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Ebook\">\n \u003Ch3>Ebooks\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Report\">\n \u003Ch3>Reports\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=CaseStudy\">\n \u003Ch3>Case Studies\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/webinars\">\n \u003Ch3>Webinars\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/university\">\n \u003Ch3>University\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/mediakit\">\n \u003Ch3>Media Kit\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/newsletters\">\n \u003Ch3>Newsletters\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/company/about\">\n \u003Ch2>COMPANY\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/company/about\">\n \u003Ch3>About\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/careers\">\n \u003Ch3>Careers\u003Cspan class=\"hiringTag\">we’re hiring\u003C/span>\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/customers\">\n \u003Ch3>Customers\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/partners\">\n \u003Ch3>Partners\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/awards\">\n \u003Ch3>Awards\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/events\">\n \u003Ch3>Events\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/pr\">\n \u003Ch3>Press\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/news\">\n \u003Ch3>News\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/services\">\n \u003Ch3>Services\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://support.fortanix.com/hc/en-us\">\n \u003Ch3>Support\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/faq\">\n \u003Ch3>FAQ\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n \u003C/section>\n \u003C/div>\n\n \u003Cdiv class=\"borderLine\">\u003C/div>\n\n \u003Cdiv class=\"siteFooterSection2\">\n \u003Cdiv class=\"shell-wide\">\n \u003Cdiv class=\"siteFooterSection2Wrapper\">\n \u003Cdiv class=\"leftSideWrapper\">\n \u003Cdiv class=\"fortanixLogoContainer\">\n \u003Cdiv class=\"fortanixLogoWrapper1\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/fortanix-footer-logo.svg\" alt=\"Fortanix-logo\" loading=\"lazy\" />\n \u003C/div>\n \u003Cdiv class=\"starRatingWrapper\">\n \u003Ch4>4.6\u003C/h4>\n \u003Cimg class=\"starGroupImage\" src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/stars-logo.png\" alt=\"star-ratings\" loading=\"lazy\" />\n \u003C/div>\n \u003Cdiv class=\"gartnerWrapper\">\n \u003Cp>As of August 2023\u003C/p>\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/about/gartner-logo-fortanix.svg\" alt=\"gartner-logo\" loading=\"lazy\" />\n\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"borderLine2\">\u003C/div>\n \u003Cdiv class=\"complianceLogo\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/SOC-2-Type-2.svg\" alt=\"SOC-2 Type-2\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/iso-27001-lite.webp\" alt=\"ISO 27001\" width=\"95\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/fips-140-2.svg\" alt=\"FIPS 140-2 Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/gartner-cool-vendor.svg\" alt=\"Gartner Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/pci-dss-footer-logo.svg\" alt=\"PCI DSS Compliant\" loading=\"lazy\" />\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"c cell-md-4 cell-sm-4 cell-lg-4\">\n \u003Cdiv class=\"second-menu first-child fortanix-logos-wrapper\">\n \u003Cdiv class=\"section-20 map-container\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/worldmap.png\" width=\"188\" height=\"99\" useMap=\"#image-map\" alt=\"world map logo\" loading=\"lazy\" />\n\n \u003Cmap id=\"world-map\" name=\"image-map\">\n \u003Carea id=\"usa\" coords=\"34,60,22,47\" shape=\"rect\" />\n \u003Cspan>US\u003C/span>\n \u003Carea class=\"inactive\" id=\"netherlands\" coords=\"88,31,98,44\" shape=\"rect\" />\n \u003Cspan>Europe\u003C/span>\n \u003Carea class=\"inactive\" id=\"india\" coords=\"127,48,136,64\" shape=\"rect\" />\n \u003Cspan>India\u003C/span>\n \u003Carea class=\"inactive\" id=\"singapure\" coords=\"145,58,157,72\" shape=\"rect\" />\n \u003Cspan>Singapore\u003C/span>\n \u003C/map>\n \u003C/div>\n \u003Cdiv class=\"address text-white\">\n \u003Cdiv id=\"usa-address\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>US:\u003C/label>\n 3910 Freedom Circle, Suite 104, \u003Cbr />\n Santa Clara CA 95054 \u003Cbr />\n \u003Ca href=\"tel:+14082144760\">+1 408-214-4760\u003C/a> |\n \u003Ca href=\"mailto:info@fortanix.com\">info@fortanix.com\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"india-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>India:\u003C/label>\n UrbanVault 460,\u003Cbr /> First Floor, C S TOWERS,\u003Cbr /> 17th Cross Rd,\n 4th Sector,\u003Cbr /> HSR Layout, Bengaluru,\u003Cbr /> Karnataka 560102\u003Cbr />\n \u003Ca href=\"tel:080-41749241\">+91 080-41749241\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"netherlands-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Europe:\u003C/label>\n High Tech Campus 5, \u003Cbr />\n 5656 AE Eindhoven, The Netherlands\n \u003Cbr />\n \u003Ca href=\"tel:+31850608282\">+31850608282\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"singapure-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Singapore:\u003C/label>\n 30 Cecil St. #19-08 Prudential Tower, \u003Cbr />\n Singapore 049712\n \u003C/div>\n\n \u003Cdiv class=\"social-footer\">\n \u003Cul>\n \u003Cli>\n \u003Ca href=\"https://www.linkedin.com/company/fortanix/\">\n \u003Ci class=\"fa fa-linkedin\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://twitter.com/fortanix\">\n \u003Ci class=\"fa fa-twitter\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.facebook.com/fortanix/\">\n \u003Ci class=\"fa fa-facebook\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.youtube.com/c/fortanix\">\n \u003Ci class=\"fa fa-youtube-play\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003C/ul>\n \u003C/div>\n\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n\n\n \u003Cfooter class=\"footerBoxWrapper\">\n \u003Cdiv class=\"shell-wide\">\n \u003Cdiv class=\"footerNavigationLinks\">\n \u003Cdiv class=\"footerNavigationLinksFirst\">\n \u003Ca href=\"https://www.fortanix.com/trust-center\">\n \u003Ch4>Trust Centre\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Privacy Policy\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Legal\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/terms\">\n \u003Ch4>Terms of Service\u003C/h4>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"footerNavigationLinksLast\">\n \u003Ch4>Fortanix Copyright 2025. All Right reserved\u003C/h4>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/footer>\n \u003Clink rel=\"stylesheet\" href=\"https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css\" />\n\u003C/section>"},"editableProperties":[],"children":[]},{"elementType":16,"elementName":"customCSS","elementGUID":"4bba8004-92fb-49ba-9e1b-0b73e0b21e94","displayName":"CSS","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"customCSS":"/* revamp-styles */\n\n.hidden {\n display: none;\n}\n.shell,\n.shell-wide,\n.shell-fluid {\n margin-right: auto;\n margin-left: auto;\n padding-left: 15px;\n padding-right: 15px;\n}\n\n.shell,\n.shell-wide {\n min-width: 300px;\n max-width: 480px;\n}\n\n.shell-mobile {\n padding-right: 0;\n}\n\n@media (min-width: 768px) {\n\n .shell,\n .shell-wide {\n max-width: 750px;\n }\n\n .shell-mobile {\n padding-right: 15px;\n }\n}\n\n@media (min-width: 992px) {\n\n .shell,\n .shell-wide {\n max-width: 970px;\n }\n}\n\n@media (min-width: 1200px) {\n .shell {\n max-width: 1080px;\n }\n\n .shell-wide {\n max-width: 1200px;\n }\n}\n\n@media (min-width: 1800px) {\n .shell-wide {\n max-width: 1800px;\n }\n}\n\n.siteFooterRevampMainWrapper {\n background: #151629;\n padding-top: 80px;\n}\n\n.fiveColumnWrapper {\n display: block;\n padding-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper {\n text-align: center;\n}\n\n.fiveColumnWrapper .oneColumnWrapper h2 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n padding-bottom: 24px;\n margin: 0;\n}\n\n\n.fiveColumnWrapper .oneColumnWrapper h3 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 300;\n line-height: 20px;\n margin: 0;\n padding: 0px;\n margin-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper p {\n color: rgba(242, 244, 248, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n /* 200% */\n letter-spacing: 1px;\n text-transform: uppercase;\n padding-bottom: 6px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper {\n padding-bottom: 30px;\n}\n\n.hiringTag {\n padding: 2px;\n margin-left: 5px;\n color: var(--Color, #FFF);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n letter-spacing: 0.5px;\n text-transform: uppercase;\n background: rgba(41, 42, 71, 0.29);\n}\n\n/*section2*/\n.borderLine {\n border: 1px solid #F2F4F8;\n width: 100%;\n opacity: 0.1;\n /* margin: 50px; */\n}\n\n.borderLine2 {\n border: 1px solid #F2F4F8;\n max-width: 100%;\n opacity: 0.1;\n}\n\n.siteFooterSection2 {\n padding: 45px 0px;\n}\n\n.fortanixLogoContainer {\n display: flex;\n justify-content: space-between;\n align-items: center;\n padding-bottom: 24px;\n}\n\n.fortanixLogoContainer .starRatingWrapper h4 {\n color: var(--Color, #FFF);\n font-family: var(--heading-font-family);\n font-size: 20px;\n font-style: normal;\n font-weight: 700;\n line-height: normal;\n font-variant: all-small-caps;\n letter-spacing: 1px;\n padding-bottom: 2px;\n}\n\n.starGroupImage {\n margin: 0;\n}\n\n.fortanixLogoContainer .gartnerWrapper p {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 0.5px;\n padding-bottom: 9px;\n}\n\n.complianceLogo {\n padding-top: 24px;\n display: flex;\n flex-direction: column;\n}\n\n.complianceLogo img {\n max-width: 90px;\n height: 90px;\n margin: 0 auto;\n padding: 12px;\n}\n\n\n/*section3*/\n.siteFooterRevampMainWrapper .footerBoxWrapper {\n background: rgba(41, 42, 71, 0.29);\n padding: 24px 0px;\n}\n\n.footerNavigationLinks {\n display: block;\n text-align: center;\n}\n\n.footerNavigationLinks h4 {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 0.5px;\n padding: 14px;\n}\n\n\n@media only screen and (min-width: 768px) {\n .fiveColumnWrapper {\n display: flex;\n justify-content: space-between;\n padding-bottom: 5px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 18%;\n text-align: left;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper:nth-child(3) {\n padding-bottom: 60px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper3 p {\n padding-top: 38px;\n }\n\n .complianceLogo {\n padding: 24px 0px 0px;\n display: flex;\n flex-direction: row;\n gap: 40px;\n flex-wrap: wrap;\n }\n\n .complianceLogo img {\n padding: 0px;\n }\n\n .footerNavigationLinks {\n display: flex;\n justify-content: space-between;\n }\n\n .footerNavigationLinksFirst {\n display: flex;\n gap: 35px;\n align-items: center;\n }\n\n .footerNavigationLinks h4 {\n padding: 0px;\n }\n\n .siteFooterSection2Wrapper {\n display: flex;\n gap: 25px;\n justify-content: space-between;\n align-items: flex-start;\n }\n\n .hiringTag {\n font-size: 8px;\n }\n}\n\n@media only screen and (min-width: 1022px) {\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 22%;\n text-align: left;\n }\n\n .hiringTag {\n font-size: 10px;\n\n }\n}\n\n#section-footer-revamp {\n background-color: #151629;\n padding-bottom: 0;\n}\n\n/* #section-footer-revamp .footer-seperator {\nheight: 9px;\nbackground: linear-gradient(89.99deg, #998bed 14.37%, #70f8f8 95.31%);\n} */\n\n#section-footer-revamp .brand img {\n height: 22px;\n}\n\n#section-footer-revamp .address {\n color: #f2f4f8;\n font-weight: 500;\n}\n\n#section-footer-revamp .address label {\n font-weight: 700;\n display: block;\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address a,\n#section-footer-revamp .address a:active,\n#section-footer-revamp .address a:link,\n#section-footer-revamp .address a:hover,\n#section-footer-revamp .address a:visited {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address>div {\n margin-bottom: 15px;\n position: relative;\n}\n\n#section-footer-revamp.new-footer .address>div {\n opacity: 0.6;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 300;\n line-height: 23px;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .address>div>img {\n position: absolute;\n left: -36px;\n display: none;\n}\n\n#section-footer-revamp .address>div>img.active {\n display: block;\n}\n\n@media (max-width: 480px) {\n #section-footer-revamp .brand img {\n height: 38px;\n }\n\n #section-footer-revamp .address {\n font-size: 10px !important;\n padding-bottom: 0px !important;\n }\n\n #section-footer-revamp .social-footer {\n display: none;\n }\n\n #section-footer-revamp .subscribe {\n display: none;\n }\n\n #section-footer-revamp .second-menu {\n padding-bottom: 0px !important;\n }\n}\n\n#section-footer-revamp .awards-wrapper {\n margin-top: 24px;\n width: 280px;\n display: flex;\n flex-wrap: wrap;\n justify-content: space-between;\n align-items: center;\n}\n\n#section-footer-revamp .awards-wrapper img {\n margin: 4px;\n}\n\n#section-footer-revamp .c {\n position: relative;\n margin-top: 0;\n}\n\n#section-footer-revamp .c:last-child::after {\n width: 0;\n}\n\n#section-footer-revamp .range {\n align-items: flex-start;\n}\n\n#section-footer-revamp .page-foot {\n background: rgba(41, 42, 71, 0.9);\n padding: 15px 0;\n color: rgba(255, 255, 255, 0.49);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .page-foot p {\n font-family: var(--heading-font-family);\n}\n\n#section-footer-revamp .page-foot a {\n color: #00c6da;\n}\n\n#section-footer-revamp .page-foot a:hover {\n opacity: 0.5;\n}\n\n#section-footer-revamp .address {\n padding: 24px 0 0;\n font-size: 14px;\n line-height: 20px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n}\n\n.rights * {\n margin-right: 0;\n}\n\n#section-footer-revamp .address a {\n color: #fff;\n}\n\n#section-footer-revamp .address a:hover {\n opacity: 0.7;\n}\n\n#section-footer-revamp .social-footer {\n font-size: 26px;\n}\n\n#section-footer-revamp .social-footer ul {\n padding-top: 30px;\n}\n\n#section-footer-revamp .social-footer li {\n display: inline;\n padding-right: 12px;\n}\n\n#section-footer-revamp .subscribe {\n padding-left: 30px;\n margin-top: 16px;\n}\n\n#section-footer-revamp .subscribe .message-ok {\n color: #fff;\n}\n\n#section-footer-revamp .subscribe .info {\n font-size: 12px;\n line-height: 17px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #000000;\n}\n\n#section-footer-revamp .subscribe .info>div {\n font-family: var(--heading-font-family);\n font-weight: 600;\n margin-bottom: 12px;\n}\n\n#section-footer-revamp .subscribe form label {\n color: #26546d;\n font-family: var(--heading-font-family);\n font-size: 12px;\n margin-top: 15px;\n}\n\n/* #section-footer-revamp .subscribe form input[type=\"email\"] {\nborder: 1px solid #96dce8;\nbackground-color: #fff;\nbox-sizing: border-box;\nborder-radius: 3px;\nfont-size: 12px;\npadding: 5px;\nheight: auto;\n} */\n\n/* #section-footer-revamp .subscribe form input[type=\"submit\"] {\nbackground-color: #00c6da;\nwidth: 100%;\nmargin: 0;\n} */\n\n#section-footer-revamp .subscribe form .grecaptcha-badge {\n margin-top: 15px;\n background: #eee;\n}\n\n#section-footer-revamp .subscribe form .form-validation {\n display: none;\n}\n\n#section-footer-revamp .second-menu {\n font-size: 12px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-weight: 500;\n text-transform: uppercase;\n line-height: 16px;\n padding-left: 0;\n}\n\n#section-footer-revamp .icons-wrapper {\n display: flex;\n padding-bottom: 40px;\n}\n\n#section-footer-revamp .icons-wrapper img {\n padding-right: 40px;\n}\n\n#section-footer-revamp .second-menu a {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu>li {\n padding-bottom: 20px;\n}\n\n#section-footer-revamp .second-menu>li>a {\n font-weight: 600;\n}\n\n#section-footer-revamp .second-menu ul {\n padding: 9px 0 5px;\n font-size: 12px;\n margin-bottom: 15px;\n}\n\n#section-footer-revamp .second-menu ul li {\n text-transform: none;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #f2f4f8;\n padding-bottom: 7px;\n padding-top: 20px;\n}\n\n#section-footer-revamp .second-menu ul li:last-child {\n padding-bottom: 0;\n}\n\n#section-footer-revamp .second-menu ul li span {\n color: rgba(242, 244, 248, 0.5);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n letter-spacing: 1px;\n text-transform: uppercase;\n display: block;\n}\n\n#section-footer-revamp .second-menu ul li a {\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 400;\n line-height: 20px;\n}\n\n#section-footer-revamp .second-menu ul li a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp area#usa+span {\n line-height: 24px;\n content: \"US\";\n position: absolute;\n top: 60px;\n left: 9px;\n cursor: pointer;\n width: 70px;\n height: 23px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n text-transform: uppercase;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#usa+span {\n top: 35px;\n}\n\n#section-footer-revamp area#usa {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 41px;\n top: 80px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#usa {\n top: 55px;\n}\n\n#section-footer-revamp area#india+span {\n line-height: 22px;\n content: \"India\";\n cursor: pointer;\n position: absolute;\n top: 65px;\n left: 120px;\n width: 62px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#india+span {\n top: 40px;\n}\n\n#section-footer-revamp area#india {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 144px;\n top: 83px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#india {\n top: 58px;\n}\n\n#section-footer-revamp area#singapure+span {\n line-height: 22px;\n content: \"Singapore\";\n cursor: pointer;\n position: absolute;\n top: 123px;\n left: 123px;\n width: 84px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#singapure+span {\n top: 98px;\n}\n\n#section-footer-revamp area#singapure {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 164px;\n top: 120px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#singapure {\n top: 95px;\n}\n\n#section-footer-revamp area#netherlands+span {\n line-height: 22px;\n content: \"Europe\";\n cursor: pointer;\n position: absolute;\n top: 94px;\n left: 65px;\n width: 66px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#netherlands+span {\n top: 69px;\n}\n\n#section-footer-revamp area#netherlands {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 106px;\n top: 91px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#netherlands {\n top: 66px;\n}\n\n#section-footer-revamp area.inactive+span,\n#section-footer-revamp area.inactive+span {\n opacity: 30%;\n}\n\n#section-footer-revamp area.inactive,\n#section-footer-revamp area.inactive {\n opacity: 30%;\n}\n\n#section-footer-revamp .fortanix-logos-wrapper.second-menu.first-child {\n padding: 0;\n}\n\n#section-footer-revamp .fortanix-logo {\n display: flex;\n align-items: center;\n margin-bottom: 40px;\n}\n\n#section-footer-revamp .fortanix-logo img {\n height: 28px;\n padding-right: 40px;\n}\n\n#section-footer-revamp .fortanix-logo span {\n display: block;\n padding-left: 40px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 16px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n border-left: 1px solid #18b6ee;\n}\n\n#section-footer-revamp .compliance-logo {\n display: flex;\n align-items: flex-end;\n flex-wrap: wrap;\n}\n\n#section-footer-revamp .compliance-logo img {\n padding-right: 25px;\n margin-bottom: 20px;\n}\n\n#section-footer-revamp .hs_email .input::after {\n right: -5px;\n top: 6px;\n}\n\n.section-40 {\n padding-top: 40px;\n padding-bottom: 40px;\n}\n\n.section-40.border-top {\n border-top: 1px solid rgb(242, 244, 248, 0.1);\n}\n\n.section-20 {\n padding-top: 20px;\n padding-bottom: 20px;\n}\n\n.range {\n margin-left: -15px;\n margin-right: -15px;\n}\n\n[class*=\"cell-\"] {\n padding-left: 15px;\n padding-right: 15px;\n}\n\n@media (min-width: 480px) {\n .range {\n display: -ms-flexbox;\n display: -webkit-flex;\n display: flex;\n -ms-flex: 0 1 auto;\n -webkit-flex: 0 1 auto;\n flex: 0 1 auto;\n -webkit-flex-direction: row;\n -ms-flex-direction: row;\n flex-direction: row;\n -webkit-flex-wrap: wrap;\n -ms-flex-wrap: wrap;\n flex-wrap: wrap;\n }\n\n .range>[class*=\"cell\"] {\n -ms-flex: 0 0 auto;\n -webkit-flex: 0 0 auto;\n flex: 0 0 auto;\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 768px) {\n #section-footer-revamp .second-menu.first-child {\n padding-top: 40px;\n }\n\n .section-sm-top-75 {\n padding-top: 75px;\n }\n\n .text-sm-left {\n text-align: left;\n }\n\n .range-sm-middle {\n -webkit-align-items: center;\n -ms-flex-align: center;\n align-items: center;\n }\n\n .range>.cell-sm-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-sm-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-sm-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-sm-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-sm-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-sm-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-sm-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-sm-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-sm-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-sm-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-sm-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-sm-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 992px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-md-center {\n -webkit-justify-content: center;\n -ms-flex-pack: center;\n justify-content: center;\n }\n\n .range>.cell-md-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-md-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-md-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-md-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-md-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-md-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-md-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-md-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-md-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-md-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-md-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-md-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 1200px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-lg-left {\n -webkit-justify-content: flex-start;\n -ms-flex-pack: start;\n justify-content: flex-start;\n }\n\n .range>.cell-lg-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-lg-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-lg-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-lg-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-lg-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-lg-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-lg-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-lg-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-lg-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-lg-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-lg-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-lg-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (max-width: 767px) {\n .map-container {\n width: max-content;\n margin: 0 auto;\n position: relative;\n }\n\n #section-footer-revamp area#netherlands+span {\n top: 70px;\n left: 50px;\n }\n\n #section-footer-revamp area#netherlands {\n top: 67px;\n left: 91px;\n }\n\n #section-footer-revamp area#singapure+span {\n top: 98px;\n left: 117px;\n }\n\n #section-footer-revamp area#singapure {\n top: 95px;\n left: 149px;\n }\n\n #section-footer-revamp area#india+span {\n top: 39px;\n left: 109px;\n }\n\n #section-footer-revamp area#india {\n top: 58px;\n left: 127px;\n }\n\n #section-footer-revamp area#usa+span {\n top: 38px;\n left: -8px;\n }\n\n #section-footer-revamp area#usa {\n left: 24px;\n top: 58px;\n }\n\n #section-footer-revamp .second-menu {\n padding-left: 0;\n }\n}\n\n\n@media only screen and (max-width: 767px) {\n\n /* .fortanixLogoContainer {\n padding: 20px;\n margin-top: 0;\n}\n */\n #section-footer .icons-wrapper {\n margin-bottom: 30px;\n justify-content: center;\n }\n\n #section-footer .fortanix-logo {\n flex-direction: column;\n }\n\n #section-footer .fortanix-logo img {\n padding: 0;\n }\n\n #section-footer .fortanix-logo span {\n padding: 0;\n border: 0;\n margin-top: 20px;\n }\n\n #section-footer .compliance-logo {\n display: flex;\n align-items: center;\n flex-direction: column;\n }\n\n #section-footer .compliance-logo img {\n padding-right: 0;\n margin-bottom: 20px;\n }\n}\n\n/* SiteFooterRevamp Map styles */\n\n#section-footer-revamp .address {\n text-align: center;\n}\n\n@media only screen and (min-width:768px) {\n #section-footer-revamp .address {\n text-align: left;\n }\n\n #section-footer-revamp .map-container {\n min-width: 250px;\n }\n\n .footerNavigationLinksLast {\n padding-right: 90px;\n }\n}\n\n@media only screen and (min-width:1022px) {\n #section-footer-revamp .map-container {\n min-width: 300px;\n }\n\n}\n\n.fiveColumnWrapper .oneColumnWrapper a,\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper a {\n display: block;\n}"},"editableProperties":[],"children":[]}]}]},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/layouts/footer","rt":"json"},"3877686455":{"b":{"result":{"updatedOn":"Updated on","minuteToRead":"Minute to read","minutesToRead":"Minutes to read","contributors":"Contributors","print":"Print","summary":"Summary","share":"Share","shareThis":"Share this","dark":"Dark","light":"Light","tableOfContents":"Table of contents","search":"Search","filter":"Filter","wasThisArticleHelpful":"Was this article helpful?","yes":"Yes","no":"No","comments":"Comment","contents":"Contents","tags":"Tags","relatedArticles":"Related articles","attachments":"Attachments","skip":"Skip","submit":"Submit","noMatchingResultsFound":"No matching results found","author":"Author","backToArticle":"Back to article","articles":"Articles","viewAllResultsFor":"View All Results","thanksForYourFeedback":"Thank you for your feedback","likeRemoved":"Like removed","disLikeRemoved":"Dislike removed","feedbackNotSaved":"Feedback not saved; dislike closed without comment","leaveAFeedback":"Leave a feedback","pleaseProvideYourEmail":"Please provide your email","new":"New","update":"Updated","tag":"Tag","optional":"Optional","anyAdditionalFeedback":"Any additional feedback?","noContribution":"The user has not contributed to any of the article","whatsNewTitle":"Recently updated articles","noNewArticleFound":"No new article(s) found","deprecated":"Deprecated","downloadPdf":"PDF","versionLanguage":"Workspace / Language","category":"Category","select":"Select","year":"Year","months":"Months","days":"Days","selectAll":"Select all","clear":"Clear","apply":"Apply","last":"Last","selectSpecificDate":"Select specific date","start":"Start","end":"End","gotoAdvancedSearch":"Go to advanced search","custom":"Beta","previous":"Previous","next":"Next","openInPortal":"Open in portal","back":"Back","question":"Question","changeQuestion":"Change question","solvedMyIssue":"This solved my issue","notSolvedMyIssue":"None of the answers solved my issue","noQuestionsFound":"No questions found","searchAgain":"Search again","changeAnswer":"Change answer","didNotHelp":"No didn't help","close":"Close","selectFile":"Select file","fileSizeLimit":"Attach file (Max 5 files each 2MB)","fileCountLimit":"You can upload maximum of 5 files","moreThan2MBSize":"is more than 2MB","getArticleContent":"Obtaining the article content","failedToGetArticle":"Failed to obtain selected article. Check network tab for detailed error","processingYourRequest":"Processing your request","requestNotSubmitted":"Your request is not submitted. Please try later","cancel":"Cancel","enterComment":"Please enter valid comment","validPhoneNumber":"Please enter valid phone number","validEmail":"Please enter valid email","validName":"Please enter valid name","searchNotFound":"No search results found for","searchResult":"Search results for","fileSelected":"files selected","filesNotAllowed":"exe, cert file types are not allowed","refreshPageGetArticle":"Failed to obtain the article. Refresh your page and try again","noSearchPerformed":"No search performed","showFullArticle":"Show full article","openArticle":"Open article","howWeCanImproveThisArticle":"How can we improve this article?","yourFeedback":"Your feedback","enterYourComments":"Enter your comment","yourEmail":"Email","notifyMeAboutChange":"Notify me about change","needMoreInfo":"Need more information","difficultToUnderstand":"Difficult to understand","missingBrokenLink":"Missing/broken link","irrelevantContent":"Inaccurate or irrelevant content","others":"Others","yourEmailErrorText":"Please enter a valid email","send":"Send","ourTeamWillGetBackWithYou":"Thank you for your feedback! Our team will get back to you","feedbackValidComment":"Please enter valid comment","enterYourCommentsErrorText":"Please enter your comment","email":"Enter your email","characterLimit":"Character limit","feedbackCancel":"Cancel","inThisCategory":"in this category","writtenBy":"Written by","article":"Article","lastMonth":"Last 30 days","lastWeek":"Last 7 days","last24Hours":"Last 24 Hours","workspace":"Workspace","workspaces":"Workspaces","language":"Language","languages":"Languages","date":"Date","customRange":"Custom range","moreArticleFilters":"Go to advanced search","specific":"Specific","current":"Current","categories":"Categories","all":"All","none":"None","publishedOn":"Published on","inThisArticle":"In this article","readTime":"minute(s) read","editArticle":"Edit article","nextArticle":"Next article","previousArticle":"Previous article","files":"Files","viewResultsInPage":"Go to search page","contributor":"Contributor","whatsNew":"What's new","helpUsToImproveArticle":"Help us to improve this article","enterYourFeedbackHere":"Enter your feedback here","notifyMeAboutUpdates":"Notify me about updates","thanksForGoingExtraMile":"Happy to have assisted you. Your further feedback would be greatly appreciated","informationNotNeeded":"We're sorry the information wasn't what you needed","noMatchingSearchFound":"We're sorry. No matching results were found","notFoundWhatYouNeed":"Having trouble finding what you need? Share your feedback","typosInSearch":"Check your search for typos","clearFilters":"Try clearing some filters","differentSearchTerm":"Try a different search term","clearAll":"Clear all","articleBack":"Back","preparingPDFDownload":"Preparing your PDF for download","pdfDownloaded":"PDF downloaded successfully","systemTheme":"Auto (System theme)","resultsFoundFor":"results found for","keyword":"Keyword","searchGlossaryTerms":"Search glossary terms","glossary":"Glossary","whatLookingFor":"What are you looking for?","searchNext":"Next","searchPrevious":"Previous","subCategories":"Sub categories","categoryView":"Category view","articleLinkCopied":"Article link copied to clipboard","filters":"Filters","noDataFound":"No data found","publishedUpdated":"Published/Updated","updated":"Updated","activity":"Activity","linkedTag":"linked to this tag","previewSubmit":"Submission not allowed in preview mode","apidocsArticles":"API Endpoints","noGlossaryFound":"No glossary terms available","searchCategoryTitles":"Search category titles","contributed":"contributed","heyIam":"Hey, I am","howCanIHelpYou":"How can I help you?","ask":"Ask","generativeAiFacilitatingKnowledge":"facilitating knowledge discovery through conversational intelligence","workingDiligently":"is working diligently to provide you the accurate answer","sourceArticles":"Source articles","noResultsFound":"No results found","provideMoreContext":"Provide more context or information so that I can better understand and assist you","articleSummary":"Article summary","answerCopied":"Answer copied!","didYouFindThisSummaryHelpful":"Did you find this summary helpful?","summaryNotAvailableForTheArticle":"Summary not available for the article","sorryThatInfoDidNotMeetYourExpectations":"We're sorry that the information did not meet your expectations.","isWorkingOnYourRequest":"is working on your request","failedToSubmitYourFeedback":"Failed to submit your feedback","searchLimitExceeded":"Search Limit Exceeded. Please upgrade the plan.","poweredBy":"Powered by","suggestionsForImprovements":"Suggestions for improvements","exportPDF":"Export PDF","exportArticles":"Export articles","pdfTemplates":"PDF Templates","searchForCategoryAndArticle":"Search for category & article","generatePdfViaEmail":"The requested PDF will be delivered to your email","noCategoryAndArticleFound":"No category and articles found","follow":"Follow","unfollow":"Unfollow","acknowledgmentIsRequired":"Acknowledgment is required","clickToReviewAndConfirm":"Click to review and confirm","acknowledgmentStatus":"Acknowledgment status","required":"Required","acknowledged":"Acknowledged","acknowledgementRequired":"Acknowledgment required","awaitingYourAcknowledgment":"Awaiting your acknowledgment","acknowledgedOn":"Acknowledged on","acknowledgedSuccessful":"You have successfully acknowledged this article on","acknowledgmentIsRequiredUponReading":"Your acknowledgment is required upon reading","acknowledgmentConfirmation":"I confirm that I have read and understood the information above","acknowledgmentConfirmedMessage":"Thank you for confirming that you have read this article!","upToDateRead":"Awesome!!! you are up to date with your reads","notifyNewAcknowledgement":"We'll notify you of any new acknowledgments required in the future.","acknowledgementReadRequired":"Looks like you have some reading to do!","acknowledgementRequireDescription":"Please read the 'Required' articles and submit your acknowledgment.","continueConversation":"Continue conversation with","aiDisclaimer":"AI can make mistakes. Please verify important information.","generatedAnswer":"generated answer","chatWithEddy":"Chat with","enterKeywords":"Enter Keywords","hitEnterEddy":"Hit enter to Ask","askQuestion":"Ask question","backToSearch":"Back to search","orEnterKeywords":"or enter keywords","newConversation":"New conversation","backToConversation":"Go back to conversation","suggested":"suggested","summarized":"Summarized","textToSpeechInlineCodeBlock":"There is an inline code block that you might want to see.","textToSpeechCodeBlock":"There is a code block that you might want to see.","textToSpeechLatex":"There is a mathematical expression that you might want to see.","textToSpeechTable":"There is a table present that you may want to look at.","textToSpeechInsertFile":"There is an inserted file here.","textToSpeechVideo":"There is a video that you might want to see.","textToSpeechSVG":"There is a SVG that you might want to see.","textToSpeechImage":"An image without description is here. Please refer to the visual content for details.","textToSpeechImageWithDescription":"There is an image with description:","textToSpeechLink":"A link is provided here.","textToSpeechLinkWithDescription":"A link with","textToSpeechIsProvidedHere":"is provided here.","listen":"Listen","listening":"Listening","player":"Player","paused":"Paused","loading":"Loading","failedToLoadAudio":"Something went wrong. Please try again.","copyLink":"Copy link","hasContributedToThisContent":"has contributed to this content","switchTheme":"Switch theme","copy":"Copy","like":"Like","dislike":"Dislike","tellUsMore":"Tell us more","leaveAComment":"Leave a comment","aiNeedMoreInformation":"Need more information","aiInaccurateOrIrrelevantContent":"Inaccurate or irrelevant content","aiIncorrectSourcesReferences":"Incorrect sources/references","aiDifficultToUnderstand":"Difficult to understand","aiMissingInformation":"Missing information","aiDontLikeTheStyle":"Don’t like the style","aiOthers":"Others","aiEnterAYourFeedbackHere":"Enter a your feedback here(optional)","aiNotifyMeAboutUpdates":"Notify me about updates","sorryTheInformationWasntHelpful":"Sorry the information wasn't helpful","shareYourFeedback":"Share your feedback","aiPleaseProvideYourEmail":"Please provide your email","areYouLookingToFindAnswersFor":"Are you looking to find answers for","didnotFindWhatYouAreLookingFor":"Didn't find what you are looking for?","documentationBreadCrumb":"Documentation","articleAdded":"article added","articleUpdated":"article updated","exploreArticles":"EXPLORE ARTICLES","followWarningMessage":"You will receive periodic email updates and can unsubscribe anytime.","followCategoryMessage":"Enter your email to get updates whenever any article is updated/published in this category.","followCategoryTitle":"Follow this category","followArticleMessage":"Enter your email to get updates whenever this article is updated.","followArticleTitle":"Follow this article","articlesUpdated":"articles updated","articlesAdded":"articles added","followArticleSuccessMessage":"You are now following this article","unFollowArticleSuccessMessage":"You are no longer following this article","followCategorySuccessMessage":"You are now following this category","unFollowCategorySuccessMessage":"You are no longer following this category","decisionTrees":"Decision trees","dtUpdatedOn":"Updated on","dtPublishedOn":"Published on","dtExpand":"Expand","dtCollapse":"Collapse","dtShare":"Share","dtBack":"Back","dtCategoryView":"Category View","dtSubCategories":"Sub Categories","dtSteps":"Steps","dtRestart":"Restart","decisionTree":"Decision tree","dtExploreDecisionTrees":"EXPLORE DECISION TREES","dtCopyLink":"Copy Link","dtHasContributedToThisContent":"has contributed to this content","wgtPageHelp":"Page Help","wgtTopSearchedArticle":"Top Searched Article","wgtArticles":"Articles","wgtKnowledgeBase":"Knowledge Base","wgtFilter":"Filter","wgtAsk":"Ask","wgtOrSearchArticle":"or Search Article","wgtSearch":"Search","wgtNoTopArticles":"There is no top search article found","wgtBack":"Back","wgtOpenArticle":"Open article","wgtExitSearch":"Exit Search","wgtNoMatchingResultsFound":"No matching results found","wgtClose":"Close","wgtOurTeamWillAddressThisShortly":"Our team will address this shortly"},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"h":{},"s":200,"st":"OK","u":"https://d360-prod-us-web-az-kb-2-api.azurewebsites.net/localization/variables","rt":"json"},"referer":"","user_agent":{"isYaBrowser":false,"isAuthoritative":true,"isMobile":false,"isMobileNative":false,"isTablet":false,"isiPad":false,"isiPod":false,"isiPhone":false,"isiPhoneNative":false,"isAndroid":false,"isAndroidNative":false,"isBlackberry":false,"isOpera":false,"isIE":false,"isEdge":false,"isIECompatibilityMode":false,"isSafari":false,"isFirefox":false,"isWebkit":true,"isChrome":false,"isKonqueror":false,"isOmniWeb":false,"isSeaMonkey":false,"isFlock":false,"isAmaya":false,"isPhantomJS":false,"isEpiphany":false,"isDesktop":false,"isWindows":false,"isLinux":false,"isLinux64":false,"isMac":false,"isChromeOS":false,"isBada":false,"isSamsung":false,"isRaspberry":false,"isBot":false,"isCurl":false,"isAndroidTablet":false,"isWinJs":false,"isKindleFire":false,"isSilk":false,"isCaptive":false,"isSmartTV":false,"isUC":false,"isFacebook":false,"isAlamoFire":false,"isElectron":false,"silkAccelerated":false,"browser":"Apple WebKit","version":"537.36","os":"unknown","platform":"unknown","geoIp":{},"source":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","isWechat":false,"electronVersion":""},"project-info-key":{"project":{"id":"c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9","name":"Fortanix","projectStatus":"Active","domainSetting":{"subDomainName":"fortanix","subDomainCName":"support.fortanix.com"},"projectSetting":{"isPortalLocalizationEnabled":false,"documentationSetting":{"isEnabled":true,"displayContributors":false,"displayPublishedDate":true,"displayComments":true,"displayTableOfContent":true,"tableOfContentText":"Table of contents","displayThemeSelection":true,"displayShareButton":true,"redirections":[],"displayBreadcrumb":true,"displayPrintButton":true,"displayFeedbackForm":true,"displayRelatedArticles":true,"isEnabledRelatedArticlesTwoWay":true,"displayRelatedArticlesinBottomOrRight":0,"displayArticleAttachments":true,"displayArticleAttachmentsinBottomOrRight":0,"displayArticleTags":true,"displayEstimatedReadingTime":true,"openFirstLevelOfArticlesInAllCategory":false,"contentType":2,"showLinesinMarkdownEditor":false,"tocTags":["h2","h3","h4"],"showFacebookShareButton":true,"showTwitterShareButton":true,"showLinkedinShareButton":true,"showEmailShareButton":true,"isEnabledAutomaticArticleStatus":false,"automaticArticleStatusExpireDays":30,"isEnabledWhatsNewFeature":false,"isEnabledArticleStaleStatus":false,"isNotifyAllContributorsEnabled":false,"articleStaleExpireDays":30,"displayDownloadPdfButton":true,"showAttachmentsTabInSearch":false,"isEnabledCustomArticleStatus":true,"customStatusBackgroundcolor":"#8DBACF","customStatusForegroundcolor":"#fff","customStatusBordercolor":"","showPreviousNextNavigations":true,"isAdvancedSearchEnabled":true,"showBubbleUpStatus":true,"showDownloadApiReferenceOption":false,"isNoSearchResultFeedbackEnabled":true,"toEnableAllVersionInAdvancedSearch":false,"searchBoxPosition":0,"showOutlineView":true,"toDisableTranslationInHyperLinks":false,"toDisableStopWords":true,"showPdfTemplatesInKb":true,"showFollowButton":true,"faqSettings":{"accordionBorderStyle":0,"accordionExpandIconType":0,"accordionExpandIconPosition":0,"accordionExpandState":0},"enableReadOutLoudInKb":false},"projectProtectionSetting":{"projectProtectionLevel":2},"customScriptsSetting":{"customCss":"/********************\n ** WOW SITES TEAM\n ** STYLES START\n********************/\n:root {\n --color-primary: #081353;\n --color-secondary: #007A8D;\n --color-tertiary: #151629;\n --heading-font-family: 'Montserrat', sans-serif !important;\n --body-font-family: 'Open Sans', sans-serif !important;\n --article-content-font-family: 'Open Sans', sans-serif !important;\n --color-border: #B1C5E2;\n\n --color-white: #FFF;\n --color-fog: #F2F4F8;\n --color-smoke: #EDEFF2;\n --color-dark: #111418;\n\n --theme-dark-bg-default: #18181b;\n --theme-dark-bg-custom: #212121;\n --theme-dark-border: #3A3A3A;\n}\n\n/*Default*/\n.default site-home-page h1,\n.default site-home-page h2,\n.default site-home-page h3,\n.default site-home-page h4,\n.default site-home-page h5,\n.default site-home-page h6 {\n font-weight: 700;\n}\n\n.default site-home-page p,\n.default site-home-page span,\n.default site-home-page a,\n.default site-home-page input,\n.default site-home-page label,\n.default site-home-page li {\n font-weight: 400;\n}\n\n.default site-home-page a {\n text-decoration: none;\n}\n\n/*Layout*/\n.default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n width: 95% !important;\n max-width: 95% !important;\n margin: 0 auto !important;\n}\n\n.default site-home-page .container {\n width: 95% !important;\n max-width: 95% !important;\n padding: 0 !important;\n margin: 0 auto !important;\n}\n\n@media screen and (min-width: 1440px) {\n .default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n width: 1380px !important;\n max-width: 1380px !important;\n }\n\n .default site-home-page .container {\n width: 1300px !important;\n max-width: 1300px !important;\n }\n}\n\n@media screen and (max-width: 1240px) {\n\n .default site-home-page .container {\n width: 90% !important;\n max-width: 90% !important;\n }\n}\n\n.default site-home-page .section__row {\n display: flex;\n justify-content: space-between;\n flex-wrap: wrap;\n gap: 40px 24px;\n}\n\n@media screen and (max-width: 1080px) {\n .default site-home-page .section__row {\n justify-content: center;\n }\n}\n\n@media screen and (max-width: 600px) {\n .default site-home-page .section__row {\n flex-direction: column;\n }\n}\n\n.col--3 {\n width: calc(33.33% - 24px);\n}\n\n.col--2 {\n width: calc(50% - 24px);\n}\n\n@media screen and (max-width: 1080px) {\n .column {\n width: calc(50% - 24px);\n }\n}\n\n@media screen and (max-width: 600px) {\n .column {\n width: 100%;\n }\n}\n\n/*Typography*/\n.default site-home-page .section--heading {\n font-size: 22px;\n line-height: 32px;\n color: var(--color-primary);\n margin: 0 0 32px;\n}\n\n.default site-home-page .heading--sub {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-secondary);\n margin: 0 0 20px;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .section--heading,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .heading--sub {\n color: var(--color-white);\n}\n\n.default site-home-page p {\n font-size: 16px;\n line-height: 26px;\n margin: 0 0 16px;\n}\n\n.default site-home-page p:last-child {\n margin: 0;\n}\n\n/*Global*/\n.default site-home-page header+div {\n min-height: 100vh;\n background: var(--color-fog);\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page header+div {\n background: var(--theme-dark-bg-custom);\n}\n\n.default site-home-page figure {\n margin: 0;\n}\n\n.default site-home-page section {\n padding: 60px 0;\n}\n\n.default site-home-page .text--trunc {\n display: -webkit-box;\n -webkit-line-clamp: 2;\n -webkit-box-orient: vertical;\n overflow: hidden;\n}\n\n/*COMPONENT - CUSTOM CARD*/\n.custom__card {\n display: block;\n padding: 33px;\n background: var(--color-white);\n border: 1px solid var(--color-border);\n border-radius: 4px;\n}\n\nhtml[data-bs-theme=\"dark\"] .custom__card {\n background: var(--theme-dark-bg-default);\n border: 1px solid var(--theme-dark-border);\n}\n\n/*COMPONENT - ICON TEXT*/\n.icon__text {\n display: flex;\n align-items: center;\n}\n\n/*COMPONENT - LINK MORE*/\n.link--more,\n.link--more i {\n font-size: 16px;\n line-height: 26px;\n color: #795DA7;\n text-transform: uppercase;\n}\n\n.link--more {\n font-weight: 500 !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .link--more,\nhtml[data-bs-theme=\"dark\"] .link--more i {\n color: var(--color-white);\n}\n\n/*COMPONENT - BUTTON C2A*/\n.button--c2a {\n font-size: 16px;\n line-height: 26px;\n color: var(--color-white);\n display: inline-block;\n padding: 8px 24px;\n background: var(--color-secondary);\n border-radius: 6px;\n}\n\n/*Header*/\n.default site-home-page site-primary-header-section {\n max-height: initial !important;\n position: relative;\n box-shadow: 0 4px 4px rgba(0, 0, 0, 0.1)\n}\n\n.default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n height: auto !important;\n padding: 21px 0 24px;\n}\n\n.default site-home-page site-primary-header-section .nav-bar-brand img {\n width: 160px !important;\n max-width: initial !important;\n}\n\n.default site-home-page .nav-bar.primary-nav-bar::after {\n display: none;\n}\n\n.default site-home-page .nav-bar-nav.nav-l.divider {\n padding: 0 !important;\n border: 0;\n}\n\n.default site-home-page .nav-bar-nav.nav-l ul li {\n margin-right: 24px !important;\n}\n\n@media screen and (min-width: 1200px) {\n .default site-home-page .nav-bar-nav.nav-l ul li:first-child::after {\n content: \"\";\n width: 100%;\n height: 5px;\n position: absolute;\n top: calc(100% + 24px);\n left: 0;\n background: var(--color-secondary);\n }\n}\n\n.default site-home-page site-primary-header-section ul a span {\n font-family: var(--heading-font-family) !important;\n font-size: 16px !important;\n line-height: 26px !important;\n font-weight: 600 !important;\n color: var(--color-primary) !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page site-primary-header-section ul a span {\n color: var(--color-white) !important;\n}\n\n.nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"]::before {\n content: \"\";\n font-size: 20px;\n width: 20px;\n height: 20px;\n display: inline-block;\n position: relative;\n top: 4px;\n font-weight: 700;\n background-image: url('https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/health-dark.svg?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D');\n background-position: center;\n background-size: contain;\n background-repeat: no-repeat;\n}\n\nhtml[data-bs-theme=\"dark\"] .nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"]::before {\n background-image: url('https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/health%20icon.svg?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D');\n}\n\n.nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"] span {\n padding-left: 8px;\n font-weight: normal !important;\n}\n\nd360-header-profile button.btn-link {\n display: none;\n}\n\n/*Banner Section*/\n.default site-home-page .hero-section {\n padding: 60px 0 !important;\n}\n\n.default site-home-page .hero-section h1 {\n font-size: 40px;\n line-height: 48px;\n}\n\n.default site-home-page .hero-section .text-area {\n font-size: 18px !important;\n line-height: 24px;\n}\n\n@media only screen and (max-width: 600px) {\n .default site-home-page .hero-section h1 {\n font-size: 36px;\n line-height: 44px;\n }\n\n .default site-home-page .hero-section .text-area {\n font-size: 16px !important;\n line-height: 24px;\n padding-bottom: 0 !important;\n }\n}\n\n.default site-home-page .hero-section .search-box {\n width: 100% !important;\n margin-bottom: 40px;\n border: 1px solid var(--color-border) !important;\n border-radius: 100px !important;\n}\n\n@media only screen and (min-width: 1024px) {\n .default site-home-page .hero-section .search-box {\n width: 65% !important;\n }\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box {\n border-color: var(--theme-dark-border) !important;\n}\n\n.default site-home-page .hero-section .search-box span {\n color: var(--color-dark) !important;\n}\n\n.default site-home-page .hero-section .search-box .seach-key {\n border-radius: 100px !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section h1,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .text-area,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box span,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box .seach-key {\n color: var(--color-white) !important;\n}\n\n/*Categories Section*/\n\nsection.categories .heading {\n margin-bottom: 26px;\n}\n\nsection.categories .icon__text img {\n width: auto;\n height: 22px;\n}\n\nsection.categories .icon__text p {\n font-size: 12px !important;\n line-height: 22px !important;\n padding-left: 8px;\n}\n\n.default site-home-page section.categories .section--heading {\n margin-bottom: 10px;\n}\n\nsection.categories .list a {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-secondary);\n display: block;\n position: relative;\n padding-left: 23px;\n margin-bottom: 20px;\n}\n\nhtml[data-bs-theme=\"dark\"] section.categories .list a {\n color: var(--color-white);\n}\n\nsection.categories .list a::before {\n content: \"\";\n width: 15px;\n height: 15px;\n position: absolute;\n left: 0;\n top: 6px;\n background: url(https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/icon_bullet_list.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D) no-repeat center;\n background-size: contain;\n}\n\nhtml[data-bs-theme=\"dark\"] section.categories .list a::before {\n filter: brightness(0) invert(1);\n}\n\n/*Latest Section*/\n@media screen and (max-width: 1080px) {\n section.latest .section__row {\n align-items: flex-start;\n }\n}\n\nsection.latest .custom__card {\n padding: 24px;\n margin-bottom: 24px;\n}\n\nsection.latest .icon__text img {\n width: auto;\n height: 92px;\n}\n\nsection.latest .icon__text .content {\n padding-left: 16px;\n margin: 0;\n}\n\nsection.latest .icon__text .heading--sub {\n margin: 0;\n}\n\nsection.latest .icon__text .content p {\n color: var(--color-dark);\n}\n\nhtml[data-bs-theme=\"dark\"] section.latest .icon__text .content p {\n color: var(--color-white);\n}\n\n/*Video Section*/\nsection.video a.tile-box {\n display: block;\n border-radius: 4px;\n overflow: hidden;\n}\n\nsection.video .thumbnail--img {\n width: 100%;\n height: 290px;\n}\n\nsection.video .thumbnail--img img {\n width: 100%;\n height: 100%;\n object-fit: cover;\n}\n\nsection.video .icon__text {\n padding: 24px;\n background: var(--color-white);\n}\n\nsection.video .icon__text img {\n width: auto;\n height: 48px;\n}\n\nsection.video .icon__text .heading--sub {\n padding-left: 16px;\n margin: 0;\n}\n\nhtml[data-bs-theme=\"dark\"] section.video .icon__text .heading--sub {\n color: var(--color-secondary);\n}\n\n/*Footer*/\nfooter.footer__custom {\n padding: 60px 0;\n background: #151629;\n}\n\nhtml[data-bs-theme=\"dark\"] footer.footer__custom {\n background: var(--theme-dark-default);\n}\n\nfooter.footer__custom .block,\nfooter.footer__custom .links__block {\n display: flex;\n justify-content: space-between;\n gap: 24px;\n}\n\n@media screen and (max-width: 600px) {\n\n footer.footer__custom .block,\n footer.footer__custom .links__block {\n flex-direction: column;\n }\n}\n\nfooter.footer__custom .block a {\n display: block;\n}\n\nfooter.footer__custom h5,\nfooter.footer__custom .links a {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-fog);\n margin-bottom: 32px;\n}\n\nfooter.footer__custom .links {\n width: calc(33.33% - 24px);\n}\n\n@media screen and (max-width: 600px) {\n footer.footer__custom .links {\n width: 100%;\n }\n}\n\nfooter.footer__custom h6 {\n font-size: 14px;\n line-height: 24px;\n color: rgba(242, 244, 248, 0.5);\n text-transform: uppercase;\n margin-top: 24px;\n}\n\nfooter.footer__custom h6+a {\n color: var(--color-white);\n}\n\nfooter.footer__custom .brands {\n margin: 32px 0;\n}\n\nfooter.footer__custom .brands img {\n width: 90px;\n height: auto;\n margin-right: 38px;\n}\n\n.footer__custom .section__row {\n padding-top: 60px;\n margin-top: 60px;\n border-top: 1px solid rgba(255, 255, 255, 0.15);\n}\n\n.footer__custom .section__row .brands img {\n width: auto;\n height: 70px;\n}\n\n.footer__custom .section__row .column:last-child {\n text-align: right;\n}\n\n@media screen and (max-width: 600px) {\n .footer__custom .section__row .column:last-child {\n text-align: left;\n }\n}\n\n.footer__custom .section__row .column:last-child img {\n width: auto;\n height: 140px;\n}\n\n.footer__custom .section__row .column:last-child p {\n font-size: 12px;\n line-height: 23px;\n color: var(--color-fog);\n margin-top: 24px;\n}\n\n/*Articles Page*/\nsite-document .documentation-main,\nsite-document aside#left-panel {\n min-height: 80vh !important;\n}\n\n@media screen and (min-width: 1600px) {\n\n site-document .documentation-main,\n site-document aside#left-panel {\n min-height: 86vh !important;\n }\n}\n\n/********************\n ** WOW SITES TEAM\n ** STYLES END\n********************/\n\n\ncode[class*=language-] {\n padding: 0px !important;\n}\n\n.content_block .content_container .page-action .article_action_links ul li.selected>a {\n color: #21a8b5;\n}\n\na {\n text-decoration: none !important;\n}\n\n/*Tabbed widget*/\n.ui-state-active,\n.ui-widget-content .ui-state-active,\n.ui-widget-header .ui-state-active,\na.ui-button:active,\n.ui-button:active,\n.ui-button.ui-state-active:hover {\n border: none !important;\n background: none !important;\n}\n\n.content_block .content_container .content_block_text dl,\n.content_block .content_container .content_block_text ol,\n.content_block .content_container .content_block_text ul {\n padding-left: 1.5rem;\n}\n\n\n.ui-tabs .ui-tabs-nav li.ui-tabs-active .ui-tabs-anchor {\n color: white !important;\n background-color: #21a8b5;\n border-top-left-radius: 10px;\n border-top-right-radius: 10px;\n}\n\n.ui-tabs-tab .ui-tabs-anchor {\n background-color: white;\n color: #454545c2 !important;\n}\n\n.ui-tabs .ui-tabs-nav li {\n border: none;\n}\n\n.ui-widget-header {\n border: none !important;\n}\n\n.ui-tabs.ui-corner-all.ui-widget.ui-widget-content ul {\n margin-left: 0px !important;\n background: none;\n margin-top: 0px;\n border-bottom: 1px solid #c5c5c5 !important;\n}\n\n\n/**letter spacing**/\n.content_block_text {\n letter-spacing: normal !important;\n}\n\n/**call out info box**/\n.infoBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Info%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 5px;\n position: relative;\n}\n\n/**align call out**/\n.warningBox .title,\n.warningBox .blockquote-title,\n.infoBox .title,\n.infoBox .blockquote-title {\n display: inline-flex !important;\n}\n\n.successBox .title,\n.successBox .blockquote-title {\n display: inline-flex !important;\n}\n\n/**remove intro text from article heading**/\n.category-index-page .category-index-list .page-content {\n display: none !important;\n}\n\n\n\n.blockquote-title {\n align-items: center;\n display: flex;\n}\n\nblockquote.infoBox {\n border-left: 4px solid #abbfdd !important;\n background-color: #EAEFF6 !important;\n}\n\n/**Call out warning box**/\n.warningBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Warning%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 5px;\n position: relative;\n}\n\nblockquote.warningBox {\n border-left: 4px solid #f6a623 !important;\n background-color: #fff6e9 !important;\n}\n\n\n\n/**Call out Tip box**/\n.successBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Tip%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 4px;\n position: relative;\n}\n\nblockquote.successBox {\n border-left: 4px solid #80deea !important;\n background-color: #f2fbfc !important;\n}\n\n/**Call out Error box**/\nblockquote.errorBox {\n border-left: 5px solid #b0bec4 !important;\n background-color: #eceff1 !important;\n color: #1a1a1b;\n}\n\n/*\n.errorBox {\n color: #000000 !important;\n}\n\n.errorBox a:hover {\n text-decoration: underline !important;\n}\n*/\n\n\n/** table **/\ntable th {\n background: #6C6E9B !important;\n color: white;\n}\n\n/** code block title **/\ndiv.code-toolbar>.toolbar .toolbar-item:first-child {\n display: none !important;\n}\n\n/** Article snippet **/\n[_nghost-serverApp-c269487220] .category-index-page[_ngcontent-serverApp-c269487220] .category-index-list[_ngcontent-serverApp-c269487220] .page-content[_ngcontent-serverApp-c269487220] {\n display: none;\n}\n\n[_nghost-serverApp-c75797761] .nav-bar-nav[_ngcontent-serverApp-c75797761] ul[_ngcontent-serverApp-c75797761] {\n gap: 8px !important;\n}\n\n/*Code Block - Dark*/\n\n[_nghost-serverApp-c3480338300] .copy-to-clipboard-button {\n padding: 5px 4px !important;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item {\n background: #212630 !important;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item:last-child {\n border: none;\n color: #d8dee9;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item:last-child span {\n color: white;\n}\n\nem {\n font-weight: 400 !important;\n font-family: 'Inter' !important;\n}\n\n\n\n/*Table*/\n[_nghost-serverApp-c3480338300] div[data-type=table-content] table p {\n word-break: normal;\n}\n\n/*Callout color*/\n\n.successBox {\n color: black !important;\n}\n\n.warningBox {\n color: #000000 !important;\n}\n\n\n.errorBox {\n color: #000000 !important;\n}\n\n.infoBox {\n color: #000000 !important;\n}\n\n#removecopy .toolbar {\n display: none !important;\n}\n\n.ui-widget-content a {\n color: #0065FF !important;\n}\n\n.default .hero-section[_nghost-serverApp-c3510732403] .search-box[_ngcontent-serverApp-c3510732403],\n.default .hero-section [_nghost-serverApp-c3510732403] .search-box[_ngcontent-serverApp-c3510732403] {\n margin-bottom: 10px;\n}\n\n.infoBox a {\n font-weight: 400 !important;\n}\n\n#articleContent .tabs {\n border: 1px solid #c5c5c5;\n border-radius: 3px !important;\n padding: 10px !important;\n}\n\n#articleContent .tabs .tab-content {\n color: #333333 !important;\n background-color: transparent !important;\n border: none !important;\n border-top: 1px solid #d1d1d6 !important\n}\n\n#articleContent .tabs .tab.active {\n color: white !important;\n background-color: #21a8b5 !important;\n}\n\n#articleContent .tabs .tab {\n border-top-left-radius: 10px !important;\n border-top-right-radius: 10px !important;\n border: none !important;\n flex: inherit !important;\n min-width: inherit !important;\n font-size: 16px !important;\n}\n\n#articleContent .tabs .tab:not(.active):hover {\n background-color: transparent !important;\n}\n\n#articleContent .tabs .tab:not(.active) {\n color: #454545c2 !important;\n}\n\n[data-bs-theme=\"dark\"] #articleContent .tabs {\n background: #fff !important;\n}\n\n.follow-modal-body .follow-login {\n display: none !important;\n}","customJavaScript":"window.addEventListener(\"load\", function() {\n const logoWhite = \"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/logo_white.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D\";\n const logoColor = \"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/logo_color.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D\";\n \n const elNavLogo = document.querySelector(\".nav-bar-brand a img\");\n const elThemeOptionItems = document.querySelectorAll(\"div[aria-labelledby=themeOptions] button\");\n elThemeOptionItems.forEach(function(el) {\n el.addEventListener(\"click\", function(e) {\n elNavLogo.src = e.target.getAttribute(\"aria-label\") === \"Dark\" ? logoWhite : logoColor;\n })\n });\n\n const elNavLight = document.querySelector(\"html[data-bs-theme=light] .nav-bar-brand a img\");\n elNavLogo.src = elNavLight ? logoColor : logoWhite;\n \n $('#world-map area').click(function() {\n var $this = $(this);\n var country = $this.attr('id');\n var $areaLabel = $this.next();\n $this.siblings('area').addClass('inactive');\n $this.removeClass('inactive');\n $('#' + country + '-address').siblings().addClass('hidden');\n $('#' + country + '-address').removeClass('hidden');\n });\n\n $('#world-map span').click(function() {\n var $this = $(this);\n var $area = $this.prev();\n $area.trigger('click');\n });\n});","touched":true},"customScriptsSettingV1":{},"appearanceSetting":{"logoUrl":"https://cdn.us.document360.io/logo/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/345245b81b8d414da5f74b2852df3928-logo_color.png","logoText":"","useLogoText":false,"isThemeA":true,"favIconUrl":"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/favicon.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D","primaryColor":"#21a8b5","secondryColor":"#21a8b5","linkColor":"#21a8b5","hoverColor":"#156c74","visitedColor":"#21a8b5","layoutStyle":0,"linkLogoUrl":false,"isRemoveDocument360Logo":false,"headingFontFamily":"Montserrat","bodyFontFamily":"Open Sans","isFluidThemeSmall":false},"aiFeatureSettings":{"name":"","isAIAssistiveSearchEnabled":false,"aiSearchSettings":{"isAIAssistiveSearchEnabled":true,"isKbSiteEnabled":true,"isPublicApiEnabled":true,"isKBWidgetEnabled":false,"isCitationsDisabled":false,"isTurnstileDisabled":false,"enableANN":false,"responseTone":0,"responseLength":0,"aiExtensionSettings":{"isFreshServiceEnabled":false,"isFreshDeskEnabled":false},"isFeedbackFormDisabled":false,"isSourceArticleEnabled":false,"isAIAttachmentAssistiveSearchEnabled":false,"aiAttachmentAssistiveSearchFileSizeLimit":40},"isAIWriterEnabled":false,"isSEODescriptionGeneratorEnabled":false,"isTagRecommenderEnabled":false,"isTitleRecommenderEnabled":false,"isArticleSummarizerEnabled":false,"isRelatedArticlesRecommenderEnabled":false,"isAutomatedGlossaryGeneratorEnabled":false,"isDynamicRelatedArticlesEnabled":false,"isAIAltTextAutoGenerationDisabled":false,"isAIArticleCreationDisabled":false},"defaultChannelId":"42a0dfb4-2a13-46b8-b6e2-ac86232ce12e","isCookieConsentEnabled":false,"rememberState":true},"allProjectDocumentVersions":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false,"docsBaseUrl":"/docs"},{"id":"cd841a33-9655-4979-983c-b6b9fe875500","versionNumber":0,"baseVersionNumber":0,"versionCodeName":"v1-api","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2024-07-25T11:39:06.509Z","modifiedAt":"2024-07-25T11:39:06.509Z","slug":"v1-api","languageVersions":[{"id":"861dba71-84e3-4c9e-8f26-9d628c36f5fe","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":false}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":1,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectDocumentVersions":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectDocumentVersionsWithoutUserACL":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":false}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectUsers":[],"isProtected":true,"isIPRestrictionAllowed":true,"ipAddressRestrictions":[],"isEnterpriseEnabled":false,"isSSODirectLoginEnabled":false,"jwtConfigurationDetails":{"isJwtConfigured":false,"isJwtEnabled":false,"jwtLogOutUrl":""},"enableSearchHighlight":true,"isSubFolderHostingEnabled":false,"isIntegrationReloadRequired":false,"isIntegrationAvailable":true,"hostingPath":"docs","projectOnHold":false,"algoliaArticlesIndexId":"articles1","isDisplayVersionAsMenuEnabled":false,"isAccountActivated":true,"activatedOn":"01/01/0001 00:00:00","isSandboxProject":false,"isSubdomainLoginOnly":false,"enableSearchAttachmentsFeature":false,"isJwtLoginRequired":false,"siteDesign":{"theme":0,"logoSettings":{"logoUrl":"https://cdn.us.document360.io/logo/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/345245b81b8d414da5f74b2852df3928-logo_color.png","logoText":"","useLogoText":false,"showCustomRedirectionLink":false,"favIconUrl":"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/favicon.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D"},"siteColorSettings":{"autoSetWcag":true,"lightMode":"#006d79","darkMode":"#21a8b5","selectedColor":"#21a8b5"},"hyperlinkColorSettings":{"hyperlinkColorState":2,"lightMode":{"defaultColor":"#0065FF","hoverColor":"#0052CC","visitedColor":"#86198F"},"darkMode":{"defaultColor":"#2684FF","hoverColor":"#4C9AFF","visitedColor":"#D946EF"},"selectedColor":{"defaultColor":"#0065FF","hoverColor":"#0052CC","visitedColor":"#86198F"}},"articleFontPairing":{"useCustomPairing":true,"headingFont":"Montserrat","bodyFont":"Open Sans","siteFont":"Open Sans, sans-serif"},"siteElementsStyle":1,"siteLayout":0},"versionType":0,"isAISearchEnabled":true,"isAISummaryEnabled":false,"isSmartBarConfigured":false,"referer":"https://support.fortanix.com","isGlobalHomePage":false,"globalHomeLanguages":[],"currentVersion":{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false},"currentLanguage":{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true},"eddyName":"Eddy AI","aiSupportedLanguageCodes":["no","ko","nl","de","sv","cs","pt","pl","es","he","ja","it","ar","da","en","fr","en-us","el","pt-br","fi","en-gb","es-mx","lt","en-au"],"isKbSite2PreviewEnabled":false,"aiSearchAccessAllowedlanguages":[],"kb2PreviewPdfProtectionLevel":2,"hasDecisionTreeEnabled":true},"cspSettings":{"csp":"","headers":{"X-Frame-Options":"SAMEORIGIN"},"nonce":"ufitxltntkjretjmhtirodpsvmxofleu"},"metaDefinitions":[{"content":"","httpEquiv":"Content-Security-Policy"}],"favIconUrl":"","kbRedirection":{"status":302},"endsWithRedirectionRules":[{"source":"/360015941132-authentication","target":"fortanix-authentication"},{"source":"/360015941132","target":"fortanix-authentication"},{"source":"/360012572332-what-algorithms-are-supported-by-fortanix-data-security-manager","target":"what-algorithms-are-supported-by-fortanix-data-security-manager"},{"source":"/360012572332","target":"what-algorithms-are-supported-by-fortanix-data-security-manager"},{"source":"/360015809372-user-s-guide-getting-started-with-fortanix-data-security-manager-ui","target":"users-guide-getting-started-with-fortanix-data-security-manager-ui"},{"source":"/360015809372","target":"users-guide-getting-started-with-fortanix-data-security-manager-ui"},{"source":"/360016027051-what-is-fortanix-data-security-manager","target":"what-is-fortanix-data-security-manager"},{"source":"/360016027051","target":"what-is-fortanix-data-security-manager"},{"source":"/360016027271-why-should-i-use-fortanix-data-security-manager","target":"why-should-i-use-fortanix-data-security-manager"},{"source":"/360016027271","target":"why-should-i-use-fortanix-data-security-manager"},{"source":"/360015809992-how-do-i-get-started-with-fortanix-data-security-manager","target":"how-do-i-get-started-with-fortanix-data-security-manager"},{"source":"/360015809992","target":"how-do-i-get-started-with-fortanix-data-security-manager"},{"source":"/360016027291-what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager","target":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager"},{"source":"/360016027291","target":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager"},{"source":"/360015810012-what-key-management-features-are-available-in-fortanix-data-security-manager","target":"what-key-management-features-are-available-in-fortanix-data-security-manager"},{"source":"/360015810012","target":"what-key-management-features-are-available-in-fortanix-data-security-manager"},{"source":"/360015810052-what-cryptographic-operations-are-available-in-fortanix-data-security-manager","target":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager"},{"source":"/360015810052","target":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager"},{"source":"/360016027311-how-does-fortanix-data-security-manager-work","target":"how-does-fortanix-data-security-manager-work"},{"source":"/360016027311","target":"how-does-fortanix-data-security-manager-work"},{"source":"/360015810092-where-do-my-keys-live-if-i-use-fortanix-data-security-manager","target":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager"},{"source":"/360015810092","target":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager"},{"source":"/360016027331-can-fortanix-employees-access-my-keys","target":"can-fortanix-employees-access-my-keys"},{"source":"/360016027331","target":"can-fortanix-employees-access-my-keys"},{"source":"/360016027371-where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager","target":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager"},{"source":"/360016027371","target":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager"},{"source":"/360015810112-can-i-import-keys-into-fortanix-data-security-manager","target":"can-i-import-keys-into-fortanix-data-security-manager"},{"source":"/360015810112","target":"can-i-import-keys-into-fortanix-data-security-manager"},{"source":"/360016027391-how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault","target":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault"},{"source":"/360016027391","target":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault"},{"source":"/360016047631-user-s-guide-logging","target":"users-guide-logging"},{"source":"/360016047631","target":"users-guide-logging"},{"source":"/360015828872-user-s-guide-single-sign-on","target":"users-guide-single-sign-on"},{"source":"/360015828872","target":"users-guide-single-sign-on"},{"source":"/360016047771-user-s-guide-account-quorum-policy","target":"users-guide-account-quorum-policy"},{"source":"/360016047771","target":"users-guide-account-quorum-policy"},{"source":"/360016160111-definitions","target":"definitions"},{"source":"/360016160111","target":"definitions"},{"source":"/360015941292-authorization","target":"fortanix-authorization"},{"source":"/360015941292","target":"fortanix-authorization"},{"source":"/360015941332-using-opaque-and-secret-objects","target":"using-opaque-and-secret-objects"},{"source":"/360015941332","target":"using-opaque-and-secret-objects"},{"source":"/360016160411-algorithm-support","target":"algorithm-support"},{"source":"/360016160411","target":"algorithm-support"},{"source":"/360015941372-plugins-getting-started","target":"plugins-getting-started"},{"source":"/360015941372","target":"plugins-getting-started"},{"source":"/360016160451-clients-pkcs-11-library","target":"clients-pkcs11-library"},{"source":"/360016160451","target":"clients-pkcs11-library"},{"source":"/360016160491-clients-microsoft-cng-key-storage-provider","target":"clients-microsoft-cng-key-storage-provider"},{"source":"/360016160491","target":"clients-microsoft-cng-key-storage-provider"},{"source":"/360016160511-clients-java-cryptography-extension-jce-provider","target":"clients-java-cryptography-extension-jce-provider"},{"source":"/360016160511","target":"clients-java-cryptography-extension-jce-provider"},{"source":"/360015941412-clients-command-line-interface-cli-for-fortanix-data-security-manager","target":"clients-command-line-interface-cli-for-fortanix-data-security-manager"},{"source":"/360015941412","target":"clients-command-line-interface-cli-for-fortanix-data-security-manager"},{"source":"/360015941432-fortanix-data-security-manager-sdk-contents","target":"fortanix-data-security-manager-sdk-contents"},{"source":"/360015941432","target":"fortanix-data-security-manager-sdk-contents"},{"source":"/360015941452-client-api-basics","target":"client-api-basics"},{"source":"/360015941452","target":"client-api-basics"},{"source":"/360015941472-configure-api-client-and-client-authentication","target":"configure-api-client-and-client-authentication"},{"source":"/360015941472","target":"configure-api-client-and-client-authentication"},{"source":"/360016160591-listing-security-objects","target":"listing-security-objects"},{"source":"/360016160591","target":"listing-security-objects"},{"source":"/360015941512-generating-security-objects","target":"generating-security-objects"},{"source":"/360015941512","target":"generating-security-objects"},{"source":"/360015941532-wrapping-security-objects","target":"wrapping-security-objects"},{"source":"/360015941532","target":"wrapping-security-objects"},{"source":"/360016160611-unwrapping-security-objects","target":"unwrapping-security-objects"},{"source":"/360016160611","target":"unwrapping-security-objects"},{"source":"/360016160651-deriving-security-objects","target":"deriving-security-objects"},{"source":"/360016160651","target":"deriving-security-objects"},{"source":"/360016161951-importing-security-objects","target":"importing-security-objects"},{"source":"/360016161951","target":"importing-security-objects"},{"source":"/360015942212-updating-security-objects","target":"updating-security-objects"},{"source":"/360015942212","target":"updating-security-objects"},{"source":"/360016162031-deleting-security-objects","target":"deleting-security-objects"},{"source":"/360016162031","target":"deleting-security-objects"},{"source":"/360015942252-symmetric-cryptography","target":"symmetric-cryptography"},{"source":"/360015942252","target":"symmetric-cryptography"},{"source":"/360016162071-message-digests","target":"message-digests"},{"source":"/360016162071","target":"message-digests"},{"source":"/360016162091-message-authentication-codes","target":"message-authentication-codes"},{"source":"/360016162091","target":"message-authentication-codes"},{"source":"/360015942352-public-key-cryptography","target":"public-key-cryptography"},{"source":"/360015942352","target":"public-key-cryptography"},{"source":"/360016162151-public-key-signing-and-verification","target":"public-key-signing-and-verification"},{"source":"/360016162151","target":"public-key-signing-and-verification"},{"source":"/360015942432-batch-cryptography","target":"batch-cryptography"},{"source":"/360015942432","target":"batch-cryptography"},{"source":"/360015955572-using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux","target":"using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux"},{"source":"/360015955572","target":"using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux"},{"source":"/360015956052-using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments","target":"/docs/using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments"},{"source":"/360015956052","target":"using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments"},{"source":"/360015956812-manually-importing-fortanix-data-security-manager-keys-into-cloud-providers","target":"manually-importing-fortanix-data-security-manager-keys-into-cloud-providers"},{"source":"/360015956812","target":"manually-importing-fortanix-data-security-manager-keys-into-cloud-providers"},{"source":"/360016187791-using-fortanix-data-security-manager-for-block-storage-encryption-on-linux-servers","target":"using-fortanix-data-security-manager-for-block-storage-encryption-on-linux-servers"},{"source":"/360016187791","target":"using-fortanix-data-security-manager-for-block-storage-encryption-on-linux-servers"},{"source":"/360016188991-using-fortanix-data-security-manager-with-oracle-tde","target":"fortanix-using-fortanix-data-security-manager-with-oracle-tde"},{"source":"/360016188991","target":"fortanix-using-fortanix-data-security-manager-with-oracle-tde"},{"source":"/360016198831-using-fortanix-data-security-manager-with-microsoft-pki","target":"using-fortanix-data-security-manager-with-microsoft-pki"},{"source":"/360016198831","target":"using-fortanix-data-security-manager-with-microsoft-pki"},{"source":"/360016264311-using-fortanix-data-security-manager-for-apache-web-server-tls-keys","target":"using-fortanix-data-security-manager-for-apache-web-server-tls-keys"},{"source":"/360016264311","target":"using-fortanix-data-security-manager-for-apache-web-server-tls-keys"},{"source":"/360016043132-using-fortanix-data-security-manager-for-nginx-tls-keys","target":"using-fortanix-data-security-manager-for-nginx-tls-keys"},{"source":"/360016043132","target":"using-fortanix-data-security-manager-for-nginx-tls-keys"},{"source":"/360016043152-managing-fortanix-data-security-manager-keys-with-openssl-and-pkcs11-tool","target":"managing-fortanix-data-security-manager-keys-with-openssl-and-pkcs11-tool"},{"source":"/360016043152","target":"managing-fortanix-data-security-manager-keys-with-openssl-and-pkcs11-tool"},{"source":"/360018312391-pkcs-11-4-2-1500","target":"pkcs11-421500"},{"source":"/360018312391","target":"pkcs11-421500"},{"source":"/360018084132","target":"cngekm"},{"source":"/360018362951-jce","target":"jce"},{"source":"/360018362951","target":"jce"},{"source":"/360018084172-fortanix-dsm-client-sdks","target":"fortanix-dsm-client-sdks"},{"source":"/360018084172","target":"fortanix-dsm-client-sdks"},{"source":"/360018084192-fortanix-dsm-cli-4-19-2244","target":"fortanix-dsm-cli-4192244"},{"source":"/360018084192","target":"fortanix-dsm-cli-4192244"},{"source":"/360018363011-docker-examples","target":"docker-examples"},{"source":"/360018363011","target":"docker-examples"},{"source":"/360018084432-plugins-lua-programming-reference","target":"plugins-lua-programming-reference"},{"source":"/360018084432","target":"plugins-lua-programming-reference"},{"source":"/360018280732-user-authentication","target":"user-authentication"},{"source":"/360018280732","target":"user-authentication"},{"source":"/360018552251-creating-a-security-object","target":"creating-a-security-object"},{"source":"/360018552251","target":"creating-a-security-object"},{"source":"/360018552431-encryption","target":"encryption"},{"source":"/360018552431","target":"encryption"},{"source":"/360018552611-decryption","target":"decryption"},{"source":"/360018552611","target":"decryption"},{"source":"/360018552751-deleting-a-security-object","target":"deleting-a-security-object"},{"source":"/360018552751","target":"deleting-a-security-object"},{"source":"/360018282552-log-out","target":"log-out"},{"source":"/360018282552","target":"log-out"},{"source":"/360018558271-using-fortanix-data-security-manager-for-mysql-encryption-at-rest","target":"using-fortanix-data-security-manager-for-mysql-encryption-at-rest"},{"source":"/360018558271","target":"using-fortanix-data-security-manager-for-mysql-encryption-at-rest"},{"source":"/360020884152-fortanix-data-security-manager-installation-guide-on-prem","target":"fortanix-data-security-manager-installation-guide-on-prem"},{"source":"/360020884152","target":"fortanix-data-security-manager-installation-guide-on-prem"},{"source":"/360020887472-fortanix-data-security-manager-software-upgrade","target":"fortanix-data-security-manager-software-upgrade"},{"source":"/360020887472","target":"fortanix-data-security-manager-software-upgrade"},{"source":"/360025475331-using-fortanix-data-security-manager-with-cyberark-enterprise-password-vault","target":"using-fortanix-data-security-manager-with-cyberark-enterprise-password-vault"},{"source":"/360025475331","target":"using-fortanix-data-security-manager-with-cyberark-enterprise-password-vault"},{"source":"/360028212271-wrapping-a-key","target":"wrapping-a-key"},{"source":"/360028212271","target":"wrapping-a-key"},{"source":"/360028282032-using-fortanix-data-security-manager-for-mariadb-encryption-at-rest","target":"using-fortanix-data-security-manager-for-mariadb-encryption-at-rest"},{"source":"/360028282032","target":"using-fortanix-data-security-manager-for-mariadb-encryption-at-rest"},{"source":"/360030816111-using-fortanix-data-security-manager-with-google-cloud-ekm-interface","target":"/docs/using-fortanix-data-security-manager-with-google-cloud-ekm-interface"},{"source":"/360030816111","target":"using-fortanix-data-security-manager-with-google-cloud-ekm-interface"},{"source":"/360033272171-user-s-guide-authentication","target":"users-guide-authentication"},{"source":"/360033272171","target":"users-guide-authentication"},{"source":"/360033005052-user-s-guide-authorization","target":"users-guide-authorization"},{"source":"/360033005052","target":"users-guide-authorization"},{"source":"/360034373551-user-s-guide-logging-in","target":"users-guide-logging-in"},{"source":"/360034373551","target":"users-guide-logging-in"},{"source":"/360037911971-fortanix-data-security-manager-with-google-cloud-ekm-support-model","target":"fortanix-data-security-manager-with-google-cloud-ekm-support-model"},{"source":"/360037911971","target":"fortanix-data-security-manager-with-google-cloud-ekm-support-model"},{"source":"/360037543032-fortanix-data-security-manager-with-google-cloud-ekm-best-practices-and-faq","target":"fortanix-data-security-manager-with-google-cloud-ekm-best-practices-and-faq"},{"source":"/360037543032","target":"fortanix-data-security-manager-with-google-cloud-ekm-best-practices-and-faq"},{"source":"/360038633051-user-s-guide-security-controls-for-fortanix-data-security-manager-applications","target":"users-guide-security-controls-for-fortanix-data-security-manager-applications"},{"source":"/360038633051","target":"users-guide-security-controls-for-fortanix-data-security-manager-applications"},{"source":"/360038354592-user-s-guide-fortanix-data-security-manager-key-lifecycle-management","target":"users-guide-fortanix-data-security-manager-key-lifecycle-management"},{"source":"/360038354592","target":"users-guide-fortanix-data-security-manager-key-lifecycle-management"},{"source":"/360038870452-user-s-guide-tokenization","target":"users-guide-tokenization"},{"source":"/360038870452","target":"users-guide-tokenization"},{"source":"/360039671611-using-fortanix-data-security-manager-with-ping-identity","target":"using-fortanix-data-security-manager-with-ping-identity"},{"source":"/360039671611","target":"using-fortanix-data-security-manager-with-ping-identity"},{"source":"/360039419632-fortanix-data-security-manager-installation-from-azure-marketplace","target":"fortanix-data-security-manager-installation-from-azure-marketplace"},{"source":"/360039419632","target":"fortanix-data-security-manager-installation-from-azure-marketplace"},{"source":"/360040107191-using-fortanix-data-security-manager-for-encrypting-kubernetes-secrets-stored-in-etcd","target":"using-fortanix-data-security-manager-for-encrypting-kubernetes-secrets-stored-in-etcd"},{"source":"/360040107191","target":"using-fortanix-data-security-manager-for-encrypting-kubernetes-secrets-stored-in-etcd"},{"source":"/360040482971-exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-google-cloud","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-google-cloud"},{"source":"/360040482971","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-google-cloud"},{"source":"/360040487431-exporting-dsm-keys-to-cloud-providers-for-byok-alibaba","target":"exporting-dsm-keys-to-cloud-providers-for-byok-alibaba"},{"source":"/360040487431","target":"exporting-dsm-keys-to-cloud-providers-for-byok-alibaba"},{"source":"/360040488931-exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce-using-cache-only-keys","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce-using-cache-only-keys"},{"source":"/360040488931","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce-using-cache-only-keys"},{"source":"/360041005631-fortanix-ipmi-setup-for-fx2200-series-ii","target":"fortanix-ipmi-setup-for-fx2200-series-ii"},{"source":"/360041005631","target":"fortanix-ipmi-setup-for-fx2200-series-ii"},{"source":"/360041730871-using-fortanix-data-security-manager-for-secrets-injection-in-kubernetes","target":"using-fortanix-data-security-manager-for-secrets-injection-in-kubernetes"},{"source":"/360041730871","target":"using-fortanix-data-security-manager-for-secrets-injection-in-kubernetes"},{"source":"/360041950371-user-s-guide-plugin-library","target":"users-guide-plugin-library"},{"source":"/360041950371","target":"users-guide-plugin-library"},{"source":"/360042056431-user-s-guide-hsm-gateway","target":"users-guide-hsm-gateway"},{"source":"/360042056431","target":"users-guide-hsm-gateway"},{"source":"/360042064051-user-s-guide-account-cryptographic-policy","target":"users-guide-account-cryptographic-policy"},{"source":"/360042064051","target":"users-guide-account-cryptographic-policy"},{"source":"/360042433372-using-fortanix-data-security-manager-for-intersystems-cache-using-kmip","target":"using-fortanix-data-security-manager-for-intersystems-cache-using-kmip"},{"source":"/360042433372","target":"using-fortanix-data-security-manager-for-intersystems-cache-using-kmip"},{"source":"/360042823832-does-fortanix-data-security-manager-include-a-web-application-firewall-waf-should-i-configure-a-waf-with-fortanix-data-security-manager","target":"does-fortanix-data-security-manager-include-a-web-application-firewall-waf-should-i-configure-a-waf-with-fortanix-data-security-manager"},{"source":"/360042823832","target":"does-fortanix-data-security-manager-include-a-web-application-firewall-waf-should-i-configure-a-waf-with-fortanix-data-security-manager"},{"source":"/360042824772-can-i-use-a-proxy-with-fortanix-data-security-manager","target":"can-i-use-a-proxy-with-fortanix-data-security-manager"},{"source":"/360042824772","target":"can-i-use-a-proxy-with-fortanix-data-security-manager"},{"source":"/360042960592-using-fortanix-confidential-computing-manager-to-build-an-enclave-os-nginx-application","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-nginx-application"},{"source":"/360042960592","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-nginx-application"},{"source":"/360042965552-using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-from-scratch","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-from-scratch"},{"source":"/360042965552","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-from-scratch"},{"source":"/360043013612-fortanix-confidential-computing-manager-usage-workflow","target":"fortanix-confidential-computing-manager-usage-workflow"},{"source":"/360043013612","target":"fortanix-confidential-computing-manager-usage-workflow"},{"source":"/360043448371-fortanix-confidential-computing-manager-sgx-attestation-process","target":"fortanix-confidential-computing-manager-sgx-attestation-process"},{"source":"/360043448371","target":"fortanix-confidential-computing-manager-sgx-attestation-process"},{"source":"/360043513171-overview-and-definitions","target":"fortanix-overview-and-definitions"},{"source":"/360043513171","target":"fortanix-overview-and-definitions"},{"source":"/360043085652-kernel-version-supported","target":"kernel-version-supported"},{"source":"/360043085652","target":"kernel-version-supported"},{"source":"/360043527431-user-s-guide-add-and-edit-an-application","target":"users-guide-add-and-edit-an-application"},{"source":"/360043527431","target":"users-guide-add-and-edit-an-application"},{"source":"/360043529411-user-s-guide-create-an-image","target":"users-guide-create-an-image"},{"source":"/360043529411","target":"users-guide-create-an-image"},{"source":"/360043092812-user-s-guide-domain-and-application-image-approval","target":"users-guide-domain-and-application-image-approval"},{"source":"/360043092812","target":"users-guide-domain-and-application-image-approval"},{"source":"/360043093352-user-s-guide-invite-users","target":"users-guide-invite-users"},{"source":"/360043093352","target":"users-guide-invite-users"},{"source":"/360043531411-user-s-guide-convert-applications-deprecated","target":"users-guide-convert-applications-deprecated"},{"source":"/360043531411","target":"users-guide-convert-applications-deprecated"},{"source":"/360043340572-using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-that-talks-over-tls-from-within-an-enclave","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-that-talks-over-tls-from-within-an-enclave"},{"source":"/360043340572","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-that-talks-over-tls-from-within-an-enclave"},{"source":"/360043401152-running-an-example-application-using-sgx-platform","target":"running-an-example-application-using-sgx-platform"},{"source":"/360043401152","target":"running-an-example-application-using-sgx-platform"},{"source":"/360043845811-what-is-fortanix-confidential-computing-manager","target":"what-is-fortanix-confidential-computing-manager"},{"source":"/360043845811","target":"what-is-fortanix-confidential-computing-manager"},{"source":"/360043405792-what-are-compute-nodes-in-fortanix-confidential-computing-manager","target":"what-are-compute-nodes-in-fortanix-confidential-computing-manager"},{"source":"/360043405792","target":"what-are-compute-nodes-in-fortanix-confidential-computing-manager"},{"source":"/360043405832-what-is-fortanix-node-agent","target":"what-is-fortanix-node-agent"},{"source":"/360043405832","target":"what-is-fortanix-node-agent"},{"source":"/360043846491-what-applications-are-supported-in-fortanix-confidential-computing-manager","target":"what-applications-are-supported-in-fortanix-confidential-computing-manager"},{"source":"/360043846491","target":"what-applications-are-supported-in-fortanix-confidential-computing-manager"},{"source":"/360043406272-how-to-configure-an-application-in-fortanix-confidential-computing-manager","target":"how-to-configure-an-application-in-fortanix-confidential-computing-manager"},{"source":"/360043406272","target":"how-to-configure-an-application-in-fortanix-confidential-computing-manager"},{"source":"/360043406352-what-is-application-policy-enforcement-and-monitoring","target":"what-is-application-policy-enforcement-and-monitoring"},{"source":"/360043406352","target":"what-is-application-policy-enforcement-and-monitoring"},{"source":"/360043846991-what-is-application-whitelisting-in-fortanix-confidential-computing-manager","target":"what-is-application-whitelisting-in-fortanix-confidential-computing-manager"},{"source":"/360043846991","target":"what-is-application-whitelisting-in-fortanix-confidential-computing-manager"},{"source":"/360043407012-fortanix-node-agent-software-intel-sgx-platform","target":"fortanix-node-agent-software-intel-sgx-platform"},{"source":"/360043407012","target":"fortanix-node-agent-software-intel-sgx-platform"},{"source":"/360043484152-quickstart-guide","target":"quickstart-guide"},{"source":"/360043484152","target":"quickstart-guide"},{"source":"/360043559332-user-s-guide-key-components","target":"users-guide-key-components"},{"source":"/360043559332","target":"users-guide-key-components"},{"source":"/360044219191-quick-support-through-slack-channel","target":"quick-support-through-slack-channel"},{"source":"/360044219191","target":"quick-support-through-slack-channel"},{"source":"/360044392311-using-fortanix-data-security-manager-with-ibm-db2","target":"using-fortanix-data-security-manager-with-ibm-db2"},{"source":"/360044392311","target":"using-fortanix-data-security-manager-with-ibm-db2"},{"source":"/360044435411-which-linux-version-does-the-node-agent-support","target":"which-linux-version-does-the-node-agent-support"},{"source":"/360044435411","target":"which-linux-version-does-the-node-agent-support"},{"source":"/360044710831-troubleshooting","target":"troubleshooting"},{"source":"/360044710831","target":"troubleshooting"},{"source":"/360044781191-fortanix-data-security-manager-fips-replication","target":"fortanix-data-security-manager-fips-replication"},{"source":"/360044781191","target":"fortanix-data-security-manager-fips-replication"},{"source":"/360044717832-using-ccm-cli-with-fortanix-confidential-computing-manager","target":"using-ccm-cli-with-fortanix-confidential-computing-manager"},{"source":"/360044717832","target":"using-ccm-cli-with-fortanix-confidential-computing-manager"},{"source":"/360044730932-what-is-edp","target":"what-is-edp"},{"source":"/360044730932","target":"what-is-edp"},{"source":"/360044746932-bringing-edp-rust-apps-to-confidential-computing-manager","target":"bringing-edp-rust-apps-to-confidential-computing-manager"},{"source":"/360044746932","target":"bringing-edp-rust-apps-to-confidential-computing-manager"},{"source":"/360044752912-how-to-configure-trusted-ca-to-outside-parties","target":"how-to-configure-trusted-ca-to-outside-parties"},{"source":"/360044752912","target":"how-to-configure-trusted-ca-to-outside-parties"},{"source":"/360044753732-tips-and-tricks","target":"tips-and-tricks"},{"source":"/360044753732","target":"tips-and-tricks"},{"source":"/360044790832-running-edp-applications-on-confidential-computing-manager","target":"running-edp-applications-on-confidential-computing-manager"},{"source":"/360044790832","target":"running-edp-applications-on-confidential-computing-manager"},{"source":"/360045234091-how-can-i-bring-my-edp-application-to-fortanix-confidential-computing-manager","target":"how-can-i-bring-my-edp-application-to-fortanix-confidential-computing-manager"},{"source":"/360045234091","target":"how-can-i-bring-my-edp-application-to-fortanix-confidential-computing-manager"},{"source":"/360044840952-build-a-rust-server-client-edp-application-using-confidential-computing-manager-issued-certificates-and-trusted-ca","target":"build-a-rust-serverclient-edp-application-using-confidential-computing-manager-issued-certificates-and-trusted-ca"},{"source":"/360044840952","target":"build-a-rust-serverclient-edp-application-using-confidential-computing-manager-issued-certificates-and-trusted-ca"},{"source":"/360045393391-how-to-verify-the-communication-for-applications-running-on-two-different-nodes","target":"how-to-verify-the-communication-for-applications-running-on-two-different-nodes"},{"source":"/360045393391","target":"how-to-verify-the-communication-for-applications-running-on-two-different-nodes"},{"source":"/360045393451-how-to-obtain-data-describing-the-remote-enclave-from-the-cert","target":"how-to-obtain-data-describing-the-remote-enclave-from-the-cert"},{"source":"/360045393451","target":"how-to-obtain-data-describing-the-remote-enclave-from-the-cert"},{"source":"/360044947652-what-is-the-structure-of-cert-chain","target":"what-is-the-structure-of-cert-chain"},{"source":"/360044947652","target":"what-is-the-structure-of-cert-chain"},{"source":"/360044948132-how-can-an-application-s-cert-be-issued-when-we-deploy-an-app-from-the-console","target":"how-can-an-applications-cert-be-issued-when-we-deploy-an-app-from-the-console"},{"source":"/360044948132","target":"how-can-an-applications-cert-be-issued-when-we-deploy-an-app-from-the-console"},{"source":"/360045793612-application-and-compute-node-policy-enforcement","target":"application-and-compute-node-policy-enforcement"},{"source":"/360045793612","target":"application-and-compute-node-policy-enforcement"},{"source":"/360046217731-using-fortanix-confidential-computing-manager-to-build-an-enclave-os-spring-application","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-spring-application"},{"source":"/360046217731","target":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-spring-application"},{"source":"/360045907552-fortanix-data-security-manager-monitoring-and-alerting-solution","target":"fortanix-data-security-manager-monitoring-and-alerting-solution"},{"source":"/360045907552","target":"fortanix-data-security-manager-monitoring-and-alerting-solution"},{"source":"/360046203112-using-fortanix-data-security-manager-with-microsoft-cng-provider-and-signtool","target":"using-fortanix-data-security-manager-with-microsoft-cng-provider-and-signtool"},{"source":"/360046203112","target":"using-fortanix-data-security-manager-with-microsoft-cng-provider-and-signtool"},{"source":"/360046779472-using-fortanix-data-security-manager-with-hashicorp-vault-enterprise","target":"using-fortanix-data-security-manager-with-hashicorp-vault-enterprise"},{"source":"/360046779472","target":"using-fortanix-data-security-manager-with-hashicorp-vault-enterprise"},{"source":"/360047446391-using-fortanix-confidential-computing-manager-to-run-an-enclave-os-pre-trained-object-detection-tensorflow-model","target":"using-fortanix-confidential-computing-manager-to-run-an-enclave-os-pre-trained-object-detection-tensorflow-model"},{"source":"/360047446391","target":"using-fortanix-confidential-computing-manager-to-run-an-enclave-os-pre-trained-object-detection-tensorflow-model"},{"source":"/360047562571-using-fortanix-data-security-manager-for-nginx-and-apache-tls-keys","target":"using-fortanix-data-security-manager-for-nginx-and-apache-tls-keys"},{"source":"/360047562571","target":"using-fortanix-data-security-manager-for-nginx-and-apache-tls-keys"},{"source":"/360047606891-production-signing-fortanix-confidential-computing-manager-application-enclaves","target":"production-signing-fortanix-confidential-computing-manager-application-enclaves"},{"source":"/360047606891","target":"production-signing-fortanix-confidential-computing-manager-application-enclaves"},{"source":"/360047269692-error-handling-in-fortanix-confidential-computing-manager","target":"error-handling-in-fortanix-confidential-computing-manager"},{"source":"/360047269692","target":"error-handling-in-fortanix-confidential-computing-manager"},{"source":"/360048967971-user-s-guide-image-registry","target":"users-guide-image-registry"},{"source":"/360048967971","target":"users-guide-image-registry"},{"source":"/360049737111-user-s-guide-copy-key","target":"users-guide-copy-key"},{"source":"/360049737111","target":"users-guide-copy-key"},{"source":"/360049737471-user-s-guide-export-key","target":"users-guide-export-key"},{"source":"/360049737471","target":"users-guide-export-key"},{"source":"/360050711712-fortanix-data-security-manager-installation-on-aws","target":"fortanix-data-security-manager-installation-on-aws"},{"source":"/360050711712","target":"fortanix-data-security-manager-installation-on-aws"},{"source":"/360050835232-what-kmip-coverage-do-we-provide","target":"what-kmip-coverage-do-we-provide"},{"source":"/360050835232","target":"what-kmip-coverage-do-we-provide"},{"source":"/360051330351-hsm-gateway","target":"hsm-gateway"},{"source":"/360051330351","target":"hsm-gateway"},{"source":"/360051875172-fortanix-data-security-manager-with-oracle-tde-best-practices","target":"fortanix-data-security-manager-with-oracle-tde-best-practices"},{"source":"/360051875172","target":"fortanix-data-security-manager-with-oracle-tde-best-practices"},{"source":"/360051978492-using-fortanix-data-security-manager-sso-with-okta","target":"using-fortanix-data-security-manager-sso-with-okta"},{"source":"/360051978492","target":"using-fortanix-data-security-manager-sso-with-okta"},{"source":"/360052144312-faqs-fortanix-data-security-manager-ui","target":"faqs-fortanix-data-security-manager-ui"},{"source":"/360052144312","target":"faqs-fortanix-data-security-manager-ui"},{"source":"/360052145572-faqs-install-upgrade-administration","target":"fortanix-faqs-installupgradeadministration"},{"source":"/360052145572","target":"fortanix-faqs-installupgradeadministration"},{"source":"/360052264892-fortanix-data-security-manager-high-availability-concepts-on-prem-only","target":"fortanix-data-security-manager-high-availability-concepts-on-prem-only"},{"source":"/360052264892","target":"fortanix-data-security-manager-high-availability-concepts-on-prem-only"},{"source":"/360052751791-fortanix-data-security-manager-port-requirements","target":"fortanix-data-security-manager-port-requirements"},{"source":"/360052751791","target":"fortanix-data-security-manager-port-requirements"},{"source":"/360052361892-confidential-computing-manager-azure-managed-application","target":"confidential-computing-manager-azure-managed-application"},{"source":"/360052361892","target":"confidential-computing-manager-azure-managed-application"},{"source":"/360053387691-fortanix-data-security-manager-read-only-mode-of-operation","target":"fortanix-data-security-manager-read-only-mode-of-operation"},{"source":"/360053387691","target":"fortanix-data-security-manager-read-only-mode-of-operation"},{"source":"/360054022392-azure-kubernetes-service-with-fortanix-confidential-computing-manager","target":"azure-kubernetes-service-with-fortanix-confidential-computing-manager"},{"source":"/360054022392","target":"azure-kubernetes-service-with-fortanix-confidential-computing-manager"},{"source":"/360054219072-using-fortanix-data-security-manager-with-f5-big-ip-virtual-edition","target":"using-fortanix-data-security-manager-with-f5-big-ip-virtual-edition"},{"source":"/360054219072","target":"using-fortanix-data-security-manager-with-f5-big-ip-virtual-edition"},{"source":"/360055605471-fortanix-dsm-aws-key-management-service-cdc-group-setup","target":"fortanix-dsm-aws-key-management-service-cdc-group-setup"},{"source":"/360055605471","target":"fortanix-dsm-aws-key-management-service-cdc-group-setup"},{"source":"/360055606411-fortanix-data-security-manager-sysadmin-settings-ip-policy","target":"fortanix-data-security-manager-sysadmin-settings-ip-policy"},{"source":"/360055606411","target":"fortanix-data-security-manager-sysadmin-settings-ip-policy"},{"source":"/360056018172-exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce"},{"source":"/360056018172","target":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce"},{"source":"/360056649592-fortanix-data-security-manager-fx2200-hardware-guide","target":"fortanix-data-security-manager-fx2200-hardware-guide"},{"source":"/360056649592","target":"fortanix-data-security-manager-fx2200-hardware-guide"},{"source":"/360057401111-user-s-guide-create-application-configuration","target":"users-guide-create-application-configuration"},{"source":"/360057401111","target":"users-guide-create-application-configuration"},{"source":"/360056931252-user-s-guide-create-datasets","target":"users-guide-create-datasets"},{"source":"/360056931252","target":"users-guide-create-datasets"},{"source":"/360056935452-user-s-guide-create-update-clone-and-delete-workflows","target":"users-guide-create-update-clone-and-delete-workflows"},{"source":"/360056935452","target":"users-guide-create-update-clone-and-delete-workflows"},{"source":"/360056938872-workflow-applications-using-fortanix-enclave-os-sgx","target":"workflow-applications-using-fortanix-enclave-os-sgx"},{"source":"/360056938872","target":"workflow-applications-using-fortanix-enclave-os-sgx"},{"source":"/360057423771-workflow-applications-using-fortanix-edp","target":"workflow-applications-using-fortanix-edp"},{"source":"/360057423771","target":"workflow-applications-using-fortanix-edp"},{"source":"/360057463931-mutual-transport-layer-security-using-fortanix-data-security-manager-on-prem-only","target":"mutual-transport-layer-security-using-fortanix-data-security-manager-on-prem-only"},{"source":"/360057463931","target":"mutual-transport-layer-security-using-fortanix-data-security-manager-on-prem-only"},{"source":"/360057649391-fortanix-data-security-manager-architecture","target":"fortanix-data-security-manager-architecture"},{"source":"/360057649391","target":"fortanix-data-security-manager-architecture"},{"source":"/360057956152-fortanix-data-security-manager-cluster-attestation-guide-on-prem-only","target":"fortanix-data-security-manager-cluster-attestation-guide-on-prem-only"},{"source":"/360057956152","target":"fortanix-data-security-manager-cluster-attestation-guide-on-prem-only"},{"source":"/360057956532-what-is-intel-attestation-service-ias-and-why-should-i-use-ias-service-on-prem-only","target":"what-is-intel-attestation-service-ias-and-why-should-i-use-ias-service-on-prem-only"},{"source":"/360057956532","target":"what-is-intel-attestation-service-ias-and-why-should-i-use-ias-service-on-prem-only"},{"source":"/360058487772-fortanix-data-security-manager-sysadmin-settings-policies","target":"fortanix-data-security-manager-sysadmin-settings-policies"},{"source":"/360058487772","target":"fortanix-data-security-manager-sysadmin-settings-policies"},{"source":"/360058490672-fortanix-data-security-manager-sysadmin-settings-interfaces","target":"fortanix-data-security-manager-sysadmin-settings-interfaces"},{"source":"/360058490672","target":"fortanix-data-security-manager-sysadmin-settings-interfaces"},{"source":"/360058490732-fortanix-data-security-manager-sysadmin-settings-email","target":"fortanix-data-security-manager-sysadmin-settings-email"},{"source":"/360058490732","target":"fortanix-data-security-manager-sysadmin-settings-email"},{"source":"/360058931391-fortanix-data-security-manager-sysadmin-settings-frontend","target":"fortanix-data-security-manager-sysadmin-settings-frontend"},{"source":"/360058931391","target":"fortanix-data-security-manager-sysadmin-settings-frontend"},{"source":"/360058490792-fortanix-data-security-manager-sysadmin-settings-log-management","target":"fortanix-data-security-manager-sysadmin-settings-log-management"},{"source":"/360058490792","target":"fortanix-data-security-manager-sysadmin-settings-log-management"},{"source":"/360058575412-using-fortanix-data-security-manager-with-ibm-informix","target":"using-fortanix-data-security-manager-with-ibm-informix"},{"source":"/360058575412","target":"using-fortanix-data-security-manager-with-ibm-informix"},{"source":"/360059069791-using-fortanix-confidential-computing-manager-to-protect-data-in-use","target":"using-fortanix-confidential-computing-manager-to-protect-data-in-use"},{"source":"/360059069791","target":"using-fortanix-confidential-computing-manager-to-protect-data-in-use"},{"source":"/360059456831-using-fortanix-data-security-manager-as-external-kmip-in-rubrik","target":"using-fortanix-data-security-manager-as-external-kmip-in-rubrik"},{"source":"/360059456831","target":"using-fortanix-data-security-manager-as-external-kmip-in-rubrik"},{"source":"/360059103732-user-s-guide-azure-active-directory-authentication","target":"users-guide-azure-active-directory-authentication"},{"source":"/360059103732","target":"users-guide-azure-active-directory-authentication"},{"source":"/360059838911-enclave-os-analyzer-tool","target":"enclave-os-analyzer-tool"},{"source":"/360059838911","target":"enclave-os-analyzer-tool"},{"source":"/360059489492-using-fortanix-data-security-manager-with-scality-s3c","target":"using-fortanix-data-security-manager-with-scality-s3c"},{"source":"/360059489492","target":"using-fortanix-data-security-manager-with-scality-s3c"},{"source":"/360059540272-algorithm-support-strict-fips-mode","target":"algorithm-support-strict-fips-mode"},{"source":"/360059540272","target":"algorithm-support-strict-fips-mode"},{"source":"/360060027571-reserve-static-ip-addresses","target":"reserve-static-ip-addresses"},{"source":"/360060027571","target":"reserve-static-ip-addresses"},{"source":"/360059608332-firewall-rules","target":"firewall-rules"},{"source":"/360059608332","target":"firewall-rules"},{"source":"/360059608372-define-hostnames","target":"define-hostnames"},{"source":"/360059608372","target":"define-hostnames"},{"source":"/360060027631-identify-ntp-network-time-protocol-sources","target":"identify-ntp-network-time-protocol-sources"},{"source":"/360060027631","target":"identify-ntp-network-time-protocol-sources"},{"source":"/360059608432-services-to-be-implemented","target":"services-to-be-implemented"},{"source":"/360059608432","target":"services-to-be-implemented"},{"source":"/360059921872-using-fortanix-confidential-computing-manager-to-build-and-run-hashicorp-vault","target":"using-fortanix-confidential-computing-manager-to-build-and-run-hashicorp-vault"},{"source":"/360059921872","target":"using-fortanix-confidential-computing-manager-to-build-and-run-hashicorp-vault"},{"source":"/360060524671-fortanix-data-security-manager-data-center-labeling","target":"fortanix-data-security-manager-data-center-labeling"},{"source":"/360060524671","target":"fortanix-data-security-manager-data-center-labeling"},{"source":"/360060714172-fortanix-data-security-manager-installation-on-vmware","target":"fortanix-data-security-manager-installation-on-vmware"},{"source":"/360060714172","target":"fortanix-data-security-manager-installation-on-vmware"},{"source":"/360061109631-using-fortanix-data-security-manager-with-appviewx-on-premises","target":"/docs/using-fortanix-data-security-manager-with-appviewx-on-premises"},{"source":"/360061109631","target":"using-fortanix-data-security-manager-with-appviewx-on-premises"},{"source":"/360061166411-configure-api-client","target":"configure-api-client"},{"source":"/360061166411","target":"configure-api-client"},{"source":"/360060771532-app-authentication-with-an-api-key","target":"app-authentication-with-an-api-key"},{"source":"/360060771532","target":"app-authentication-with-an-api-key"},{"source":"/360060774972-app-authentication-with-client-certificate","target":"app-authentication-with-client-certificate"},{"source":"/360060774972","target":"app-authentication-with-client-certificate"},{"source":"/360061651291-listing-all-security-objects","target":"listing-all-security-objects"},{"source":"/360061651291","target":"listing-all-security-objects"},{"source":"/360061653631-details-of-security-object-by-name","target":"details-of-security-object-by-name"},{"source":"/360061653631","target":"details-of-security-object-by-name"},{"source":"/360061242312-details-of-security-object-by-uuid","target":"details-of-security-object-by-uuid"},{"source":"/360061242312","target":"details-of-security-object-by-uuid"},{"source":"/360061246892-importing-a-security-object","target":"importing-a-security-object"},{"source":"/360061246892","target":"importing-a-security-object"},{"source":"/360061247532-exporting-a-security-object","target":"exporting-a-security-object"},{"source":"/360061247532","target":"exporting-a-security-object"},{"source":"/360061254832-signature-generation","target":"signature-generation"},{"source":"/360061254832","target":"signature-generation"},{"source":"/360061255752-signature-verification","target":"signature-verification"},{"source":"/360061255752","target":"signature-verification"},{"source":"/360061672091-unwrapping-a-key","target":"unwrapping-a-key"},{"source":"/360061672091","target":"unwrapping-a-key"},{"source":"/360061257032-create-a-group","target":"create-a-group"},{"source":"/360061257032","target":"create-a-group"},{"source":"/360061257252-add-quorum-approval-policy","target":"add-quorum-approval-policy"},{"source":"/360061257252","target":"add-quorum-approval-policy"},{"source":"/360061257452-update-quorum-approval-policy","target":"update-quorum-approval-policy"},{"source":"/360061257452","target":"update-quorum-approval-policy"},{"source":"/360061672891-add-update-cryptographic-policy","target":"addupdate-cryptographic-policy"},{"source":"/360061672891","target":"addupdate-cryptographic-policy"},{"source":"/360061360792-introduction","target":"introduction"},{"source":"/360061360792","target":"introduction"},{"source":"/4402562226580-user-s-guide-key-undo-policy","target":"users-guide-key-undo-policy"},{"source":"/4402562226580","target":"users-guide-key-undo-policy"},{"source":"/4402937739156-migrating-private-key-from-microsoft-ad-cs-certificate-authority-to-fortanix-data-security-manager","target":"migrating-private-key-from-microsoft-ad-cs-certificate-authority-to-fortanix-data-security-manager"},{"source":"/4402937739156","target":"migrating-private-key-from-microsoft-ad-cs-certificate-authority-to-fortanix-data-security-manager"},{"source":"/4403030801812-splunk-integration-with-sensu-server","target":"splunk-integration-with-sensu-server"},{"source":"/4403030801812","target":"splunk-integration-with-sensu-server"},{"source":"/4403253339412-fortanix-data-security-manager-with-double-key-encryption-for-microsoft-365","target":"fortanix-data-security-manager-with-double-key-encryption-for-microsoft-365"},{"source":"/4403253339412","target":"fortanix-data-security-manager-with-double-key-encryption-for-microsoft-365"},{"source":"/4403478486164-fortanix-support-sign-up-process","target":"fortanix-support-sign-up-process"},{"source":"/4403478486164","target":"fortanix-support-sign-up-process"},{"source":"/4403895262228-user-s-guide-deploy-the-workflow-manual","target":"users-guide-deploy-the-workflow-manual"},{"source":"/4403895262228","target":"users-guide-deploy-the-workflow-manual"},{"source":"/4403903202836-user-s-guide-deploy-the-workflow-web-interface","target":"users-guide-deploy-the-workflow-web-interface"},{"source":"/4403903202836","target":"users-guide-deploy-the-workflow-web-interface"},{"source":"/4403985550228-user-s-guide-sign-up-for-fortanix-data-security-manager-saas","target":"users-guide-sign-up-for-fortanix-data-security-manager-saas"},{"source":"/4403985550228","target":"users-guide-sign-up-for-fortanix-data-security-manager-saas"},{"source":"/4404171396756-generating-certificates-using-a-fortanix-data-security-manager-key","target":"generating-certificates-using-a-fortanix-data-security-manager-key"},{"source":"/4404171396756","target":"generating-certificates-using-a-fortanix-data-security-manager-key"},{"source":"/4404181731732-using-fortanix-data-security-manager-with-servicenow","target":"using-fortanix-data-security-manager-with-servicenow"},{"source":"/4404181731732","target":"using-fortanix-data-security-manager-with-servicenow"},{"source":"/4404920424468-fortanix-dsm-azure-key-vault-cdc-group-setup","target":"fortanix-dsm-azure-key-vault-cdc-group-setup"},{"source":"/4404920424468","target":"fortanix-dsm-azure-key-vault-cdc-group-setup"},{"source":"/4404930760212-fortanix-data-security-manager-sysadmin-settings-customization","target":"fortanix-data-security-manager-sysadmin-settings-customization"},{"source":"/4404930760212","target":"fortanix-data-security-manager-sysadmin-settings-customization"},{"source":"/4405261281172-how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service","target":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service"},{"source":"/4405261281172","target":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service"},{"source":"/4405269156116-what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret","target":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret"},{"source":"/4405269156116","target":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret"},{"source":"/4405269167508-is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period","target":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period"},{"source":"/4405269167508","target":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period"},{"source":"/4405261330196-what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects","target":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects"},{"source":"/4405261330196","target":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects"},{"source":"/4405381586708-user-s-guide-logging","target":"fortanix-users-guide-logging"},{"source":"/4405381586708","target":"fortanix-users-guide-logging"},{"source":"/4405403868564-what-are-transient-keys","target":"what-are-transient-keys"},{"source":"/4405403868564","target":"what-are-transient-keys"},{"source":"/4405440507796-fortanix-data-security-manager-quickstart","target":"fortanix-data-security-manager-quickstart"},{"source":"/4405440507796","target":"fortanix-data-security-manager-quickstart"},{"source":"/4406088587284-fortanix-support","target":"fortanix-support"},{"source":"/4406088587284","target":"fortanix-support"},{"source":"/4406135216532-fortanix-dsm-saas-overview","target":"fortanix-dsm-saas-overview"},{"source":"/4406135216532","target":"fortanix-dsm-saas-overview"},{"source":"/4406150022548-why-fortanix-dsm-saas","target":"why-fortanix-dsm-saas"},{"source":"/4406150022548","target":"why-fortanix-dsm-saas"},{"source":"/4406135282196-what-does-fortanix-dsm-saas-offer","target":"what-does-fortanix-dsm-saas-offer"},{"source":"/4406135282196","target":"what-does-fortanix-dsm-saas-offer"},{"source":"/4406150039188-how-does-fortanix-dsm-saas-work","target":"how-does-fortanix-dsm-saas-work"},{"source":"/4406150039188","target":"how-does-fortanix-dsm-saas-work"},{"source":"/4406150044820-how-will-i-be-billed","target":"how-will-i-be-billed"},{"source":"/4406150044820","target":"how-will-i-be-billed"},{"source":"/4406135346068-fortanix-dsm-saas-global-availability-map","target":"fortanix-dsm-saas-global-availability-map"},{"source":"/4406135346068","target":"fortanix-dsm-saas-global-availability-map"},{"source":"/4406135354772-scalability","target":"scalability"},{"source":"/4406135354772","target":"scalability"},{"source":"/4406135367316-fortanix-dsm-saas-architecture","target":"fortanix-dsm-saas-architecture"},{"source":"/4406135367316","target":"fortanix-dsm-saas-architecture"},{"source":"/4406888141716-fortanix-data-security-manager-with-imperva-cloud-waf","target":"fortanix-data-security-manager-with-imperva-cloud-waf"},{"source":"/4406888141716","target":"fortanix-data-security-manager-with-imperva-cloud-waf"},{"source":"/4407049792148-using-data-security-manager-with-snowflake","target":"using-data-security-manager-with-snowflake"},{"source":"/4407049792148","target":"using-data-security-manager-with-snowflake"},{"source":"/4407282721556-clients-sdks-for-rest-api","target":"clients-sdks-for-rest-api"},{"source":"/4407282721556","target":"clients-sdks-for-rest-api"},{"source":"/4407387100308-what-are-the-fortanix-dsm-saas-account-states","target":"what-are-the-fortanix-dsm-saas-account-states"},{"source":"/4407387100308","target":"what-are-the-fortanix-dsm-saas-account-states"},{"source":"/4407387174676-what-is-the-lifecycle-of-a-fortanix-dsm-saas-trial-account","target":"what-is-the-lifecycle-of-a-fortanix-dsm-saas-trial-account"},{"source":"/4407387174676","target":"what-is-the-lifecycle-of-a-fortanix-dsm-saas-trial-account"},{"source":"/4407460405396-fortanix-data-security-manager-sysadmin-delete-users-and-accounts","target":"fortanix-data-security-manager-sysadmin-delete-users-and-accounts"},{"source":"/4407460405396","target":"fortanix-data-security-manager-sysadmin-delete-users-and-accounts"},{"source":"/4407467898260-user-s-guide-key-move","target":"users-guide-key-move"},{"source":"/4407467898260","target":"users-guide-key-move"},{"source":"/4407475644436-clients-sequoia-pgp","target":"clients-sequoia-pgp"},{"source":"/4407475644436","target":"clients-sequoia-pgp"},{"source":"/4407822664724-fortanix-data-security-manager-deployment-options","target":"fortanix-data-security-manager-deployment-options"},{"source":"/4407822664724","target":"fortanix-data-security-manager-deployment-options"},{"source":"/4408325101460-sequoia-pgp","target":"sequoia-pgp"},{"source":"/4408325101460","target":"sequoia-pgp"},{"source":"/4408398538388-system-administration-account-and-users","target":"system-administration-account-and-users"},{"source":"/4408398538388","target":"system-administration-account-and-users"},{"source":"/4408398651668-system-administration-log-management","target":"system-administration-log-management"},{"source":"/4408398651668","target":"system-administration-log-management"},{"source":"/4408466794772-using-fortanix-data-security-manager-with-minio-kes-server","target":"using-fortanix-data-security-manager-with-minio-kes-server"},{"source":"/4408466794772","target":"using-fortanix-data-security-manager-with-minio-kes-server"},{"source":"/4408769594260-pkcs-11-change-log","target":"pkcs11-change-log"},{"source":"/4408769594260","target":"pkcs11-change-log"},{"source":"/4408769720724-pkcs-11-4-1-1484","target":"pkcs11-411484"},{"source":"/4408769720724","target":"pkcs11-411484"},{"source":"/4408769757076-pkcs-11-4-0-1467","target":"pkcs11-401467"},{"source":"/4408769757076","target":"pkcs11-401467"},{"source":"/4408753849108-pkcs-11-3-27-1458","target":"pkcs11-3271458"},{"source":"/4408753849108","target":"pkcs11-3271458"},{"source":"/4408753870100-pkcs-11-3-25-1443","target":"pkcs11-3251443"},{"source":"/4408753870100","target":"pkcs11-3251443"},{"source":"/4408753900692-pkcs-11-3-23-1408","target":"pkcs11-3231408"},{"source":"/4408753900692","target":"pkcs11-3231408"},{"source":"/4408753980692-pkcs-11-3-22-1383","target":"pkcs11-3221383"},{"source":"/4408753980692","target":"pkcs11-3221383"},{"source":"/4408775589268-pkcs-11-3-21-1376","target":"pkcs11-3211376"},{"source":"/4408775589268","target":"pkcs11-3211376"},{"source":"/4408784011540-pkcs-11-examples","target":"pkcs11-examples"},{"source":"/4408784011540","target":"pkcs11-examples"},{"source":"/4408820165140-what-are-the-list-of-browsers-that-fortanix-dsm-supports","target":"what-are-the-list-of-browsers-that-fortanix-dsm-supports"},{"source":"/4408820165140","target":"what-are-the-list-of-browsers-that-fortanix-dsm-supports"},{"source":"/4409539276820-securing-fx2200-oob-management-ports","target":"securing-fx2200-oob-management-ports"},{"source":"/4409539276820","target":"securing-fx2200-oob-management-ports"},{"source":"/4409941606932-how-do-i-check-the-fortanix-dsm-saas-status-in-real-time","target":"how-do-i-check-the-fortanix-dsm-saas-status-in-real-time"},{"source":"/4409941606932","target":"how-do-i-check-the-fortanix-dsm-saas-status-in-real-time"},{"source":"/4410529778964-using-fortanix-data-security-manager-to-create-tokenization-secret","target":"using-fortanix-data-security-manager-to-create-tokenization-secret"},{"source":"/4410529778964","target":"using-fortanix-data-security-manager-to-create-tokenization-secret"},{"source":"/4411192071444-using-fortanix-data-security-manager-with-rapid7-insightidr","target":"using-fortanix-data-security-manager-with-rapid7-insightidr"},{"source":"/4411192071444","target":"using-fortanix-data-security-manager-with-rapid7-insightidr"},{"source":"/4411510599444-using-fortanix-data-security-manager-with-netapp-ontap","target":"using-fortanix-data-security-manager-with-netapp-ontap"},{"source":"/4411510599444","target":"using-fortanix-data-security-manager-with-netapp-ontap"},{"source":"/4412260799124-quickstart-guide","target":"fortanix-quickstart-guide"},{"source":"/4412260799124","target":"fortanix-quickstart-guide"},{"source":"/4412262819860-user-s-guide-preparing-your-s3-bucket-for-confidential-ai","target":"users-guide-preparing-your-s3-bucket-for-confidential-ai"},{"source":"/4412262819860","target":"users-guide-preparing-your-s3-bucket-for-confidential-ai"},{"source":"/4412276731540-user-s-guide-sign-up-and-log-in-existing-dsm-saas-users","target":"users-guide-sign-up-and-log-in-existing-dsm-saas-users"},{"source":"/4412276731540","target":"users-guide-sign-up-and-log-in-existing-dsm-saas-users"},{"source":"/4412270624276-user-s-guide-sign-up-and-log-in-new-users","target":"users-guide-sign-up-and-log-in-new-users"},{"source":"/4412270624276","target":"users-guide-sign-up-and-log-in-new-users"},{"source":"/4412270786324-user-s-guide-sign-out","target":"users-guide-sign-out"},{"source":"/4412270786324","target":"users-guide-sign-out"},{"source":"/4412277858580-user-s-guide-data-ingestion","target":"users-guide-data-ingestion"},{"source":"/4412277858580","target":"users-guide-data-ingestion"},{"source":"/4412273435668-user-s-guide-data-preparation","target":"users-guide-data-preparation"},{"source":"/4412273435668","target":"users-guide-data-preparation"},{"source":"/4412290692628-user-s-guide-add-a-model","target":"users-guide-add-a-model"},{"source":"/4412290692628","target":"users-guide-add-a-model"},{"source":"/4412290973972-user-s-guide-inference","target":"users-guide-inference"},{"source":"/4412290973972","target":"users-guide-inference"},{"source":"/4412299051668-confidential-ai-algorithms","target":"confidential-ai-algorithms"},{"source":"/4412299051668","target":"confidential-ai-algorithms"},{"source":"/4412300629652-classification-and-learning-inference-using-k-nearest-neighbor-knn","target":"classification-and-learning-inference-using-k-nearest-neighbor-knn"},{"source":"/4412300629652","target":"classification-and-learning-inference-using-k-nearest-neighbor-knn"},{"source":"/4412284962836-build-a-model-using-logistic-regression","target":"build-a-model-using-logistic-regression"},{"source":"/4412284962836","target":"build-a-model-using-logistic-regression"},{"source":"/4412280506644-object-detection-using-yolov5","target":"object-detection-using-yolov5"},{"source":"/4412280506644","target":"object-detection-using-yolov5"},{"source":"/4412304867988--3-9-december-7-2021","target":"39-december-7-2021"},{"source":"/4412304867988","target":"39-december-7-2021"},{"source":"/4412347048340-running-an-example-application-using-aws-nitro-platform","target":"running-an-example-application-using-aws-nitro-platform"},{"source":"/4412347048340","target":"running-an-example-application-using-aws-nitro-platform"},{"source":"/4412575587732-fortanix-node-agent-software-aws-nitro-platform","target":"fortanix-node-agent-software-aws-nitro-platform"},{"source":"/4412575587732","target":"fortanix-node-agent-software-aws-nitro-platform"},{"source":"/4414088796564-supported-vms-for-azure-confidential-computing","target":"supported-vms-for-azure-confidential-computing"},{"source":"/4414088796564","target":"supported-vms-for-azure-confidential-computing"},{"source":"/4414187862164-user-s-guide-enroll-a-compute-node-using-azure-marketplace","target":"users-guide-enroll-a-compute-node-using-azure-marketplace"},{"source":"/4414187862164","target":"users-guide-enroll-a-compute-node-using-azure-marketplace"},{"source":"/4414195329172-user-s-guide-enroll-a-compute-node-bare-metal-or-vm-sgx","target":"users-guide-enroll-a-compute-node-bare-metal-or-vm-sgx"},{"source":"/4414195329172","target":"users-guide-enroll-a-compute-node-bare-metal-or-vm-sgx"},{"source":"/4414195448980-user-s-guide-enroll-a-compute-node-using-aws-nitro-on-amazon-linux","target":"users-guide-enroll-a-compute-node-using-aws-nitro-on-amazon-linux"},{"source":"/4414195448980","target":"users-guide-enroll-a-compute-node-using-aws-nitro-on-amazon-linux"},{"source":"/4414195452180-user-s-guide-compute-nodes","target":"users-guide-compute-nodes"},{"source":"/4414195452180","target":"users-guide-compute-nodes"},{"source":"/4414184952212--3-10-december-28-2021","target":"310-december-28-2021"},{"source":"/4414184952212","target":"310-december-28-2021"},{"source":"/4414753648788-sgx-detect-tool","target":"sgx-detect-tool"},{"source":"/4414753648788","target":"sgx-detect-tool"},{"source":"/4415596306324-what-is-a-join-token","target":"what-is-a-join-token"},{"source":"/4415596306324","target":"what-is-a-join-token"},{"source":"/4415631155092-fortanix-data-security-manager-release-4-3-kubernetes-version-upgrade-to-1-14-k8s","target":"fortanix-data-security-manager-release-43-kubernetes-version-upgrade-to-114-k8s"},{"source":"/4415631155092","target":"fortanix-data-security-manager-release-43-kubernetes-version-upgrade-to-114-k8s"},{"source":"/4415646505620-using-fortanix-dsm-for-google-workspace-client-side-encryption","target":"using-fortanix-dsm-for-google-workspace-client-side-encryption"},{"source":"/4415646505620","target":"using-fortanix-dsm-for-google-workspace-client-side-encryption"},{"source":"/4415758021524--3-11-january-13-2022","target":"311-january-13-2022"},{"source":"/4415758021524","target":"311-january-13-2022"},{"source":"/4416906187412-pkcs-11-4-3-2018","target":"pkcs11-432018"},{"source":"/4416906187412","target":"pkcs11-432018"},{"source":"/4417849226260--3-12-january-31-2022","target":"312-january-31-2022"},{"source":"/4417849226260","target":"312-january-31-2022"},{"source":"/4418878716948-okta-integration-with-sensu-server","target":"okta-integration-with-sensu-server"},{"source":"/4418878716948","target":"okta-integration-with-sensu-server"},{"source":"/4420783611540-user-s-guide-usage-metrics","target":"users-guide-usage-metrics"},{"source":"/4420783611540","target":"users-guide-usage-metrics"},{"source":"/4420883272596-user-s-guide-key-metadata-policy","target":"users-guide-key-metadata-policy"},{"source":"/4420883272596","target":"users-guide-key-metadata-policy"},{"source":"/4420959626388--3-13-february-14-2022","target":"313-february-14-2022"},{"source":"/4420959626388","target":"313-february-14-2022"},{"source":"/4422458875796-cluster-master-key-rotation","target":"cluster-master-key-rotation"},{"source":"/4422458875796","target":"cluster-master-key-rotation"},{"source":"/4422834032404-cluster-deployment-key-protection-non-sgx","target":"cluster-deployment-key-protection-non-sgx"},{"source":"/4422834032404","target":"cluster-deployment-key-protection-non-sgx"},{"source":"/4423384427796-user-s-guide-google-cloud-kms","target":"users-guide-google-cloud-kms"},{"source":"/4423384427796","target":"users-guide-google-cloud-kms"},{"source":"/4423630899092--4-4-feb-16-2022","target":"44-feb-16-2022"},{"source":"/4423630899092","target":"44-feb-16-2022"},{"source":"/4426678429204-user-s-guide-account-customization","target":"users-guide-account-customization"},{"source":"/4426678429204","target":"users-guide-account-customization"},{"source":"/4427051455764-pkcs-11-4-4-2028","target":"pkcs11-442028"},{"source":"/4427051455764","target":"pkcs11-442028"},{"source":"/4524826567188--3-14-february-28-2022","target":"314-february-28-2022"},{"source":"/4524826567188","target":"314-february-28-2022"},{"source":"/4580399065876--4-4-patch-mar-4-2022","target":"44-patch-mar-4-2022"},{"source":"/4580399065876","target":"44-patch-mar-4-2022"},{"source":"/4764402409876-user-s-guide-account-client-configurations","target":"users-guide-account-client-configurations"},{"source":"/4764402409876","target":"users-guide-account-client-configurations"},{"source":"/4882271921812--3-15-march-18-2022","target":"315-march-18-2022"},{"source":"/4882271921812","target":"315-march-18-2022"},{"source":"/5165069027220-bring-your-own-model-using-logistic-regression","target":"bring-your-own-model-using-logistic-regression"},{"source":"/5165069027220","target":"bring-your-own-model-using-logistic-regression"},{"source":"/5192506374932--3-16-march-31-2022","target":"316-march-31-2022"},{"source":"/5192506374932","target":"316-march-31-2022"},{"source":"/5225880392340-using-fortanix-data-security-manager-with-nutanix","target":"using-fortanix-data-security-manager-with-nutanix"},{"source":"/5225880392340","target":"using-fortanix-data-security-manager-with-nutanix"},{"source":"/5335281255188-key-operations","target":"key-operations"},{"source":"/5335281255188","target":"key-operations"},{"source":"/5486109561236-user-s-guide-azure-managed-hsm","target":"users-guide-azure-managed-hsm"},{"source":"/5486109561236","target":"users-guide-azure-managed-hsm"},{"source":"/5536736198164--4-6-apr-13-2022","target":"46-apr-13-2022"},{"source":"/5536736198164","target":"46-apr-13-2022"},{"source":"/5541351348244--3-17-april-13-2022","target":"317-april-13-2022"},{"source":"/5541351348244","target":"317-april-13-2022"},{"source":"/5652581928468-pkcs-11-4-6-2045","target":"pkcs11-462045"},{"source":"/5652581928468","target":"pkcs11-462045"},{"source":"/5677722668564--4-4-patch-apr-18-2022","target":"44-patch-apr-18-2022"},{"source":"/5677722668564","target":"44-patch-apr-18-2022"},{"source":"/5708233328020-using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey","target":"using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey"},{"source":"/5708233328020","target":"using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey"},{"source":"/5903994125460-using-fortanix-data-security-manager-with-commvault","target":"using-fortanix-data-security-manager-with-commvault"},{"source":"/5903994125460","target":"using-fortanix-data-security-manager-with-commvault"},{"source":"/5926126482964-x-request-id","target":"x-request-id"},{"source":"/5926126482964","target":"x-request-id"},{"source":"/5932364814228--4-6-patch-apr-29-2022","target":"46-patch-apr-29-2022"},{"source":"/5932364814228","target":"46-patch-apr-29-2022"},{"source":"/6252946003604--4-7-may-13-2022","target":"47-may-13-2022"},{"source":"/6252946003604","target":"47-may-13-2022"},{"source":"/6313158314516--4-6-patch-may-16-2022","target":"46-patch-may-16-2022"},{"source":"/6313158314516","target":"46-patch-may-16-2022"},{"source":"/6334788741908-security-architecture-of-running-fortanix-dsm-in-a-non-sgx-virtual-environment-on-prem-only","target":"security-architecture-of-running-fortanix-dsm-in-a-non-sgx-virtual-environment-on-prem-only"},{"source":"/6334788741908","target":"security-architecture-of-running-fortanix-dsm-in-a-non-sgx-virtual-environment-on-prem-only"},{"source":"/6370635913620-using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-windows-server","target":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-windows-server"},{"source":"/6370635913620","target":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-windows-server"},{"source":"/6371025054228--3-18-may-19-2022","target":"318-may-19-2022"},{"source":"/6371025054228","target":"318-may-19-2022"},{"source":"/6390501090452-using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-linux-server","target":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-linux-server"},{"source":"/6390501090452","target":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-linux-server"},{"source":"/6496719605780-clients-terraform-provider","target":"clients-terraform-provider"},{"source":"/6496719605780","target":"clients-terraform-provider"},{"source":"/6677033204756-using-fortanix-custodial-warm-wallet-solution","target":"using-fortanix-custodial-warm-wallet-solution"},{"source":"/6677033204756","target":"using-fortanix-custodial-warm-wallet-solution"},{"source":"/6678703159700-using-fortanix-ignite-one-time-signer-solution","target":"using-fortanix-ignite-one-time-signer-solution"},{"source":"/6678703159700","target":"using-fortanix-ignite-one-time-signer-solution"},{"source":"/6870694386580-using-fortanix-data-security-manager-with-microsoft-iis-integration-guide","target":"using-fortanix-data-security-manager-with-microsoft-iis-integration-guide"},{"source":"/6870694386580","target":"using-fortanix-data-security-manager-with-microsoft-iis-integration-guide"},{"source":"/6995000535828-user-s-guide-configuring-a-saml-provider-application-in-azure","target":"users-guide-configuring-a-saml-provider-application-in-azure"},{"source":"/6995000535828","target":"users-guide-configuring-a-saml-provider-application-in-azure"},{"source":"/6999736664468-using-fortanix-signing-provider-for-tendermint-kms","target":"using-fortanix-signing-provider-for-tendermint-kms"},{"source":"/6999736664468","target":"using-fortanix-signing-provider-for-tendermint-kms"},{"source":"/7033380735764-using-fortanix-data-security-manager-with-rsa-secure-id-access","target":"using-fortanix-data-security-manager-with-rsa-secure-id-access"},{"source":"/7033380735764","target":"using-fortanix-data-security-manager-with-rsa-secure-id-access"},{"source":"/7102318547988-using-fortanix-data-security-manager-with-venafi-keyless-tls","target":"/docs/using-fortanix-data-security-manager-with-venafi-keyless-tls"},{"source":"/7102318547988","target":"using-fortanix-data-security-manager-with-venafi-keyless-tls"},{"source":"/7104255154836-user-s-guide-inviting-a-user-to-fortanix-data-security-manager","target":"users-guide-inviting-a-user-to-fortanix-data-security-manager"},{"source":"/7104255154836","target":"users-guide-inviting-a-user-to-fortanix-data-security-manager"},{"source":"/7251592480148-using-fortanix-data-security-manager-with-appviewx-clmaas","target":"using-fortanix-data-security-manager-with-appviewx-clmaas"},{"source":"/7251592480148","target":"using-fortanix-data-security-manager-with-appviewx-clmaas"},{"source":"/7458401524756--4-8-jul-14-2022","target":"48-jul-14-2022"},{"source":"/7458401524756","target":"48-jul-14-2022"},{"source":"/7464862710548-pkcs-11-4-8-2070","target":"pkcs11-482070"},{"source":"/7464862710548","target":"pkcs11-482070"},{"source":"/7535961661076-using-fortanix-data-security-manager-with-sectigo-ca-for-secure-certificate-generation","target":"using-fortanix-data-security-manager-with-sectigo-ca-for-secure-certificate-generation"},{"source":"/7535961661076","target":"using-fortanix-data-security-manager-with-sectigo-ca-for-secure-certificate-generation"},{"source":"/7565778101524-using-fortanix-data-security-manager-with-bloombase-storesafe","target":"using-fortanix-data-security-manager-with-bloombase-storesafe"},{"source":"/7565778101524","target":"using-fortanix-data-security-manager-with-bloombase-storesafe"},{"source":"/7570195214740-using-fortanix-data-security-manager-with-logrhythm","target":"using-fortanix-data-security-manager-with-logrhythm"},{"source":"/7570195214740","target":"using-fortanix-data-security-manager-with-logrhythm"},{"source":"/7603547668756-using-fortanix-data-security-manager-with-shardsecure","target":"using-fortanix-data-security-manager-with-shardsecure"},{"source":"/7603547668756","target":"using-fortanix-data-security-manager-with-shardsecure"},{"source":"/7635067518740--3-19-july-08-2022","target":"319-july-08-2022"},{"source":"/7635067518740","target":"319-july-08-2022"},{"source":"/7873782643604-using-fortanix-data-security-manager-with-forgerock-oauth-2-0","target":"using-fortanix-data-security-manager-with-forgerock-oauth-20"},{"source":"/7873782643604","target":"using-fortanix-data-security-manager-with-forgerock-oauth-20"},{"source":"/7960827706772--4-8-patch-july-21-2022","target":"48-patch-july-21-2022"},{"source":"/7960827706772","target":"48-patch-july-21-2022"},{"source":"/8137714707220-user-s-guide-custom-role","target":"users-guide-custom-role"},{"source":"/8137714707220","target":"users-guide-custom-role"},{"source":"/8144952406932-user-s-guide-group-key-encryption-key","target":"users-guide-group-key-encryption-key"},{"source":"/8144952406932","target":"users-guide-group-key-encryption-key"},{"source":"/8169082339860-kubernetes-root-ca-rotation","target":"kubernetes-root-ca-rotation"},{"source":"/8169082339860","target":"kubernetes-root-ca-rotation"},{"source":"/8171478773268--4-9-jul-29-2022","target":"49-jul-29-2022"},{"source":"/8171478773268","target":"49-jul-29-2022"},{"source":"/8262860454292-pkcs-11-4-9-2172","target":"pkcs11-492172"},{"source":"/8262860454292","target":"pkcs11-492172"},{"source":"/8603584170388--3-20-august-16-2022","target":"320-august-16-2022"},{"source":"/8603584170388","target":"320-august-16-2022"},{"source":"/8625951994772-pgp-integration-with-jce-provider-and-bouncy-castle","target":"pgp-integration-with-jce-provider-and-bouncy-castle"},{"source":"/8625951994772","target":"pgp-integration-with-jce-provider-and-bouncy-castle"},{"source":"/8723554765332-using-fortanix-data-security-manager-with-hyperledger-fabric","target":"using-fortanix-data-security-manager-with-hyperledger-fabric"},{"source":"/8723554765332","target":"using-fortanix-data-security-manager-with-hyperledger-fabric"},{"source":"/8851680581396--4-10-aug-26-2022","target":"410-aug-26-2022"},{"source":"/8851680581396","target":"410-aug-26-2022"},{"source":"/8942084791060--4-10-patch-august-30-2022","target":"410-patch-august-30-2022"},{"source":"/8942084791060","target":"410-patch-august-30-2022"},{"source":"/9000432599444--3-21-september-01-2022","target":"321-september-01-2022"},{"source":"/9000432599444","target":"321-september-01-2022"},{"source":"/9020680349972--4-10-patch-september-02-2022","target":"410-patch-september-02-2022"},{"source":"/9020680349972","target":"410-patch-september-02-2022"},{"source":"/9033311116436--4-9-patch-september-02-2022","target":"49-patch-september-02-2022"},{"source":"/9033311116436","target":"49-patch-september-02-2022"},{"source":"/9171348733076-fortanix-dsm-saas-homepage","target":"fortanix-dsm-saas-homepage"},{"source":"/9171348733076","target":"fortanix-dsm-saas-homepage"},{"source":"/9493812638996-pkcs-11-supported-functions-and-mechanisms","target":"pkcs11-supported-functions-and-mechanisms"},{"source":"/9493812638996","target":"pkcs11-supported-functions-and-mechanisms"},{"source":"/9614323533588--4-9-patch-september-26-2022","target":"49-patch-september-26-2022"},{"source":"/9614323533588","target":"49-patch-september-26-2022"},{"source":"/9677813219348-dsm-accelerator-concepts","target":"dsm-accelerator-concepts"},{"source":"/9677813219348","target":"dsm-accelerator-concepts"},{"source":"/9697915069588-dsm-accelerator-pkcs-11-client-deployment","target":"dsm-accelerator-pkcs11-client-deployment"},{"source":"/9697915069588","target":"dsm-accelerator-pkcs11-client-deployment"},{"source":"/9698619268628-dsm-accelerator-webservice","target":"dsm-accelerator-webservice-1"},{"source":"/9698619268628","target":"dsm-accelerator-webservice-1"},{"source":"/9726342778388-fortanix-data-security-manager-release-4-11-kubernetes-version-upgrade-to-1-19-k8s","target":"fortanix-data-security-manager-release-411-kubernetes-version-upgrade-to-119-k8s"},{"source":"/9726342778388","target":"fortanix-data-security-manager-release-411-kubernetes-version-upgrade-to-119-k8s"},{"source":"/9727792740500--3-22-september-30-2022","target":"322-september-30-2022"},{"source":"/9727792740500","target":"322-september-30-2022"},{"source":"/9730867055764-fortanix-ipmi-setup-for-fx2200-series-i","target":"fortanix-ipmi-setup-for-fx2200-series-i"},{"source":"/9730867055764","target":"fortanix-ipmi-setup-for-fx2200-series-i"},{"source":"/9735710018068--4-11-sept-30-2022","target":"411-sept-30-2022"},{"source":"/9735710018068","target":"411-sept-30-2022"},{"source":"/9736843252244-pkcs-11-4-11-2116","target":"pkcs11-4112116"},{"source":"/9736843252244","target":"pkcs11-4112116"},{"source":"/9913582294292-how-does-the-enclave-build-procedure-ensure-that-the-content-of-an-image-cannot-be-altered-between-the-conversion-and-a-future-run","target":"how-does-the-enclave-build-procedure-ensure-that-the-content-of-an-image-cannot-be-altered-between-the-conversion-and-a-future-run"},{"source":"/9913582294292","target":"how-does-the-enclave-build-procedure-ensure-that-the-content-of-an-image-cannot-be-altered-between-the-conversion-and-a-future-run"},{"source":"/9913625428500-how-does-the-attestation-process-guarantee-hardware-integrity","target":"how-does-the-attestation-process-guarantee-hardware-integrity"},{"source":"/9913625428500","target":"how-does-the-attestation-process-guarantee-hardware-integrity"},{"source":"/9913630262548-how-does-the-attestation-process-guarantee-code-integrity","target":"how-does-the-attestation-process-guarantee-code-integrity"},{"source":"/9913630262548","target":"how-does-the-attestation-process-guarantee-code-integrity"},{"source":"/9913926131860-what-are-validity-periods-in-fortanix-ccm","target":"what-are-validity-periods-in-fortanix-ccm"},{"source":"/9913926131860","target":"what-are-validity-periods-in-fortanix-ccm"},{"source":"/9913932975764-what-are-various-limits-and-quotas-in-fortanix-ccm","target":"what-are-various-limits-and-quotas-in-fortanix-ccm"},{"source":"/9913932975764","target":"what-are-various-limits-and-quotas-in-fortanix-ccm"},{"source":"/9914093780244-which-container-registries-does-fortanix-ccm-support","target":"which-container-registries-does-fortanix-ccm-support"},{"source":"/9914093780244","target":"which-container-registries-does-fortanix-ccm-support"},{"source":"/10061532264468--4-11-patch-october-13-2022","target":"411-patch-october-13-2022"},{"source":"/10061532264468","target":"411-patch-october-13-2022"},{"source":"/10080145110804--0-5-17-august-12-2022","target":"0517-august-12-2022"},{"source":"/10080145110804","target":"0517-august-12-2022"},{"source":"/10080206315284--0-5-18-september-09-2022","target":"0518-september-09-2022"},{"source":"/10080206315284","target":"0518-september-09-2022"},{"source":"/10083478656020--0-5-19-october-14-2022","target":"0519-october-14-2022"},{"source":"/10083478656020","target":"0519-october-14-2022"},{"source":"/10145085542676-using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest","target":"using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest"},{"source":"/10145085542676","target":"using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest"},{"source":"/10257879678228--4-11-patch-october-21-2022","target":"411-patch-october-21-2022"},{"source":"/10257879678228","target":"411-patch-october-21-2022"},{"source":"/10423774296980--4-12-oct-28-2022","target":"412-oct-28-2022"},{"source":"/10423774296980","target":"412-oct-28-2022"},{"source":"/10643504728212--4-12-patch-november-07-2022","target":"412-patch-november-07-2022"},{"source":"/10643504728212","target":"412-patch-november-07-2022"},{"source":"/10735328050836--3-23-november-10-2022","target":"323-november-10-2022"},{"source":"/10735328050836","target":"323-november-10-2022"},{"source":"/10760869997204--0-5-20-november-11-2022","target":"0520-november-11-2022"},{"source":"/10760869997204","target":"0520-november-11-2022"},{"source":"/10990113544852--4-12-patch-november-20-2022","target":"412-patch-november-20-2022"},{"source":"/10990113544852","target":"412-patch-november-20-2022"},{"source":"/11201117419412-fortanix-dsm-with-aws-external-key-store-xks-concepts","target":"fortanix-dsm-with-aws-external-key-store-xks-concepts"},{"source":"/11201117419412","target":"fortanix-dsm-with-aws-external-key-store-xks-concepts"},{"source":"/11202643204884-using-fortanix-dsm-with-aws-external-key-store-xks","target":"using-fortanix-dsm-with-aws-external-key-store-xks"},{"source":"/11202643204884","target":"using-fortanix-dsm-with-aws-external-key-store-xks"},{"source":"/11299288265492--0-5-21-december-02-2022","target":"0521-december-02-2022"},{"source":"/11299288265492","target":"0521-december-02-2022"},{"source":"/11531273191572-fortanix-dsm-cloud-data-control-getting-started","target":"fortanix-dsm-cloud-data-control-getting-started"},{"source":"/11531273191572","target":"fortanix-dsm-cloud-data-control-getting-started"},{"source":"/11532141147284-fortanix-dsm-aws-cloud-native-key-management","target":"fortanix-dsm-aws-cloud-native-key-management"},{"source":"/11532141147284","target":"fortanix-dsm-aws-cloud-native-key-management"},{"source":"/11532677984404-fortanix-dsm-aws-kms-byok-bring-your-own-key","target":"fortanix-dsm-aws-kms-byok-bring-your-own-key"},{"source":"/11532677984404","target":"fortanix-dsm-aws-kms-byok-bring-your-own-key"},{"source":"/11542569398420-user-s-guide-data-export","target":"users-guide-data-export"},{"source":"/11542569398420","target":"users-guide-data-export"},{"source":"/11563598951060-fortanix-dsm-backup-for-audit-log","target":"fortanix-dsm-backup-for-audit-log"},{"source":"/11563598951060","target":"fortanix-dsm-backup-for-audit-log"},{"source":"/11565244691732-fortanix-dsm-backup-and-restore-for-aws-s3-bucket-sgx","target":"fortanix-dsm-backup-and-restore-for-aws-s3-bucket-sgx"},{"source":"/11565244691732","target":"fortanix-dsm-backup-and-restore-for-aws-s3-bucket-sgx"},{"source":"/11570678879636-fortanix-dsm-azure-key-vault-cloud-native-key-management","target":"fortanix-dsm-azure-key-vault-cloud-native-key-management"},{"source":"/11570678879636","target":"fortanix-dsm-azure-key-vault-cloud-native-key-management"},{"source":"/11572719463316-fortanix-dsm-backup-and-restore-for-azure-blob-storage-sgx","target":"fortanix-dsm-backup-and-restore-for-azure-blob-storage-sgx"},{"source":"/11572719463316","target":"fortanix-dsm-backup-and-restore-for-azure-blob-storage-sgx"},{"source":"/11573627705364-introduction-to-fortanix-dsm-backup-and-restore","target":"introduction-to-fortanix-dsm-backup-and-restore"},{"source":"/11573627705364","target":"introduction-to-fortanix-dsm-backup-and-restore"},{"source":"/11590380681620-fortanix-dsm-backup-and-restore-non-sgx","target":"fortanix-dsm-backup-and-restore-non-sgx"},{"source":"/11590380681620","target":"fortanix-dsm-backup-and-restore-non-sgx"},{"source":"/11591181799572-extended-virtual-keys-concepts","target":"extended-virtual-keys-concepts"},{"source":"/11591181799572","target":"extended-virtual-keys-concepts"},{"source":"/11591328327444-fortanix-dsm-backup-and-restore-for-cdk-non-sgx","target":"fortanix-dsm-backup-and-restore-for-cdk-non-sgx"},{"source":"/11591328327444","target":"fortanix-dsm-backup-and-restore-for-cdk-non-sgx"},{"source":"/11592403248148-fortanix-dsm-password-based-backup-and-restore-using-scp-sgx","target":"fortanix-dsm-password-based-backup-and-restore-using-scp-sgx"},{"source":"/11592403248148","target":"fortanix-dsm-password-based-backup-and-restore-using-scp-sgx"},{"source":"/11593113168148-user-s-guide-store-keys-externally-setup","target":"users-guide-store-keys-externally-setup"},{"source":"/11593113168148","target":"users-guide-store-keys-externally-setup"},{"source":"/11593153531668-fortanix-dsm-passwordless-based-backup-and-restore-using-scp-sgx","target":"fortanix-dsm-passwordless-based-backup-and-restore-using-scp-sgx"},{"source":"/11593153531668","target":"fortanix-dsm-passwordless-based-backup-and-restore-using-scp-sgx"},{"source":"/11593753674900-user-s-guide-store-keys-externally-key-management","target":"users-guide-store-keys-externally-key-management"},{"source":"/11593753674900","target":"users-guide-store-keys-externally-key-management"},{"source":"/11601051128980--4-13-jan-05-2023","target":"413-jan-05-2023"},{"source":"/11601051128980","target":"413-jan-05-2023"},{"source":"/11620525047828-fortanix-dsm-azure-key-vault-byok-bring-your-own-key","target":"fortanix-dsm-azure-key-vault-byok-bring-your-own-key"},{"source":"/11620525047828","target":"fortanix-dsm-azure-key-vault-byok-bring-your-own-key"},{"source":"/11710066701460-pkcs-11-4-13-2173","target":"pkcs11-4132173"},{"source":"/11710066701460","target":"pkcs11-4132173"},{"source":"/11745658901140--3-24-december-20-2022","target":"324-december-20-2022"},{"source":"/11745658901140","target":"324-december-20-2022"},{"source":"/12457045993236-using-data-security-manager-with-oracle-key-vault","target":"using-data-security-manager-with-oracle-key-vault"},{"source":"/12457045993236","target":"using-data-security-manager-with-oracle-key-vault"},{"source":"/12459082421396--3-25-january-18-2023","target":"325-january-18-2023"},{"source":"/12459082421396","target":"325-january-18-2023"},{"source":"/12577409548180-fortanix-dsm-restoration-guide-automated","target":"fortanix-dsm-restoration-guide-automated"},{"source":"/12577409548180","target":"fortanix-dsm-restoration-guide-automated"},{"source":"/12629156140436-dsm-accelerator-jce-provider","target":"dsm-accelerator-jce-provider"},{"source":"/12629156140436","target":"dsm-accelerator-jce-provider"},{"source":"/12660233718036-fortanix-dsm-aws-key-management-service-cdc-group-setup-using-easy-wizard","target":"fortanix-dsm-aws-key-management-service-cdc-group-setup-using-easy-wizard"},{"source":"/12660233718036","target":"fortanix-dsm-aws-key-management-service-cdc-group-setup-using-easy-wizard"},{"source":"/12661278003988--4-14-jan-27-2023","target":"414-jan-27-2023"},{"source":"/12661278003988","target":"414-jan-27-2023"},{"source":"/12715565562260-data-security-manager-with-microsoft-sql-server-tde-integration-introduction","target":"data-security-manager-with-microsoft-sql-server-tde-integration-introduction"},{"source":"/12715565562260","target":"data-security-manager-with-microsoft-sql-server-tde-integration-introduction"},{"source":"/12715831971988-data-security-manager-with-microsoft-sql-server-tde-integration-before-you-begin","target":"data-security-manager-with-microsoft-sql-server-tde-integration-before-you-begin"},{"source":"/12715831971988","target":"data-security-manager-with-microsoft-sql-server-tde-integration-before-you-begin"},{"source":"/12716404097428-data-security-manager-with-microsoft-sql-server-tde-integration-key-rotation","target":"data-security-manager-with-microsoft-sql-server-tde-integration-key-rotation"},{"source":"/12716404097428","target":"data-security-manager-with-microsoft-sql-server-tde-integration-key-rotation"},{"source":"/12716572654228-data-security-manager-with-microsoft-sql-server-tde-integration-standalone-server","target":"data-security-manager-with-microsoft-sql-server-tde-integration-standalone-server"},{"source":"/12716572654228","target":"data-security-manager-with-microsoft-sql-server-tde-integration-standalone-server"},{"source":"/12718754405780-data-security-manager-with-microsoft-sql-server-tde-integration-always-on-group-aog","target":"data-security-manager-with-microsoft-sql-server-tde-integration-always-on-group-aog"},{"source":"/12718754405780","target":"data-security-manager-with-microsoft-sql-server-tde-integration-always-on-group-aog"},{"source":"/12782302548500-data-security-manager-with-microsoft-sql-server-tde-integration-backup-restore","target":"data-security-manager-with-microsoft-sql-server-tde-integration-backup-restore"},{"source":"/12782302548500","target":"data-security-manager-with-microsoft-sql-server-tde-integration-backup-restore"},{"source":"/12784149123604-using-fortanix-confidential-computing-manager-with-postgresql","target":"using-fortanix-confidential-computing-manager-with-postgresql"},{"source":"/12784149123604","target":"using-fortanix-confidential-computing-manager-with-postgresql"},{"source":"/12813925746580-fortanix-data-security-manager-fx2200-console-port-db9-configuration-guide","target":"fortanix-data-security-manager-fx2200-console-port-db9-configuration-guide"},{"source":"/12813925746580","target":"fortanix-data-security-manager-fx2200-console-port-db9-configuration-guide"},{"source":"/12883013690772--4-14-patch-february-02-2023","target":"414-patch-february-02-2023"},{"source":"/12883013690772","target":"414-patch-february-02-2023"},{"source":"/12883881039508-using-fortanix-data-security-manager-with-veritas-netbackup","target":"using-fortanix-data-security-manager-with-veritas-netbackup"},{"source":"/12883881039508","target":"using-fortanix-data-security-manager-with-veritas-netbackup"},{"source":"/13097103489556-data-security-manager-with-microsoft-sql-server-tde-integration-advanced","target":"data-security-manager-with-microsoft-sql-server-tde-integration-advanced"},{"source":"/13097103489556","target":"data-security-manager-with-microsoft-sql-server-tde-integration-advanced"},{"source":"/13191297562388--3-26-february-15-2023","target":"326-february-15-2023"},{"source":"/13191297562388","target":"326-february-15-2023"},{"source":"/13200373634580-fortanix-dsm-user-migration-to-new-iam-capability","target":"fortanix-dsm-user-migration-to-new-iam-capability"},{"source":"/13200373634580","target":"fortanix-dsm-user-migration-to-new-iam-capability"},{"source":"/13224806176020--0-5-22-february-15-2023","target":"0522-february-15-2023"},{"source":"/13224806176020","target":"0522-february-15-2023"},{"source":"/13550284882324-fortanix-data-security-manager-release-4-15-kubernetes-version-upgrade-to-1-21-k8s","target":"fortanix-data-security-manager-release-415-kubernetes-version-upgrade-to-121-k8s"},{"source":"/13550284882324","target":"fortanix-data-security-manager-release-415-kubernetes-version-upgrade-to-121-k8s"},{"source":"/13588356597396--4-15-mar-02-2023","target":"415-mar-02-2023"},{"source":"/13588356597396","target":"415-mar-02-2023"},{"source":"/13790898485268--0-5-23-march-09-2023","target":"0523-march-09-2023"},{"source":"/13790898485268","target":"0523-march-09-2023"},{"source":"/13878034752276-using-fortanix-data-security-manager-with-beyondtrust-password-safe","target":"using-fortanix-data-security-manager-with-beyondtrust-password-safe"},{"source":"/13878034752276","target":"using-fortanix-data-security-manager-with-beyondtrust-password-safe"},{"source":"/13880108899476-using-fortanix-data-security-manager-with-cortex-xsoar","target":"using-fortanix-data-security-manager-with-cortex-xsoar"},{"source":"/13880108899476","target":"using-fortanix-data-security-manager-with-cortex-xsoar"},{"source":"/13880313606548--3-27-march-13-2023","target":"327-march-13-2023"},{"source":"/13880313606548","target":"327-march-13-2023"},{"source":"/14426299427860-fortanix-ccm-user-migration-to-new-iam-capability","target":"fortanix-ccm-user-migration-to-new-iam-capability"},{"source":"/14426299427860","target":"fortanix-ccm-user-migration-to-new-iam-capability"},{"source":"/14455618146324-fortanix-data-security-manager-upgrade-prechecks-using-sensu-automated","target":"fortanix-data-security-manager-upgrade-prechecks-using-sensu-automated"},{"source":"/14455618146324","target":"fortanix-data-security-manager-upgrade-prechecks-using-sensu-automated"},{"source":"/14456489810580--4-16-mar-31-2023","target":"416-mar-31-2023"},{"source":"/14456489810580","target":"416-mar-31-2023"},{"source":"/14457718493332--3-28-march-31-2023","target":"328-march-31-2023"},{"source":"/14457718493332","target":"328-march-31-2023"},{"source":"/14654215175188--0-5-24-april-06-2023","target":"0524-april-06-2023"},{"source":"/14654215175188","target":"0524-april-06-2023"},{"source":"/14830187318164-pkcs-11-4-16-2195","target":"pkcs11-4162195"},{"source":"/14830187318164","target":"pkcs11-4162195"},{"source":"/14869338604308--4-16-patch-april-14-2023","target":"416-patch-april-14-2023"},{"source":"/14869338604308","target":"416-patch-april-14-2023"},{"source":"/15178712566932--3-29-april-26-2023","target":"329-april-26-2023"},{"source":"/15178712566932","target":"329-april-26-2023"},{"source":"/15202841802900--4-17-may-16-2023","target":"417-may-16-2023"},{"source":"/15202841802900","target":"417-may-16-2023"},{"source":"/15271147169940-using-fortanix-data-security-manager-with-imperva-dsf","target":"using-fortanix-data-security-manager-with-imperva-dsf"},{"source":"/15271147169940","target":"using-fortanix-data-security-manager-with-imperva-dsf"},{"source":"/15544141054100--3-30-may-10-2023","target":"330-may-10-2023"},{"source":"/15544141054100","target":"330-may-10-2023"},{"source":"/15555250774804-amazon-elastic-kubernetes-service-with-fortanix-confidential-computing-manager","target":"amazon-elastic-kubernetes-service-with-fortanix-confidential-computing-manager"},{"source":"/15555250774804","target":"amazon-elastic-kubernetes-service-with-fortanix-confidential-computing-manager"},{"source":"/15562848554260-user-s-guide-deploying-the-aci-application-using-azure-portal","target":"users-guide-deploying-the-aci-application-using-azure-portal"},{"source":"/15562848554260","target":"users-guide-deploying-the-aci-application-using-azure-portal"},{"source":"/15656398651796-lms-keys-faqs","target":"lms-keys-faqs"},{"source":"/15656398651796","target":"lms-keys-faqs"},{"source":"/15658066081044-security-objects-tokenization-quickstart","target":"security-objects-tokenization-quickstart"},{"source":"/15658066081044","target":"security-objects-tokenization-quickstart"},{"source":"/15690836640404-security-objects-tokenization-examples","target":"security-objects-tokenization-examples"},{"source":"/15690836640404","target":"security-objects-tokenization-examples"},{"source":"/15691531212692-security-objects-tokenization-best-practices","target":"security-objects-tokenization-best-practices"},{"source":"/15691531212692","target":"security-objects-tokenization-best-practices"},{"source":"/15719559723028-pkcs-11-4-17-2214","target":"pkcs11-4172214"},{"source":"/15719559723028","target":"pkcs11-4172214"},{"source":"/15749090577940-intel-attestation-service-version-4-advisory","target":"intel-attestation-service-version-4-advisory"},{"source":"/15749090577940","target":"intel-attestation-service-version-4-advisory"},{"source":"/16140316452628-using-fortanix-dsm-for-issuing-key-attestation-statements","target":"using-fortanix-dsm-for-issuing-key-attestation-statements"},{"source":"/16140316452628","target":"using-fortanix-dsm-for-issuing-key-attestation-statements"},{"source":"/16278551296148-fortanix-data-security-manager-with-google-cloud-ekm-interface-using-virtual-private-cloud","target":"fortanix-data-security-manager-with-google-cloud-ekm-interface-using-virtual-private-cloud"},{"source":"/16278551296148","target":"fortanix-data-security-manager-with-google-cloud-ekm-interface-using-virtual-private-cloud"},{"source":"/16309222152212-using-fortanix-data-security-manager-with-oracle-tde-advanced-integration","target":"using-fortanix-data-security-manager-with-oracle-tde-advanced-integration"},{"source":"/16309222152212","target":"using-fortanix-data-security-manager-with-oracle-tde-advanced-integration"},{"source":"/16316435462164--4-18-june-13-2023","target":"418-june-13-2023"},{"source":"/16316435462164","target":"418-june-13-2023"},{"source":"/16346696719508--0-5-25-june-12-2023","target":"0525-june-12-2023"},{"source":"/16346696719508","target":"0525-june-12-2023"},{"source":"/16370764797332-fortanix-return-merchandise-authorization-rma-fx2200-process","target":"fortanix-return-merchandise-authorization-rma-fx2200-process"},{"source":"/16370764797332","target":"fortanix-return-merchandise-authorization-rma-fx2200-process"},{"source":"/16378084356884-using-fortanix-data-security-manager-with-oracle-tde-introduction","target":"using-fortanix-data-security-manager-with-oracle-tde-introduction"},{"source":"/16378084356884","target":"using-fortanix-data-security-manager-with-oracle-tde-introduction"},{"source":"/16460412627476-pkcs-11-4-18-2231","target":"pkcs11-4182231"},{"source":"/16460412627476","target":"pkcs11-4182231"},{"source":"/16493610669844-workflow-applications-using-fortanix-aci","target":"workflow-applications-using-fortanix-aci"},{"source":"/16493610669844","target":"workflow-applications-using-fortanix-aci"},{"source":"/16499550595860--3-31-june-16-2023","target":"331-june-16-2023"},{"source":"/16499550595860","target":"331-june-16-2023"},{"source":"/16585873878676-object-detection","target":"object-detection"},{"source":"/16585873878676","target":"object-detection"},{"source":"/16587436889876-churn-prediction","target":"churn-prediction"},{"source":"/16587436889876","target":"churn-prediction"},{"source":"/16686070848276--4-18-patch-june-20-2023","target":"418-patch-june-20-2023"},{"source":"/16686070848276","target":"418-patch-june-20-2023"},{"source":"/16739977505940-fortanix-data-security-manager-software-pre-upgrade-checks-manual","target":"fortanix-data-security-manager-software-pre-upgrade-checks-manual"},{"source":"/16739977505940","target":"fortanix-data-security-manager-software-pre-upgrade-checks-manual"},{"source":"/16875420198036-fortanix-data-security-manager-software-post-upgrade-checks","target":"fortanix-data-security-manager-software-post-upgrade-checks"},{"source":"/16875420198036","target":"fortanix-data-security-manager-software-post-upgrade-checks"},{"source":"/16909253326740-using-fortanix-data-security-manager-with-keyfactor-iis-orchestrator","target":"using-fortanix-data-security-manager-with-keyfactor-iis-orchestrator"},{"source":"/16909253326740","target":"using-fortanix-data-security-manager-with-keyfactor-iis-orchestrator"},{"source":"/16916974311700-fortanix-data-security-manager-with-microsoft-sql-server-always-encrypted","target":"fortanix-data-security-manager-with-microsoft-sql-server-always-encrypted"},{"source":"/16916974311700","target":"fortanix-data-security-manager-with-microsoft-sql-server-always-encrypted"},{"source":"/16918490941204-fortanix-data-security-manager-sysadmin-settings-authentication","target":"fortanix-data-security-manager-sysadmin-settings-authentication"},{"source":"/16918490941204","target":"fortanix-data-security-manager-sysadmin-settings-authentication"},{"source":"/16921196691860-dsm-accelerator-webservice-external-logging","target":"dsm-accelerator-webservice-external-logging"},{"source":"/16921196691860","target":"dsm-accelerator-webservice-external-logging"},{"source":"/16923751208724--4-19-july-02-2023","target":"419-july-02-2023"},{"source":"/16923751208724","target":"419-july-02-2023"},{"source":"/17182105832084-pkcs-11-4-19-2244","target":"pkcs11-4192244"},{"source":"/17182105832084","target":"pkcs11-4192244"},{"source":"/17269037965076-workflow-applications-using-fortanix-enclave-os-aws-nitro","target":"workflow-applications-using-fortanix-enclave-os-aws-nitro"},{"source":"/17269037965076","target":"workflow-applications-using-fortanix-enclave-os-aws-nitro"},{"source":"/17292313406868-user-s-guide-aws-nitro-file-persistence","target":"users-guide-aws-nitro-file-persistence"},{"source":"/17292313406868","target":"users-guide-aws-nitro-file-persistence"},{"source":"/17309201819796--3-32-july-12-2023","target":"332-july-12-2023"},{"source":"/17309201819796","target":"332-july-12-2023"},{"source":"/17670095435796-using-fortanix-dsm-with-sap-s-4hana-for-tokenization","target":"using-fortanix-dsm-with-sap-s4hana-for-tokenization"},{"source":"/17670095435796","target":"using-fortanix-dsm-with-sap-s4hana-for-tokenization"},{"source":"/17701768708372-fortanix-dsm-cli-4-16-2195","target":"fortanix-dsm-cli-4162195"},{"source":"/17701768708372","target":"fortanix-dsm-cli-4162195"},{"source":"/17701820228756-fortanix-dsm-cli-4-13-2173","target":"fortanix-dsm-cli-4132173"},{"source":"/17701820228756","target":"fortanix-dsm-cli-4132173"},{"source":"/17701895791252-fortanix-dsm-cli-4-11-2116","target":"fortanix-dsm-cli-4112116"},{"source":"/17701895791252","target":"fortanix-dsm-cli-4112116"},{"source":"/18002451647380-fortanix-dsm-with-sap","target":"fortanix-dsm-with-sap"},{"source":"/18002451647380","target":"fortanix-dsm-with-sap"},{"source":"/18065474392340-using-fortanix-data-security-manager-with-cassandra-tde","target":"fortanix-using-fortanix-data-security-manager-with-cassandra-tde"},{"source":"/18065474392340","target":"fortanix-using-fortanix-data-security-manager-with-cassandra-tde"},{"source":"/18074711878420--4-20-august-16-2023","target":"420-august-16-2023"},{"source":"/18074711878420","target":"420-august-16-2023"},{"source":"/18093708125460-user-s-guide-provision-nitro-compute-node-using-aws-marketplace","target":"users-guide-provision-nitro-compute-node-using-aws-marketplace"},{"source":"/18093708125460","target":"users-guide-provision-nitro-compute-node-using-aws-marketplace"},{"source":"/18094063878420--3-33-august-9-2023","target":"333-august-9-2023"},{"source":"/18094063878420","target":"333-august-9-2023"},{"source":"/18324105382292-data-security-manager-with-amazon-xks-using-virtual-private-cloud","target":"data-security-manager-with-amazon-xks-using-virtual-private-cloud"},{"source":"/18324105382292","target":"data-security-manager-with-amazon-xks-using-virtual-private-cloud"},{"source":"/18568417218196-using-data-security-manager-with-idcentral-key-management","target":"using-data-security-manager-with-idcentral-key-management"},{"source":"/18568417218196","target":"using-data-security-manager-with-idcentral-key-management"},{"source":"/18685830290196-data-security-manager-with-docker-notary-for-pkcs-11","target":"data-security-manager-with-docker-notary-for-pkcs11"},{"source":"/18685830290196","target":"data-security-manager-with-docker-notary-for-pkcs11"},{"source":"/18692683196436--4-20-patch-august-28-2023","target":"420-patch-august-28-2023"},{"source":"/18692683196436","target":"420-patch-august-28-2023"},{"source":"/18719728915348-fortanix-dsm-cli-4-20-2276","target":"fortanix-dsm-cli-4202276"},{"source":"/18719728915348","target":"fortanix-dsm-cli-4202276"},{"source":"/18719835487380-pkcs-11-4-20-2276","target":"pkcs11-4202276"},{"source":"/18719835487380","target":"pkcs11-4202276"},{"source":"/18754020841620--4-21-september-1-2023","target":"421-september-1-2023"},{"source":"/18754020841620","target":"421-september-1-2023"},{"source":"/18924491083028-using-fortanix-dsm-for-verifying-key-attestation-statements","target":"using-fortanix-dsm-for-verifying-key-attestation-statements"},{"source":"/18924491083028","target":"using-fortanix-dsm-for-verifying-key-attestation-statements"},{"source":"/18994847992212-fortanix-data-security-manager-using-delinea-secret-server","target":"fortanix-data-security-manager-using-delinea-secret-server"},{"source":"/18994847992212","target":"fortanix-data-security-manager-using-delinea-secret-server"},{"source":"/19002745941012--0-5-26-september-07-2023","target":"0526-september-07-2023"},{"source":"/19002745941012","target":"0526-september-07-2023"},{"source":"/19053111380372--4-19-patch-september-09-2023","target":"419-patch-september-09-2023"},{"source":"/19053111380372","target":"419-patch-september-09-2023"},{"source":"/19125660988692--4-21-patch-september-12-2023","target":"421-patch-september-12-2023"},{"source":"/19125660988692","target":"421-patch-september-12-2023"},{"source":"/19251879311380--4-21-patch-september-16-2023","target":"421-patch-september-16-2023"},{"source":"/19251879311380","target":"421-patch-september-16-2023"},{"source":"/19386765685652-fortanix-dsm-cli-4-21-2288","target":"fortanix-dsm-cli-4212288"},{"source":"/19386765685652","target":"fortanix-dsm-cli-4212288"},{"source":"/19386786457620-pkcs-11-4-21-2288","target":"pkcs11-4212288"},{"source":"/19386786457620","target":"pkcs11-4212288"},{"source":"/19547698683156-deploying-dsm-accelerator-on-aws-lambda","target":"deploying-dsm-accelerator-on-aws-lambda"},{"source":"/19547698683156","target":"deploying-dsm-accelerator-on-aws-lambda"},{"source":"/19548208100628--3-34-september-28-2023","target":"334-september-28-2023"},{"source":"/19548208100628","target":"334-september-28-2023"},{"source":"/19588848398996--4-21-patch-september-28-2023","target":"421-patch-september-28-2023"},{"source":"/19588848398996","target":"421-patch-september-28-2023"},{"source":"/19906569094804--4-23-november-08-2023","target":"423-november-08-2023"},{"source":"/19906569094804","target":"423-november-08-2023"},{"source":"/19943720313236-user-s-guide-create-groups","target":"users-guide-create-groups"},{"source":"/19943720313236","target":"users-guide-create-groups"},{"source":"/20169802493332-fortanix-dsm-cli-4-22-2307","target":"fortanix-dsm-cli-4222307"},{"source":"/20169802493332","target":"fortanix-dsm-cli-4222307"},{"source":"/20170012888596-pkcs-11-4-22-2307","target":"pkcs11-4222307"},{"source":"/20170012888596","target":"pkcs11-4222307"},{"source":"/20171885969044--4-22-october-19-2023","target":"422-october-19-2023"},{"source":"/20171885969044","target":"422-october-19-2023"},{"source":"/20196282848788-user-s-guide-groups-and-third-party-groups-concepts","target":"users-guide-groups-and-third-party-groups-concepts"},{"source":"/20196282848788","target":"users-guide-groups-and-third-party-groups-concepts"},{"source":"/20197418340116-user-s-guide-create-update-revoke-third-party-groups","target":"users-guide-create-update-revoke-third-party-groups"},{"source":"/20197418340116","target":"users-guide-create-update-revoke-third-party-groups"},{"source":"/20205594920084--4-22-patch-october-20-2023","target":"422-patch-october-20-2023"},{"source":"/20205594920084","target":"422-patch-october-20-2023"},{"source":"/20306507326484--3-35-october-31-2023","target":"335-october-31-2023"},{"source":"/20306507326484","target":"335-october-31-2023"},{"source":"/20557667019796-using-fortanix-data-security-manager-with-gitlab","target":"using-fortanix-data-security-manager-with-gitlab"},{"source":"/20557667019796","target":"using-fortanix-data-security-manager-with-gitlab"},{"source":"/20557963232916-fortanix-data-security-manager-release-4-23-kubernetes-version-upgrade-to-1-27-k8s","target":"fortanix-data-security-manager-release-423-kubernetes-version-upgrade-to-127-k8s"},{"source":"/20557963232916","target":"fortanix-data-security-manager-release-423-kubernetes-version-upgrade-to-127-k8s"},{"source":"/20594808062868-fortanix-data-security-manager-with-google-control-plane-using-virtual-private-cloud","target":"fortanix-data-security-manager-with-google-control-plane-using-virtual-private-cloud"},{"source":"/20594808062868","target":"fortanix-data-security-manager-with-google-control-plane-using-virtual-private-cloud"},{"source":"/20695631196564-using-fortanix-data-security-manager-with-gitlab-for-code-signing","target":"using-fortanix-data-security-manager-with-gitlab-for-code-signing"},{"source":"/20695631196564","target":"using-fortanix-data-security-manager-with-gitlab-for-code-signing"},{"source":"/20699882486420-using-fortanix-confidential-computing-manager-for-easy-deployment-of-elasticsearch-on-aws-nitro","target":"using-fortanix-confidential-computing-manager-for-easy-deployment-of-elasticsearch-on-aws-nitro"},{"source":"/20699882486420","target":"using-fortanix-confidential-computing-manager-for-easy-deployment-of-elasticsearch-on-aws-nitro"},{"source":"/20776365694612-using-fortanix-data-security-manager-with-edb-postgres-for-tde","target":"using-fortanix-data-security-manager-with-edb-postgres-for-tde"},{"source":"/20776365694612","target":"using-fortanix-data-security-manager-with-edb-postgres-for-tde"},{"source":"/20820130315284-fortanix-dsm-cli-4-23-2328","target":"fortanix-dsm-cli-4232328"},{"source":"/20820130315284","target":"fortanix-dsm-cli-4232328"},{"source":"/20820267686036-pkcs-11-4-23-2328","target":"pkcs11-4232328"},{"source":"/20820267686036","target":"pkcs11-4232328"},{"source":"/20916629784340--4-19-patch-november-13-2023","target":"419-patch-november-13-2023"},{"source":"/20916629784340","target":"419-patch-november-13-2023"},{"source":"/21032313063444--3-35-patch-november-21-2023","target":"335-patch-november-21-2023"},{"source":"/21032313063444","target":"335-patch-november-21-2023"},{"source":"/21058753054228--4-23-patch-1-november-17-2023","target":"423-patch-1-november-17-2023"},{"source":"/21058753054228","target":"423-patch-1-november-17-2023"},{"source":"/21148595796884-using-fortanix-data-security-manager-with-venafi-hsm","target":"using-fortanix-data-security-manager-with-venafi-hsm"},{"source":"/21148595796884","target":"using-fortanix-data-security-manager-with-venafi-hsm"},{"source":"/21539364997012-fortanix-data-security-manager-accelerator-webservice-with-snowflake","target":"fortanix-data-security-manager-accelerator-webservice-with-snowflake"},{"source":"/21539364997012","target":"fortanix-data-security-manager-accelerator-webservice-with-snowflake"},{"source":"/21547348862484-using-fortanix-data-security-manager-for-git-commit-signing","target":"using-fortanix-data-security-manager-for-git-commit-signing"},{"source":"/21547348862484","target":"using-fortanix-data-security-manager-for-git-commit-signing"},{"source":"/21624617611668--0-5-27-december-07-2023","target":"0527-december-07-2023"},{"source":"/21624617611668","target":"0527-december-07-2023"},{"source":"/21624983772820--3-36-december-12-2023","target":"336-december-12-2023"},{"source":"/21624983772820","target":"336-december-12-2023"},{"source":"/21791443871380-fortanix-dsm-cli-4-24-2343","target":"fortanix-dsm-cli-4242343"},{"source":"/21791443871380","target":"fortanix-dsm-cli-4242343"},{"source":"/21791510646420-pkcs-11-4-24-2343","target":"pkcs11-4242343"},{"source":"/21791510646420","target":"pkcs11-4242343"},{"source":"/21793209728020--4-24-december-12-2023","target":"424-december-12-2023"},{"source":"/21793209728020","target":"424-december-12-2023"},{"source":"/21870352639124-using-fortanix-data-security-manager-for-veeam-backup-encryption","target":"using-fortanix-data-security-manager-for-veeam-backup-encryption"},{"source":"/21870352639124","target":"using-fortanix-data-security-manager-for-veeam-backup-encryption"},{"source":"/22187629251476--4-23-patch-2-december-22-2023","target":"423-patch-2-december-22-2023"},{"source":"/22187629251476","target":"423-patch-2-december-22-2023"},{"source":"/22643691763092-using-fortanix-data-security-manager-with-skyhigh-secure-web-gateway-swg","target":"using-fortanix-data-security-manager-with-skyhigh-secure-web-gateway-swg"},{"source":"/22643691763092","target":"using-fortanix-data-security-manager-with-skyhigh-secure-web-gateway-swg"},{"source":"/23072929211924-azure-service-principal-with-fortanix-confidential-computing-manager","target":"azure-service-principal-with-fortanix-confidential-computing-manager"},{"source":"/23072929211924","target":"azure-service-principal-with-fortanix-confidential-computing-manager"},{"source":"/23086189740180--3-37-january-25-2024","target":"337-january-25-2024"},{"source":"/23086189740180","target":"337-january-25-2024"},{"source":"/23107708560532-user-s-guide-run-the-workflow-web-interface-aci-applications","target":"users-guide-run-the-workflow-web-interface-aci-applications"},{"source":"/23107708560532","target":"users-guide-run-the-workflow-web-interface-aci-applications"},{"source":"/23120352538900-user-s-guide-run-the-workflow-web-interface-aws-nitro-applications","target":"users-guide-run-the-workflow-web-interface-aws-nitro-applications"},{"source":"/23120352538900","target":"users-guide-run-the-workflow-web-interface-aws-nitro-applications"},{"source":"/23375515326740-using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-alletra-9000","target":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-alletra-9000"},{"source":"/23375515326740","target":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-alletra-9000"},{"source":"/23447625237908-using-fortanix-data-security-manager-for-kernel-module-signing-module-guide","target":"using-fortanix-data-security-manager-for-kernel-module-signing-module-guide"},{"source":"/23447625237908","target":"using-fortanix-data-security-manager-for-kernel-module-signing-module-guide"},{"source":"/23456473507732-using-fortanix-data-security-manager-with-mssql-server-tde-mirror-database","target":"using-fortanix-data-security-manager-with-mssql-server-tde-mirror-database"},{"source":"/23456473507732","target":"using-fortanix-data-security-manager-with-mssql-server-tde-mirror-database"},{"source":"/23612807993492--4-25-february-9-2024","target":"425-february-9-2024"},{"source":"/23612807993492","target":"425-february-9-2024"},{"source":"/23661136227860-user-s-guide-group-quorum-policy","target":"users-guide-group-quorum-policy"},{"source":"/23661136227860","target":"users-guide-group-quorum-policy"},{"source":"/23661324231828-user-s-guide-group-cryptographic-policy","target":"users-guide-group-cryptographic-policy"},{"source":"/23661324231828","target":"users-guide-group-cryptographic-policy"},{"source":"/23662281171860-user-s-guide-group-client-configurations","target":"users-guide-group-client-configurations"},{"source":"/23662281171860","target":"users-guide-group-client-configurations"},{"source":"/23663759126932-dsm-rest-apis","target":"dsm-rest-apis"},{"source":"/23663759126932","target":"dsm-rest-apis"},{"source":"/23663923848724-dsm-java-sdk-and-jce-provider-documentation","target":"dsm-java-sdk-and-jce-provider-documentation"},{"source":"/23663923848724","target":"dsm-java-sdk-and-jce-provider-documentation"},{"source":"/23729370363284--0-5-28-february-14-2024","target":"0528-february-14-2024"},{"source":"/23729370363284","target":"0528-february-14-2024"},{"source":"/23853094107540-fortanix-dsm-cli-4-25-2353","target":"fortanix-dsm-cli-4252353"},{"source":"/23853094107540","target":"fortanix-dsm-cli-4252353"},{"source":"/23853835395092-pkcs-11-4-25-2353","target":"pkcs11-4252353"},{"source":"/23853835395092","target":"pkcs11-4252353"},{"source":"/24088048442132--4-25-patch-february-27-2024","target":"425-patch-february-27-2024"},{"source":"/24088048442132","target":"425-patch-february-27-2024"},{"source":"/24088166431124--4-23-patch-3-february-27-2024","target":"423-patch-3-february-27-2024"},{"source":"/24088166431124","target":"423-patch-3-february-27-2024"},{"source":"/24088246842388--4-19-patch-february-27-2024","target":"419-patch-february-27-2024"},{"source":"/24088246842388","target":"419-patch-february-27-2024"},{"source":"/24088326578580--4-16-patch-february-27-2024","target":"416-patch-february-27-2024"},{"source":"/24088326578580","target":"416-patch-february-27-2024"},{"source":"/24186944445332-using-fortanix-data-security-manager-with-pure-storage","target":"using-fortanix-data-security-manager-with-pure-storage"},{"source":"/24186944445332","target":"using-fortanix-data-security-manager-with-pure-storage"},{"source":"/24299620686996--4-26-march-5-2024","target":"426-march-5-2024"},{"source":"/24299620686996","target":"426-march-5-2024"},{"source":"/24337910802708-user-s-guide-scripts","target":"users-guide-scripts"},{"source":"/24337910802708","target":"users-guide-scripts"},{"source":"/24338248496916-user-s-guide-inbound-connector","target":"users-guide-inbound-connector"},{"source":"/24338248496916","target":"users-guide-inbound-connector"},{"source":"/24338392607508-user-s-guide-outbound-connector","target":"users-guide-outbound-connector"},{"source":"/24338392607508","target":"users-guide-outbound-connector"},{"source":"/24351203527828-user-s-guide-configure-and-run-the-workflow","target":"users-guide-configure-and-run-the-workflow"},{"source":"/24351203527828","target":"users-guide-configure-and-run-the-workflow"},{"source":"/24377733981204-data-security-manager-with-mongodb-windows","target":"data-security-manager-with-mongodb-windows"},{"source":"/24377733981204","target":"data-security-manager-with-mongodb-windows"},{"source":"/24415809975956-how-to-check-fortanix-dsm-s-node-join-policy","target":"how-to-check-fortanix-dsms-node-join-policy"},{"source":"/24415809975956","target":"how-to-check-fortanix-dsms-node-join-policy"},{"source":"/24490632702228--4-19-patch-march-11-2024","target":"419-patch-march-11-2024"},{"source":"/24490632702228","target":"419-patch-march-11-2024"},{"source":"/24495192901012--4-23-patch-4-march-11-2024","target":"423-patch-4-march-11-2024"},{"source":"/24495192901012","target":"423-patch-4-march-11-2024"},{"source":"/24495467088404--4-16-patch-march-11-2024","target":"416-patch-march-11-2024"},{"source":"/24495467088404","target":"416-patch-march-11-2024"},{"source":"/24522961278612-dsm-pkcs-11-client-operating-system-os-compatibility-matrix","target":"dsm-pkcs11-client-operating-system-os-compatibility-matrix"},{"source":"/24522961278612","target":"dsm-pkcs11-client-operating-system-os-compatibility-matrix"},{"source":"/24594262941460-fortanix-dsm-cli-4-26-2384","target":"fortanix-dsm-cli-4262384"},{"source":"/24594262941460","target":"fortanix-dsm-cli-4262384"},{"source":"/24594452649876-pkcs-11-4-26-2384","target":"pkcs11-4262384"},{"source":"/24594452649876","target":"pkcs11-4262384"},{"source":"/24821996273300-fortanix-data-security-manager-cluster-management-quick-reference","target":"fortanix-data-security-manager-cluster-management-quick-reference"},{"source":"/24821996273300","target":"fortanix-data-security-manager-cluster-management-quick-reference"},{"source":"/24824368600340--3-38-patch-march-21-2024","target":"338-patch-march-21-2024"},{"source":"/24824368600340","target":"338-patch-march-21-2024"},{"source":"/24982578890516--4-23-patch-5-march-26-2024","target":"423-patch-5-march-26-2024"},{"source":"/24982578890516","target":"423-patch-5-march-26-2024"},{"source":"/24985661014420--4-27-april-11-2024","target":"427-april-11-2024"},{"source":"/24985661014420","target":"427-april-11-2024"},{"source":"/25283424981396-fortanix-dsm-cli-4-27-2394","target":"fortanix-dsm-cli-4272394"},{"source":"/25283424981396","target":"fortanix-dsm-cli-4272394"},{"source":"/25283529560212-pkcs-11-4-27-2394","target":"pkcs11-4272394"},{"source":"/25283529560212","target":"pkcs11-4272394"},{"source":"/25477258832916-fortanix-confidential-computing-manager-simple-use-case-sql","target":"fortanix-confidential-computing-manager-simple-use-case-sql"},{"source":"/25477258832916","target":"fortanix-confidential-computing-manager-simple-use-case-sql"},{"source":"/25477710963604-fortanix-confidential-computing-manager-complex-use-case-sql","target":"fortanix-confidential-computing-manager-complex-use-case-sql"},{"source":"/25477710963604","target":"fortanix-confidential-computing-manager-complex-use-case-sql"},{"source":"/25558151528724--0-5-29-april-12-2024-latest","target":"0529-april-12-2024-latest"},{"source":"/25558151528724","target":"0529-april-12-2024-latest"},{"source":"/25638368091028-fortanix-armor-identity-and-access-management-iam","target":"fortanix-fortanix-armor-identity-and-access-management-iam"},{"source":"/25638368091028","target":"fortanix-fortanix-armor-identity-and-access-management-iam"},{"source":"/25717993523860-fortanix-armor-overview","target":"fortanix-armor-overview"},{"source":"/25717993523860","target":"fortanix-armor-overview"},{"source":"/25718412862996-fortanix-armor-getting-started","target":"fortanix-armor-getting-started"},{"source":"/25718412862996","target":"fortanix-armor-getting-started"},{"source":"/25721654454292-fortanix-armor-solutions","target":"fortanix-fortanix-armor-solutions"},{"source":"/25721654454292","target":"fortanix-fortanix-armor-solutions"},{"source":"/25755753679252-fortanix-key-insight-overview","target":"fortanix-key-insight-overview"},{"source":"/25755753679252","target":"fortanix-key-insight-overview"},{"source":"/25757067969812-fortanix-key-insight-concepts","target":"fortanix-fortanix-key-insight-concepts"},{"source":"/25757067969812","target":"fortanix-fortanix-key-insight-concepts"},{"source":"/25757608445588-fortanix-key-insight-for-aws-concepts","target":"fortanix-key-insight-for-aws-concepts"},{"source":"/25757608445588","target":"fortanix-key-insight-for-aws-concepts"},{"source":"/25757687354260-fortanix-key-insight-getting-started","target":"fortanix-fortanix-key-insight-getting-started"},{"source":"/25757687354260","target":"fortanix-fortanix-key-insight-getting-started"},{"source":"/25759186591252-fortanix-key-insight-aws-configuration-for-scanning","target":"fortanix-key-insight-aws-configuration-for-scanning"},{"source":"/25759186591252","target":"fortanix-key-insight-aws-configuration-for-scanning"},{"source":"/25759788682260-fortanix-key-insight-user-interface-components-aws","target":"fortanix-key-insight-user-interface-components-aws"},{"source":"/25759788682260","target":"fortanix-key-insight-user-interface-components-aws"},{"source":"/25887885256084-fortanix-key-insight-user-interface-components-azure","target":"fortanix-key-insight-user-interface-components-azure"},{"source":"/25887885256084","target":"fortanix-key-insight-user-interface-components-azure"},{"source":"/25887960818836-fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles","target":"fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles"},{"source":"/25887960818836","target":"fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles"},{"source":"/25960563059604-fortanix-key-insight-for-azure-concepts","target":"fortanix-key-insight-for-azure-concepts"},{"source":"/25960563059604","target":"fortanix-key-insight-for-azure-concepts"},{"source":"/26122972735764-user-s-guide-concepts","target":"users-guide-concepts"},{"source":"/26122972735764","target":"users-guide-concepts"},{"source":"/26133685179412--3-39-may-02-2024","target":"339-may-02-2024"},{"source":"/26133685179412","target":"339-may-02-2024"},{"source":"/26133745392276--3-39-may-02-2024","target":"339-may-02-2024-1"},{"source":"/26133745392276","target":"339-may-02-2024-1"},{"source":"/26134123783700-user-s-guide-configuring-third-party-groups-using-data-connectors-and-scripts","target":"users-guide-configuring-third-party-groups-using-data-connectors-and-scripts"},{"source":"/26134123783700","target":"users-guide-configuring-third-party-groups-using-data-connectors-and-scripts"},{"source":"/26157103997972-fortanix-confidential-computing-manager-simple-use-case-python","target":"fortanix-confidential-computing-manager-simple-use-case-python"},{"source":"/26157103997972","target":"fortanix-confidential-computing-manager-simple-use-case-python"},{"source":"/26616919814676-fortanix-key-insight-azure-configuration-for-scanning-using-custom-roles","target":"fortanix-key-insight-azure-configuration-for-scanning-using-custom-roles"},{"source":"/26616919814676","target":"fortanix-key-insight-azure-configuration-for-scanning-using-custom-roles"},{"source":"/26656351671316-using-fortanix-data-security-manager-with-ansible-lookup-plugin","target":"using-fortanix-data-security-manager-with-ansible-lookup-plugin"},{"source":"/26656351671316","target":"using-fortanix-data-security-manager-with-ansible-lookup-plugin"},{"source":"/4406100511636-fortanix-data-security-manager-dsm","target":"/fortanix-data-security-manager-dsm"},{"source":"/4406100511636","target":"/fortanix-data-security-manager-dsm"},{"source":"/25620195711508-fortanix-armor","target":"/fortanix-armor"},{"source":"/25620195711508","target":"/fortanix-armor"},{"source":"/25560749178260-fortanix-key-insight","target":"/fortanix-key-insight"},{"source":"/25560749178260","target":"/fortanix-key-insight"},{"source":"/360003107511-confidential-computing-manager","target":"/confidential-computing-manager"},{"source":"/360003107511","target":"/confidential-computing-manager"},{"source":"/4410261553428-confidential-ai","target":"/confidential-ai"},{"source":"/4410261553428","target":"/confidential-ai"},{"source":"/360006153871-downloads","target":"/downloads"},{"source":"/360006153871","target":"/downloads"},{"source":"/6676333597716-secure-web-3-0-infrastructure-solutions","target":"/secure-web-30-infrastructure-solutions"},{"source":"/6676333597716","target":"/secure-web-30-infrastructure-solutions"},{"source":"/360002744972-announcements","target":"/announcements"},{"source":"/360002744972","target":"/announcements"},{"source":"/4403485253780-getting-started-with-help","target":"/getting-started-with-help"},{"source":"/4403485253780","target":"/getting-started-with-help"},{"source":"/360008695591-user-s-guide-using-applications-and-datasets","target":"/users-guide-using-applications-and-datasets"},{"source":"/360008695591","target":"/users-guide-using-applications-and-datasets"},{"source":"/360008695611-knowledge-base","target":"/knowledge-base"},{"source":"/360008695611","target":"/knowledge-base"},{"source":"/360008592792-examples","target":"/examples"},{"source":"/360008592792","target":"/examples"},{"source":"/360008695631-faq","target":"/faq"},{"source":"/360008695631","target":"/faq"},{"source":"/360008889912-ccm-release-notes","target":"/ccm-release-notes"},{"source":"/360008889912","target":"/ccm-release-notes"},{"source":"/360008910732-getting-started-with-fortanix-ccm","target":"/getting-started-with-fortanix-ccm"},{"source":"/360008910732","target":"/getting-started-with-fortanix-ccm"},{"source":"/360009350471-developer-s-guide","target":"/developers-guide"},{"source":"/360009350471","target":"/developers-guide"},{"source":"/360011313911-azure-managed-application","target":"/azure-managed-application"},{"source":"/360011313911","target":"/azure-managed-application"},{"source":"/360012461751-enclave-os","target":"/enclave-os"},{"source":"/360012461751","target":"/enclave-os"},{"source":"/360012347852-edp","target":"/edp"},{"source":"/360012347852","target":"/edp"},{"source":"/360012461771-workflows","target":"/workflows"},{"source":"/360012461771","target":"/workflows"},{"source":"/360013370191-data-security-manager-dsm","target":"/data-security-manager-dsm"},{"source":"/360013370191","target":"/data-security-manager-dsm"},{"source":"/360013370211-confidential-computing-manager-ccm","target":"/confidential-computing-manager-ccm"},{"source":"/360013370211","target":"/confidential-computing-manager-ccm"},{"source":"/360013370291-dsm-client-software","target":"/dsm-client-software"},{"source":"/360013370291","target":"/dsm-client-software"},{"source":"/360013370351-ccm-utilities","target":"/ccm-utilities"},{"source":"/360013370351","target":"/ccm-utilities"},{"source":"/360013399831-fortanix-node-agent-software","target":"/fortanix-node-agent-software"},{"source":"/360013399831","target":"/fortanix-node-agent-software"},{"source":"/4403478483348-getting-started","target":"/getting-started"},{"source":"/4403478483348","target":"/getting-started"},{"source":"/4403902113684-workflows","target":"fortanix-workflows"},{"source":"/4403902113684","target":"fortanix-workflows"},{"source":"/4406088909460-about-fortanix-dsm-saas","target":"/about-fortanix-dsm-saas"},{"source":"/4406088909460","target":"/about-fortanix-dsm-saas"},{"source":"/4406100744724-quickstart","target":"/quickstart"},{"source":"/4406100744724","target":"/quickstart"},{"source":"/4406089291284-faqs","target":"/faqs"},{"source":"/4406089291284","target":"/faqs"},{"source":"/4406089363092-setting-up-fortanix-dsm-system-administration-on-prem-only","target":"/setting-up-fortanix-dsm-system-administration-on-prem-only"},{"source":"/4406089363092","target":"/setting-up-fortanix-dsm-system-administration-on-prem-only"},{"source":"/4406100869780-cluster-configuration-and-management","target":"/cluster-configuration-and-management"},{"source":"/4406100869780","target":"/cluster-configuration-and-management"},{"source":"/4406089383060-system-administration-settings","target":"/system-administration-settings"},{"source":"/4406089383060","target":"/system-administration-settings"},{"source":"/4406089457556-pre-installation","target":"/pre-installation"},{"source":"/4406089457556","target":"/pre-installation"},{"source":"/4406089470484-infrastructure","target":"/infrastructure"},{"source":"/4406089470484","target":"/infrastructure"},{"source":"/4406101014548-cluster-setup","target":"/cluster-setup"},{"source":"/4406101014548","target":"/cluster-setup"},{"source":"/4406101033236-deployment","target":"/deployment"},{"source":"/4406101033236","target":"/deployment"},{"source":"/4406101038356-fortanix-data-security-on-premises","target":"/fortanix-data-security-on-premises"},{"source":"/4406101038356","target":"/fortanix-data-security-on-premises"},{"source":"/4406101040788-hardware-guide","target":"/hardware-guide"},{"source":"/4406101040788","target":"/hardware-guide"},{"source":"/4406089547796-cluster-setup","target":"fortanix-cluster-setup"},{"source":"/4406089547796","target":"fortanix-cluster-setup"},{"source":"/4406101082388-fortanix-data-security-manager-cloud-public-private","target":"/fortanix-data-security-manager-cloud-publicprivate"},{"source":"/4406101082388","target":"/fortanix-data-security-manager-cloud-publicprivate"},{"source":"/4406101130900-fortanix-data-security-manager-upgrade","target":"/fortanix-data-security-manager-upgrade"},{"source":"/4406101130900","target":"/fortanix-data-security-manager-upgrade"},{"source":"/4406101214484-authentication","target":"/authentication"},{"source":"/4406101214484","target":"/authentication"},{"source":"/4406107981844-single-sign-on","target":"/single-sign-on"},{"source":"/4406107981844","target":"/single-sign-on"},{"source":"/4406108005268-authorization","target":"/authorization"},{"source":"/4406108005268","target":"/authorization"},{"source":"/4406101336724-log-management","target":"/log-management"},{"source":"/4406101336724","target":"/log-management"},{"source":"/4406101362452-security-and-audit-control","target":"/security-and-audit-control"},{"source":"/4406101362452","target":"/security-and-audit-control"},{"source":"/4406101397908-key-management-service","target":"/key-management-service"},{"source":"/4406101397908","target":"/key-management-service"},{"source":"/4406101452948-cloud-data-control","target":"/cloud-data-control"},{"source":"/4406101452948","target":"/cloud-data-control"},{"source":"/4406101715988-use-cases-and-integrations","target":"/use-cases-and-integrations"},{"source":"/4406101715988","target":"/use-cases-and-integrations"},{"source":"/4406101721364-transparent-data-encryption","target":"/transparent-data-encryption"},{"source":"/4406101721364","target":"/transparent-data-encryption"},{"source":"/4406108303764-certificate-management","target":"/certificate-management"},{"source":"/4406108303764","target":"/certificate-management"},{"source":"/4406101727380-code-signing","target":"/code-signing"},{"source":"/4406101727380","target":"/code-signing"},{"source":"/4406108314004-secrets-management","target":"/secrets-management"},{"source":"/4406108314004","target":"/secrets-management"},{"source":"/4406101745556-storage-encryption","target":"/storage-encryption"},{"source":"/4406101745556","target":"/storage-encryption"},{"source":"/4406101753364-ssl-tls-encryption-and-key-management","target":"/ssltls-encryption-and-key-management"},{"source":"/4406101753364","target":"/ssltls-encryption-and-key-management"},{"source":"/4406108332436-vmware-encryption-and-key-management","target":"/vmware-encryption-and-key-management"},{"source":"/4406108332436","target":"/vmware-encryption-and-key-management"},{"source":"/4406108497044-cloud-key-management-byok","target":"/cloud-key-management-byok"},{"source":"/4406108497044","target":"/cloud-key-management-byok"},{"source":"/4406109163156-concepts","target":"/concepts"},{"source":"/4406109163156","target":"/concepts"},{"source":"/4406109230484-monitoring-and-alerting","target":"/monitoring-and-alerting"},{"source":"/4406109230484","target":"/monitoring-and-alerting"},{"source":"/4406109302676-example-code","target":"/example-code"},{"source":"/4406109302676","target":"/example-code"},{"source":"/4406110606356-faqs-install-upgrade-administration","target":"/faqs-installupgradeadministration"},{"source":"/4406110606356","target":"/faqs-installupgradeadministration"},{"source":"/4407712463636-security","target":"/security"},{"source":"/4407712463636","target":"/security"},{"source":"/4408392330900-system-administration","target":"/system-administration"},{"source":"/4408392330900","target":"/system-administration"},{"source":"/4408769080724-pkcs-11","target":"/pkcs11"},{"source":"/4408769080724","target":"/pkcs11"},{"source":"/4409547916692-security-deployment-implementation-architecture","target":"/security-deploymentimplementationarchitecture"},{"source":"/4409547916692","target":"/security-deploymentimplementationarchitecture"},{"source":"/4410270142484-dsm-software-release-notes","target":"/dsm-software-release-notes"},{"source":"/4410270142484","target":"/dsm-software-release-notes"},{"source":"/4410471116436-tokenization","target":"/tokenization"},{"source":"/4410471116436","target":"/tokenization"},{"source":"/4411250379796-log-management","target":"fortanix-log-management"},{"source":"/4411250379796","target":"fortanix-log-management"},{"source":"/4412270229652-user-guide","target":"/user-guide"},{"source":"/4412270229652","target":"/user-guide"},{"source":"/4412304450836-confidential-ai-release-notes","target":"/confidential-ai-release-notes"},{"source":"/4412304450836","target":"/confidential-ai-release-notes"},{"source":"/4414088672532-compute-nodes","target":"/compute-nodes"},{"source":"/4414088672532","target":"/compute-nodes"},{"source":"/4414195500948-enroll-compute-node","target":"/enroll-compute-node"},{"source":"/4414195500948","target":"/enroll-compute-node"},{"source":"/4423499488532-4-4-on-prem-and-saas","target":"/44-on-prem-and-saas"},{"source":"/4423499488532","target":"/44-on-prem-and-saas"},{"source":"/4764394649620-client-configurations","target":"/client-configurations"},{"source":"/4764394649620","target":"/client-configurations"},{"source":"/5536668269460-4-6-on-prem-and-saas","target":"/46-on-prem-and-saas"},{"source":"/5536668269460","target":"/46-on-prem-and-saas"},{"source":"/5925975260948-fortanix-data-security-manager-sdk-for-java","target":"/fortanix-data-security-manager-sdk-for-java"},{"source":"/5925975260948","target":"/fortanix-data-security-manager-sdk-for-java"},{"source":"/6334905423508-architecture-on-prem-only","target":"/architecture-on-prem-only"},{"source":"/6334905423508","target":"/architecture-on-prem-only"},{"source":"/6676355786132-web-3-0-solutions","target":"/web-30-solutions"},{"source":"/6676355786132","target":"/web-30-solutions"},{"source":"/7457450872212-4-8-on-prem-and-saas","target":"/48-on-prem-and-saas"},{"source":"/7457450872212","target":"/48-on-prem-and-saas"},{"source":"/8169292264340-4-9-on-prem-and-saas","target":"/49-on-prem-and-saas"},{"source":"/8169292264340","target":"/49-on-prem-and-saas"},{"source":"/9023507669780-clients","target":"/clients"},{"source":"/9023507669780","target":"/clients"},{"source":"/9144843416468-4-10-saas-only","target":"/410-saas-only"},{"source":"/9144843416468","target":"/410-saas-only"},{"source":"/9144878134676-4-7-saas-only","target":"/47-saas-only"},{"source":"/9144878134676","target":"/47-saas-only"},{"source":"/9698028218260-dsm-accelerator","target":"/dsm-accelerator"},{"source":"/9698028218260","target":"/dsm-accelerator"},{"source":"/9733656470420-4-11-on-prem-and-saas","target":"/411-on-prem-and-saas"},{"source":"/9733656470420","target":"/411-on-prem-and-saas"},{"source":"/10080063172884-terraform-provider","target":"/terraform-provider"},{"source":"/10080063172884","target":"/terraform-provider"},{"source":"/10421548809876-4-12-saas-only","target":"/412-saas-only"},{"source":"/10421548809876","target":"/412-saas-only"},{"source":"/11200938641300-fortanix-dsm-with-aws-external-key-store-xks","target":"/fortanix-dsm-with-aws-external-key-store-xks"},{"source":"/11200938641300","target":"/fortanix-dsm-with-aws-external-key-store-xks"},{"source":"/11563289762964-backup-and-restore-manual","target":"/backup-and-restore-manual"},{"source":"/11563289762964","target":"/backup-and-restore-manual"},{"source":"/11565127104532-fortanix-dsm-with-aws-kms","target":"/fortanix-dsm-with-aws-kms"},{"source":"/11565127104532","target":"/fortanix-dsm-with-aws-kms"},{"source":"/11590814994708-store-keys-externally-and-extended-virtual-keys","target":"/store-keys-externally-and-extended-virtual-keys"},{"source":"/11590814994708","target":"/store-keys-externally-and-extended-virtual-keys"},{"source":"/11598180206228-4-13-on-prem-and-saas","target":"/413-on-prem-and-saas"},{"source":"/11598180206228","target":"/413-on-prem-and-saas"},{"source":"/11620809297684-fortanix-dsm-with-azure-key-vault","target":"/fortanix-dsm-with-azure-key-vault"},{"source":"/11620809297684","target":"/fortanix-dsm-with-azure-key-vault"},{"source":"/12594632427028-restoration-using-script-automated","target":"/restoration-using-script-automated"},{"source":"/12594632427028","target":"/restoration-using-script-automated"},{"source":"/12660871164948-4-14-saas-only","target":"/414-saas-only"},{"source":"/12660871164948","target":"/414-saas-only"},{"source":"/12714165782292-fortanix-dsm-with-azure-managed-hsm","target":"/fortanix-dsm-with-azure-managed-hsm"},{"source":"/12714165782292","target":"/fortanix-dsm-with-azure-managed-hsm"},{"source":"/12714268212500-fortanix-dsm-with-google-cloud-kms","target":"/fortanix-dsm-with-google-cloud-kms"},{"source":"/12714268212500","target":"/fortanix-dsm-with-google-cloud-kms"},{"source":"/12715534139796-using-fortanix-data-security-manager-with-microsoft-sql-server-tde","target":"/using-fortanix-data-security-manager-with-microsoft-sql-server-tde"},{"source":"/12715534139796","target":"/using-fortanix-data-security-manager-with-microsoft-sql-server-tde"},{"source":"/12878346756244-fortanix-advisories","target":"/fortanix-advisories"},{"source":"/12878346756244","target":"/fortanix-advisories"},{"source":"/13218270363796-firewall","target":"/firewall"},{"source":"/13218270363796","target":"/firewall"},{"source":"/13586629081236-4-15-saas-only","target":"/415-saas-only"},{"source":"/13586629081236","target":"/415-saas-only"},{"source":"/14454123107348-4-16-on-prem-and-saas","target":"/416-on-prem-and-saas"},{"source":"/14454123107348","target":"/416-on-prem-and-saas"},{"source":"/15201864282132-4-17-saas-only","target":"/417-saas-only"},{"source":"/15201864282132","target":"/417-saas-only"},{"source":"/15561605267092-infrastructure","target":"fortanix-infrastructure"},{"source":"/15561605267092","target":"fortanix-infrastructure"},{"source":"/15657985255572-tokenization","target":"fortanix-tokenization"},{"source":"/15657985255572","target":"fortanix-tokenization"},{"source":"/15658393374228-using-fortanix-data-security-manager-with-oracle-tde","target":"/using-fortanix-data-security-manager-with-oracle-tde"},{"source":"/15658393374228","target":"/using-fortanix-data-security-manager-with-oracle-tde"},{"source":"/16313816853140-4-18-saas-only","target":"/418-saas-only"},{"source":"/16313816853140","target":"/418-saas-only"},{"source":"/16921606478484-4-19-on-prem-and-saas","target":"/419-on-prem-and-saas"},{"source":"/16921606478484","target":"/419-on-prem-and-saas"},{"source":"/17669656353428-fortanix-dsm-with-sap-data-custodian","target":"/fortanix-dsm-with-sap-data-custodian"},{"source":"/17669656353428","target":"/fortanix-dsm-with-sap-data-custodian"},{"source":"/17701671182356-fortanix-dsm-cli","target":"/fortanix-dsm-cli"},{"source":"/17701671182356","target":"/fortanix-dsm-cli"},{"source":"/18064569239060-using-fortanix-data-security-manager-with-cassandra-tde","target":"/using-fortanix-data-security-manager-with-cassandra-tde"},{"source":"/18064569239060","target":"/using-fortanix-data-security-manager-with-cassandra-tde"},{"source":"/18072885973908-4-20-saas-only","target":"/420-saas-only"},{"source":"/18072885973908","target":"/420-saas-only"},{"source":"/18835801765524-4-21-saas-only","target":"/421-saas-only"},{"source":"/18835801765524","target":"/421-saas-only"},{"source":"/19529207287572-manual-cloud-key-management","target":"/manual-cloud-key-management"},{"source":"/19529207287572","target":"/manual-cloud-key-management"},{"source":"/19549353451156-dsm-accelerator-webservice","target":"/dsm-accelerator-webservice"},{"source":"/19549353451156","target":"/dsm-accelerator-webservice"},{"source":"/19905607947668-4-22-saas-only","target":"/422-saas-only"},{"source":"/19905607947668","target":"/422-saas-only"},{"source":"/20770813616532-4-23-on-prem-and-saas","target":"/423-on-prem-and-saas"},{"source":"/20770813616532","target":"/423-on-prem-and-saas"},{"source":"/21792772206612-4-24-saas-only","target":"/424-saas-only"},{"source":"/21792772206612","target":"/424-saas-only"},{"source":"/22707622418708-database-encryption","target":"/database-encryption"},{"source":"/22707622418708","target":"/database-encryption"},{"source":"/23069641050132-cloud-data-control-getting-started","target":"/cloud-data-control-getting-started"},{"source":"/23069641050132","target":"/cloud-data-control-getting-started"},{"source":"/23612257811860-4-25-saas-only","target":"/425-saas-only"},{"source":"/23612257811860","target":"/425-saas-only"},{"source":"/23658124667028-getting-started-with-fortanix-dsm","target":"/getting-started-with-fortanix-dsm"},{"source":"/23658124667028","target":"/getting-started-with-fortanix-dsm"},{"source":"/23658397365780-overview-and-definitions","target":"/overview-and-definitions"},{"source":"/23658397365780","target":"/overview-and-definitions"},{"source":"/23658631342868-sign-up-for-fortanix-dsm-saas","target":"/sign-up-for-fortanix-dsm-saas"},{"source":"/23658631342868","target":"/sign-up-for-fortanix-dsm-saas"},{"source":"/23658666380692-invite-a-user-to-fortanix-dsm","target":"/invite-a-user-to-fortanix-dsm"},{"source":"/23658666380692","target":"/invite-a-user-to-fortanix-dsm"},{"source":"/23658778229908-fortanix-dsm-setting-up-the-account","target":"/fortanix-dsm-setting-up-the-account"},{"source":"/23658778229908","target":"/fortanix-dsm-setting-up-the-account"},{"source":"/23658971356436-fortanix-dsm-administration","target":"/fortanix-dsm-administration"},{"source":"/23658971356436","target":"/fortanix-dsm-administration"},{"source":"/23658973000212-account-level-configurations","target":"/account-level-configurations"},{"source":"/23658973000212","target":"/account-level-configurations"},{"source":"/23659836473492-group-level-configurations","target":"/group-level-configurations"},{"source":"/23659836473492","target":"/group-level-configurations"},{"source":"/23661098445588-security-and-audit-control","target":"fortanix-security-and-audit-control"},{"source":"/23661098445588","target":"fortanix-security-and-audit-control"},{"source":"/23662003084436-security-controls-for-fortanix-dsm-applications","target":"/security-controls-for-fortanix-dsm-applications"},{"source":"/23662003084436","target":"/security-controls-for-fortanix-dsm-applications"},{"source":"/23662116584724-client-configurations","target":"fortanix-client-configurations"},{"source":"/23662116584724","target":"fortanix-client-configurations"},{"source":"/23662316218772-key-management","target":"/key-management"},{"source":"/23662316218772","target":"/key-management"},{"source":"/23662468555028-authentication-and-authorization","target":"/authentication-and-authorization"},{"source":"/23662468555028","target":"/authentication-and-authorization"},{"source":"/23662647833108-dsm-usage-metrics","target":"/dsm-usage-metrics"},{"source":"/23662647833108","target":"/dsm-usage-metrics"},{"source":"/23662642502932-hsm-gateway-server","target":"/hsm-gateway-server"},{"source":"/23662642502932","target":"/hsm-gateway-server"},{"source":"/23662768053780-developer-guide-developer-operations","target":"/developer-guide-developer-operations"},{"source":"/23662768053780","target":"/developer-guide-developer-operations"},{"source":"/23663302191380-plugin-library","target":"/plugin-library"},{"source":"/23663302191380","target":"/plugin-library"},{"source":"/23663717305364-dsm-api-documentation","target":"/dsm-api-documentation"},{"source":"/23663717305364","target":"/dsm-api-documentation"},{"source":"/24299324239380-4-26-saas-only","target":"/426-saas-only"},{"source":"/24299324239380","target":"/426-saas-only"},{"source":"/24337539025556-user-s-guide-using-data-connectors-and-scripts","target":"/users-guide-using-data-connectors-and-scripts"},{"source":"/24337539025556","target":"/users-guide-using-data-connectors-and-scripts"},{"source":"/24985583225876-4-27-on-prem-and-saas","target":"/427-on-prem-and-saas"},{"source":"/24985583225876","target":"/427-on-prem-and-saas"},{"source":"/25638371601556-fortanix-armor-solutions","target":"/fortanix-armor-solutions"},{"source":"/25638371601556","target":"/fortanix-armor-solutions"},{"source":"/25717980674324-about-fortanix-armor","target":"/about-fortanix-armor"},{"source":"/25717980674324","target":"/about-fortanix-armor"},{"source":"/25717961033876-getting-started-with-fortanix-armor","target":"/getting-started-with-fortanix-armor"},{"source":"/25717961033876","target":"/getting-started-with-fortanix-armor"},{"source":"/25755711034644-fortanix-key-insight","target":"fortanix-fortanix-key-insight"},{"source":"/25755711034644","target":"fortanix-fortanix-key-insight"},{"source":"/25763933423764-fortanix-armor-identity-and-access-management-iam","target":"/fortanix-armor-identity-and-access-management-iam"},{"source":"/25763933423764","target":"/fortanix-armor-identity-and-access-management-iam"},{"source":"/26150809914644-using-applications-and-datasets","target":"/using-applications-and-datasets"},{"source":"/26150809914644","target":"/using-applications-and-datasets"},{"source":"/26150899035540-using-data-connectors-and-scripts","target":"/using-data-connectors-and-scripts"},{"source":"/26150899035540","target":"/using-data-connectors-and-scripts"},{"source":"/26153365966100-fortanix-key-insight-concepts","target":"/fortanix-key-insight-concepts"},{"source":"/26153365966100","target":"/fortanix-key-insight-concepts"},{"source":"/26153322542868-fortanix-key-insight-getting-started","target":"/fortanix-key-insight-getting-started"},{"source":"/26153322542868","target":"/fortanix-key-insight-getting-started"},{"source":"/26153407013780-fortanix-key-insight-user-interface-components","target":"/fortanix-key-insight-user-interface-components"},{"source":"/26153407013780","target":"/fortanix-key-insight-user-interface-components"},{"source":"/26153385633940-fortanix-key-insight-cloud-configuration-for-scanning","target":"/fortanix-key-insight-cloud-configuration-for-scanning"},{"source":"/26153385633940","target":"/fortanix-key-insight-cloud-configuration-for-scanning"},{"source":"/26332293507732-quickstart","target":"fortanix-quickstart"},{"source":"/26332293507732","target":"fortanix-quickstart"},{"source":"/docs/httpssupportfortanixcomhcen-usarticles28271736616596-fortanix-key-insight-azure-configuration-for-microsoft-entra-id-as-open-id-connect-ident","target":"docs/fortanix-key-insight-azure-configuration-for-microsoft-entra-id-as-open-id-connect-identity-provider"},{"source":"/4406108093460-developer-zone","target":"/developer-guide-developer-operations"},{"source":"/4406100511636-fortanix-data-security-manager-dsm-","target":"/fortanix-data-security-manager-dsm"},{"source":"/25887960818836-fortanix-key-insight-azure-configuration-for-scanning","target":"/fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles"},{"source":"/28273242791572-fortanix-key-insight-aws-configuration-for-open-id-connect-identity-providers","target":"/fortanix-key-insight-aws-configuration-for-open-id-connect-identity-providers"},{"source":"/28273187473044-fortanix-key-insight-azure-configuration-for-open-id-connect-identity-providers","target":"/fortanix-key-insight-azure-configuration-for-open-id-connect-identity-providers"},{"source":"/360055605471-user-s-guide-aws-external-kms","target":"/fortanix-dsm-with-aws-kms"},{"source":"/360040488931-exporting-fortanix-self-defending-kms-keys-to-cloud-providers-for-byok-salesforce","target":"/exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce"},{"source":"/developers-guide-plugin.html","target":"/plugin-library"},{"source":"/developers-guide-algorithm-support.html","target":"/algorithm-support"},{"source":"/sdkms","target":"/fortanix-data-security-manager-dsm"},{"source":"/developers-guide-pkcs11.html","target":"/clients-pkcs11-library"},{"source":"/example-code.html","target":"/example-code"},{"source":"/360049658291-fortanix-confidential-container-on-azure-kubernetes-service","target":"/azure-kubernetes-service-with-fortanix-confidential-computing-manager"},{"source":"/360018084132-cng-ekm","target":"/clients-microsoft-cng-key-storage-provider"},{"source":"/4764402409876-dsm-client-configurations","target":"/client-configurations"},{"source":"/360018084432-lua-plugins-reference","target":"/plugins-lua-programming-reference"},{"source":"/360059456831-using-fortanix-data-security-manager-as-external-kmip-in-rubri","target":"/using-fortanix-data-security-manager-as-external-kmip-in-rubrik"},{"source":"/360056122911-using-fortanix-data-security-manager-for-cohesity-encryption-keys","target":"/using-fortanix-data-security-manager-for-cohesity-encryption-keys"},{"source":"/4405440507796-getting-started-with-fortanix-data-security-manager","target":"/getting-started-with-fortanix-dsm"},{"source":"/docs/using-fortanix-data-security-manager-for-filesystem-encryption","target":"docs/filesystem-encryption-for-linux-using-fortanix-data-security-manager-setup-and-usage"},{"source":"/docs/filesystem-encryption-for-windoes-using-fortanix-data-security-manager---setup-and-usage","target":"docs/filesystem-encryption-for-linux-using-fortanix-data-security-manager-setup-and-usage"},{"source":"/docs/filesystem-encryption-for-windows-using-fortanix-data-security-manager---setup-and-usage","target":"docs/filesystem-encryption-for-linux-using-fortanix-data-security-manager-setup-and-usage"},{"source":"/docs/fortanix-data-security-manager-gcp-kms-keyring-setup-user-guide-1","target":"docs/fortanix-data-security-manager-gcp-kms-cnkms-keyring-setup-user-guide"},{"source":"/5708233328020-using-fortanix-data-security-manager-with-ejbca","target":"/using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey"},{"source":"/docs/fortanix-key-insight-for-on-premises-concepts-v10-1","target":"docs/fortanix-key-insight-for-on-premises-concepts"},{"source":"/docs/fortanix-authentication","target":"docs/fortanix-authentication-app-and-user"},{"source":"/docs/fortanix-authorization","target":"docs/fortanix-authorization-user"},{"source":"/docs/fortanix-fortanix-key-insight-getting-started","target":"docs/fortanix-key-insight-getting-started-with-cloud-connection"},{"source":"/docs/fortanix-fortanix-key-insight-concepts","target":"docs/fortanix-key-insight-concepts"},{"source":"/docs/getting-started-with-fortanix-key-insight","target":"docs/fortanix-key-insight-getting-started-with-cloud-connection"},{"source":"/docs/fortanix-fortanix-armor-identity-and-access-management-iam","target":"docs/fortanix-armor-identity-and-access-management-iam"},{"source":"/docs/fortanix-fortanix-armor-solutions","target":"docs/fortanix-armor-solutions"},{"source":"/docs/fortanix-key-insight-cloud-getting-started","target":"docs/fortanix-key-insight-getting-started-with-cloud"},{"source":"/5708233328020-using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey-","target":"docs/using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey"},{"source":"/docs/migrating","target":"docs/migrating-non-container-oracle-database-to-container-oracle-database"},{"source":"/apidocs/introduction-2","target":"apidocs/introduction-1"},{"source":"/apidocs/update-account-settings-such-as-authentication-logging-etc-1","target":"apidocs/update-account-settings-such-as-authentication-logging-etc"},{"source":"/apidocs/get-account-usage-information-see-input-and-output-of-this-api-for-info-on-what-it-can-return-1","target":"apidocs/get-account-usage-information-see-input-and-output-of-this-api-for-info-on-what-it-can-return"},{"source":"/apidocs/create-a-new-account-2","target":"apidocs/create-a-new-account"},{"source":"/apidocs/get-info-about-all-accounts-1","target":"apidocs/get-info-about-all-accounts"},{"source":"/apidocs/delete-an-account-2","target":"apidocs/delete-an-account"},{"source":"/apidocs/get-info-for-a-specific-account-1","target":"apidocs/get-info-for-a-specific-account"},{"source":"/apidocs/transition-a-security-object-to-active-state-1","target":"apidocs/transition-a-security-object-to-active-state"},{"source":"/apidocs/make-a-copy-of-a-security-object-1","target":"apidocs/make-a-copy-of-a-security-object"},{"source":"/apidocs/generate-a-new-security-object-1","target":"apidocs/generate-a-new-security-object"},{"source":"/apidocs/import-a-security-object-1","target":"apidocs/import-a-security-object"},{"source":"/apidocs/get-all-security-objects-accessible-to-the-requester-1","target":"apidocs/get-all-security-objects-accessible-to-the-requester"},{"source":"/apidocs/introduction-3","target":"apidocs/introduction-1"},{"source":"/apidocs/get-account-usage-information-see-input-and-output-of-this-api-for-info-on-what-it-can-return-2","target":"apidocs/get-account-usage-information-see-input-and-output-of-this-api-for-info-on-what-it-can-return"},{"source":"/apidocs/introduction1","target":"apidocs/introduction-1"},{"source":"/docs/how-to-get-the-authorized-redirect-uri-for-google-workspace-cse","target":"docs/how-to-get-the-authorized-redirect-uri-for-workspace-cse"},{"source":"/360040487431-exporting-sdkms-keys-to-cloud-providers-for-byok-alibaba","target":"/docs/exporting-dsm-keys-to-cloud-providers-for-byok-alibaba"},{"source":"/360061109631-using-fortanix-data-security-manager-with-appviewx","target":"/docs/using-fortanix-data-security-manager-with-appviewx-on-premises"},{"source":"/11532677984404-fortanix-dsm-aws-kms-byok-bring-your-own-key-","target":"/docs/fortanix-dsm-aws-kms-byok-bring-your-own-key"},{"source":"/360030816111-using-fortanix-self-defending-kms-with-google-cloud-ekm-interface","target":"/docs/using-fortanix-data-security-manager-with-google-cloud-ekm-interface"},{"source":"/4408466794772-using-fortanix-data-security-manager-with-minio-kes-server-","target":"/docs/using-fortanix-data-security-manager-with-minio-kes-server"},{"source":"/360015956052-using-fortanix-self-defending-kms-as-a-kms-to-secure-vmware-virtual-environments","target":"/docs/using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments"},{"source":"/10145085542676-using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest-","target":"/docs/using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest"},{"source":"/360042433372-using-fortanix-self-defending-kms-for-intersystems-cache-using-kmip","target":"/docs/using-fortanix-data-security-manager-for-intersystems-cache-using-kmip"},{"source":"/360028282032-using-fortanix-self-defending-kms-for-mariadb-encryption-at-rest","target":"/docs/using-fortanix-data-security-manager-for-mariadb-encryption-at-rest"},{"source":"/360044392311-using-fortanix-self-defending-kms-with-ibm-db2","target":"/docs/using-fortanix-data-security-manager-with-ibm-db2?highlight=ibm%20db2"},{"source":"/360018558271-using-fortanix-self-defending-kms-for-mysql-encryption-at-rest","target":"/docs/using-fortanix-data-security-manager-for-mysql-encryption-at-rest"},{"source":"/360016188991-using-fortanix-self-defending-kms-with-oracle-tde","target":"/docs/using-fortanix-data-security-manager-with-oracle-tde"},{"source":"/360015955572-using-fortanix-self-defending-kms-for-mongodb-encryption-at-rest","target":"/docs/using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux"},{"source":"/docs/what-is-intel-attestation-service-ias-and-why-should-i-use-ias-service-on-prem-only","target":"docs/what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only"},{"source":"/docs/what-is-attestation-and-why-should-i-use-it-on-prem-only","target":"docs/what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only"},{"source":"/docs/authentication-overview-fortanix-dsm-integrations","target":"docs/fortanix-dsm-integrations-authentication-matrix"},{"source":"/docs/fortanix-dsm-completed-integrations-matrix","target":"docs/fortanix-dsm-integrations-and-use-cases-matrix"},{"source":"/docs/fortanix-dsm-integrations-completed","target":"docs/fortanix-dsm-integrations-and-use-cases-matrix"},{"source":"/docs/batch-encryption-decryption-and-sign","target":"docs/generic-batch-operations"},{"source":"/docs/batch-operations","target":"docs/generic-batch-operations"},{"source":"/docs/fortanix-key-insight-getting-started","target":"docs/fortanix-key-insight-cloud-connection"},{"source":"/docs/fortanix-key-insight-cloud-configuration-for-scanning","target":"docs/fortanix-key-insight-on-premises-connection"},{"source":"/docs/fortanix-key-insight-user-interface-components","target":"docs/fortanix-key-insight-external-key-source-connection"},{"source":"/docs/confidential-computing-manager","target":"docs/fortanix-confidential-computing-manager"},{"source":"/360042064051-user-s-guide-cryptographic-policy","target":"users-guide-account-cryptographic-policy"},{"source":"/docs/test","target":"docs/fortanix-key-insight-for-pqc-central-concepts"}],"replaceRedirectionRules":[{"source":"/hc/en-us/","target":""}]},"project-primary-data-key":{"headerLogoText":"","headerLogoUrl":"https://cdn.us.document360.io/logo/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/345245b81b8d414da5f74b2852df3928-logo_color.png","project":{"id":"c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9","name":"Fortanix","projectStatus":"Active","domainSetting":{"subDomainName":"fortanix","subDomainCName":"support.fortanix.com"},"projectSetting":{"isPortalLocalizationEnabled":false,"documentationSetting":{"isEnabled":true,"displayContributors":false,"displayPublishedDate":true,"displayComments":true,"displayTableOfContent":true,"tableOfContentText":"Table of contents","displayThemeSelection":true,"displayShareButton":true,"redirections":[],"displayBreadcrumb":true,"displayPrintButton":true,"displayFeedbackForm":true,"displayRelatedArticles":true,"isEnabledRelatedArticlesTwoWay":true,"displayRelatedArticlesinBottomOrRight":0,"displayArticleAttachments":true,"displayArticleAttachmentsinBottomOrRight":0,"displayArticleTags":true,"displayEstimatedReadingTime":true,"openFirstLevelOfArticlesInAllCategory":false,"contentType":2,"showLinesinMarkdownEditor":false,"tocTags":["h2","h3","h4"],"showFacebookShareButton":true,"showTwitterShareButton":true,"showLinkedinShareButton":true,"showEmailShareButton":true,"isEnabledAutomaticArticleStatus":false,"automaticArticleStatusExpireDays":30,"isEnabledWhatsNewFeature":false,"isEnabledArticleStaleStatus":false,"isNotifyAllContributorsEnabled":false,"articleStaleExpireDays":30,"displayDownloadPdfButton":true,"showAttachmentsTabInSearch":false,"isEnabledCustomArticleStatus":true,"customStatusBackgroundcolor":"#8DBACF","customStatusForegroundcolor":"#fff","customStatusBordercolor":"","showPreviousNextNavigations":true,"isAdvancedSearchEnabled":true,"showBubbleUpStatus":true,"showDownloadApiReferenceOption":false,"isNoSearchResultFeedbackEnabled":true,"toEnableAllVersionInAdvancedSearch":false,"searchBoxPosition":0,"showOutlineView":true,"toDisableTranslationInHyperLinks":false,"toDisableStopWords":true,"showPdfTemplatesInKb":true,"showFollowButton":true,"faqSettings":{"accordionBorderStyle":0,"accordionExpandIconType":0,"accordionExpandIconPosition":0,"accordionExpandState":0},"enableReadOutLoudInKb":false},"projectProtectionSetting":{"projectProtectionLevel":2},"customScriptsSetting":{"customCss":"/********************\n ** WOW SITES TEAM\n ** STYLES START\n********************/\n:root {\n --color-primary: #081353;\n --color-secondary: #007A8D;\n --color-tertiary: #151629;\n --heading-font-family: 'Montserrat', sans-serif !important;\n --body-font-family: 'Open Sans', sans-serif !important;\n --article-content-font-family: 'Open Sans', sans-serif !important;\n --color-border: #B1C5E2;\n\n --color-white: #FFF;\n --color-fog: #F2F4F8;\n --color-smoke: #EDEFF2;\n --color-dark: #111418;\n\n --theme-dark-bg-default: #18181b;\n --theme-dark-bg-custom: #212121;\n --theme-dark-border: #3A3A3A;\n}\n\n/*Default*/\n.default site-home-page h1,\n.default site-home-page h2,\n.default site-home-page h3,\n.default site-home-page h4,\n.default site-home-page h5,\n.default site-home-page h6 {\n font-weight: 700;\n}\n\n.default site-home-page p,\n.default site-home-page span,\n.default site-home-page a,\n.default site-home-page input,\n.default site-home-page label,\n.default site-home-page li {\n font-weight: 400;\n}\n\n.default site-home-page a {\n text-decoration: none;\n}\n\n/*Layout*/\n.default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n width: 95% !important;\n max-width: 95% !important;\n margin: 0 auto !important;\n}\n\n.default site-home-page .container {\n width: 95% !important;\n max-width: 95% !important;\n padding: 0 !important;\n margin: 0 auto !important;\n}\n\n@media screen and (min-width: 1440px) {\n .default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n width: 1380px !important;\n max-width: 1380px !important;\n }\n\n .default site-home-page .container {\n width: 1300px !important;\n max-width: 1300px !important;\n }\n}\n\n@media screen and (max-width: 1240px) {\n\n .default site-home-page .container {\n width: 90% !important;\n max-width: 90% !important;\n }\n}\n\n.default site-home-page .section__row {\n display: flex;\n justify-content: space-between;\n flex-wrap: wrap;\n gap: 40px 24px;\n}\n\n@media screen and (max-width: 1080px) {\n .default site-home-page .section__row {\n justify-content: center;\n }\n}\n\n@media screen and (max-width: 600px) {\n .default site-home-page .section__row {\n flex-direction: column;\n }\n}\n\n.col--3 {\n width: calc(33.33% - 24px);\n}\n\n.col--2 {\n width: calc(50% - 24px);\n}\n\n@media screen and (max-width: 1080px) {\n .column {\n width: calc(50% - 24px);\n }\n}\n\n@media screen and (max-width: 600px) {\n .column {\n width: 100%;\n }\n}\n\n/*Typography*/\n.default site-home-page .section--heading {\n font-size: 22px;\n line-height: 32px;\n color: var(--color-primary);\n margin: 0 0 32px;\n}\n\n.default site-home-page .heading--sub {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-secondary);\n margin: 0 0 20px;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .section--heading,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .heading--sub {\n color: var(--color-white);\n}\n\n.default site-home-page p {\n font-size: 16px;\n line-height: 26px;\n margin: 0 0 16px;\n}\n\n.default site-home-page p:last-child {\n margin: 0;\n}\n\n/*Global*/\n.default site-home-page header+div {\n min-height: 100vh;\n background: var(--color-fog);\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page header+div {\n background: var(--theme-dark-bg-custom);\n}\n\n.default site-home-page figure {\n margin: 0;\n}\n\n.default site-home-page section {\n padding: 60px 0;\n}\n\n.default site-home-page .text--trunc {\n display: -webkit-box;\n -webkit-line-clamp: 2;\n -webkit-box-orient: vertical;\n overflow: hidden;\n}\n\n/*COMPONENT - CUSTOM CARD*/\n.custom__card {\n display: block;\n padding: 33px;\n background: var(--color-white);\n border: 1px solid var(--color-border);\n border-radius: 4px;\n}\n\nhtml[data-bs-theme=\"dark\"] .custom__card {\n background: var(--theme-dark-bg-default);\n border: 1px solid var(--theme-dark-border);\n}\n\n/*COMPONENT - ICON TEXT*/\n.icon__text {\n display: flex;\n align-items: center;\n}\n\n/*COMPONENT - LINK MORE*/\n.link--more,\n.link--more i {\n font-size: 16px;\n line-height: 26px;\n color: #795DA7;\n text-transform: uppercase;\n}\n\n.link--more {\n font-weight: 500 !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .link--more,\nhtml[data-bs-theme=\"dark\"] .link--more i {\n color: var(--color-white);\n}\n\n/*COMPONENT - BUTTON C2A*/\n.button--c2a {\n font-size: 16px;\n line-height: 26px;\n color: var(--color-white);\n display: inline-block;\n padding: 8px 24px;\n background: var(--color-secondary);\n border-radius: 6px;\n}\n\n/*Header*/\n.default site-home-page site-primary-header-section {\n max-height: initial !important;\n position: relative;\n box-shadow: 0 4px 4px rgba(0, 0, 0, 0.1)\n}\n\n.default site-home-page site-primary-header-section .nav-bar.primary-nav-bar {\n height: auto !important;\n padding: 21px 0 24px;\n}\n\n.default site-home-page site-primary-header-section .nav-bar-brand img {\n width: 160px !important;\n max-width: initial !important;\n}\n\n.default site-home-page .nav-bar.primary-nav-bar::after {\n display: none;\n}\n\n.default site-home-page .nav-bar-nav.nav-l.divider {\n padding: 0 !important;\n border: 0;\n}\n\n.default site-home-page .nav-bar-nav.nav-l ul li {\n margin-right: 24px !important;\n}\n\n@media screen and (min-width: 1200px) {\n .default site-home-page .nav-bar-nav.nav-l ul li:first-child::after {\n content: \"\";\n width: 100%;\n height: 5px;\n position: absolute;\n top: calc(100% + 24px);\n left: 0;\n background: var(--color-secondary);\n }\n}\n\n.default site-home-page site-primary-header-section ul a span {\n font-family: var(--heading-font-family) !important;\n font-size: 16px !important;\n line-height: 26px !important;\n font-weight: 600 !important;\n color: var(--color-primary) !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page site-primary-header-section ul a span {\n color: var(--color-white) !important;\n}\n\n.nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"]::before {\n content: \"\";\n font-size: 20px;\n width: 20px;\n height: 20px;\n display: inline-block;\n position: relative;\n top: 4px;\n font-weight: 700;\n background-image: url('https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/health-dark.svg?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D');\n background-position: center;\n background-size: contain;\n background-repeat: no-repeat;\n}\n\nhtml[data-bs-theme=\"dark\"] .nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"]::before {\n background-image: url('https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/health%20icon.svg?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D');\n}\n\n.nav-bar-nav.nav-r ul li:first-child a[href=\"https://fortanix.statuspage.io/\"] span {\n padding-left: 8px;\n font-weight: normal !important;\n}\n\nd360-header-profile button.btn-link {\n display: none;\n}\n\n/*Banner Section*/\n.default site-home-page .hero-section {\n padding: 60px 0 !important;\n}\n\n.default site-home-page .hero-section h1 {\n font-size: 40px;\n line-height: 48px;\n}\n\n.default site-home-page .hero-section .text-area {\n font-size: 18px !important;\n line-height: 24px;\n}\n\n@media only screen and (max-width: 600px) {\n .default site-home-page .hero-section h1 {\n font-size: 36px;\n line-height: 44px;\n }\n\n .default site-home-page .hero-section .text-area {\n font-size: 16px !important;\n line-height: 24px;\n padding-bottom: 0 !important;\n }\n}\n\n.default site-home-page .hero-section .search-box {\n width: 100% !important;\n margin-bottom: 40px;\n border: 1px solid var(--color-border) !important;\n border-radius: 100px !important;\n}\n\n@media only screen and (min-width: 1024px) {\n .default site-home-page .hero-section .search-box {\n width: 65% !important;\n }\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box {\n border-color: var(--theme-dark-border) !important;\n}\n\n.default site-home-page .hero-section .search-box span {\n color: var(--color-dark) !important;\n}\n\n.default site-home-page .hero-section .search-box .seach-key {\n border-radius: 100px !important;\n}\n\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section h1,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .text-area,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box span,\nhtml[data-bs-theme=\"dark\"] .default site-home-page .hero-section .search-box .seach-key {\n color: var(--color-white) !important;\n}\n\n/*Categories Section*/\n\nsection.categories .heading {\n margin-bottom: 26px;\n}\n\nsection.categories .icon__text img {\n width: auto;\n height: 22px;\n}\n\nsection.categories .icon__text p {\n font-size: 12px !important;\n line-height: 22px !important;\n padding-left: 8px;\n}\n\n.default site-home-page section.categories .section--heading {\n margin-bottom: 10px;\n}\n\nsection.categories .list a {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-secondary);\n display: block;\n position: relative;\n padding-left: 23px;\n margin-bottom: 20px;\n}\n\nhtml[data-bs-theme=\"dark\"] section.categories .list a {\n color: var(--color-white);\n}\n\nsection.categories .list a::before {\n content: \"\";\n width: 15px;\n height: 15px;\n position: absolute;\n left: 0;\n top: 6px;\n background: url(https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/icon_bullet_list.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D) no-repeat center;\n background-size: contain;\n}\n\nhtml[data-bs-theme=\"dark\"] section.categories .list a::before {\n filter: brightness(0) invert(1);\n}\n\n/*Latest Section*/\n@media screen and (max-width: 1080px) {\n section.latest .section__row {\n align-items: flex-start;\n }\n}\n\nsection.latest .custom__card {\n padding: 24px;\n margin-bottom: 24px;\n}\n\nsection.latest .icon__text img {\n width: auto;\n height: 92px;\n}\n\nsection.latest .icon__text .content {\n padding-left: 16px;\n margin: 0;\n}\n\nsection.latest .icon__text .heading--sub {\n margin: 0;\n}\n\nsection.latest .icon__text .content p {\n color: var(--color-dark);\n}\n\nhtml[data-bs-theme=\"dark\"] section.latest .icon__text .content p {\n color: var(--color-white);\n}\n\n/*Video Section*/\nsection.video a.tile-box {\n display: block;\n border-radius: 4px;\n overflow: hidden;\n}\n\nsection.video .thumbnail--img {\n width: 100%;\n height: 290px;\n}\n\nsection.video .thumbnail--img img {\n width: 100%;\n height: 100%;\n object-fit: cover;\n}\n\nsection.video .icon__text {\n padding: 24px;\n background: var(--color-white);\n}\n\nsection.video .icon__text img {\n width: auto;\n height: 48px;\n}\n\nsection.video .icon__text .heading--sub {\n padding-left: 16px;\n margin: 0;\n}\n\nhtml[data-bs-theme=\"dark\"] section.video .icon__text .heading--sub {\n color: var(--color-secondary);\n}\n\n/*Footer*/\nfooter.footer__custom {\n padding: 60px 0;\n background: #151629;\n}\n\nhtml[data-bs-theme=\"dark\"] footer.footer__custom {\n background: var(--theme-dark-default);\n}\n\nfooter.footer__custom .block,\nfooter.footer__custom .links__block {\n display: flex;\n justify-content: space-between;\n gap: 24px;\n}\n\n@media screen and (max-width: 600px) {\n\n footer.footer__custom .block,\n footer.footer__custom .links__block {\n flex-direction: column;\n }\n}\n\nfooter.footer__custom .block a {\n display: block;\n}\n\nfooter.footer__custom h5,\nfooter.footer__custom .links a {\n font-size: 16px;\n line-height: 26px;\n font-weight: 500;\n color: var(--color-fog);\n margin-bottom: 32px;\n}\n\nfooter.footer__custom .links {\n width: calc(33.33% - 24px);\n}\n\n@media screen and (max-width: 600px) {\n footer.footer__custom .links {\n width: 100%;\n }\n}\n\nfooter.footer__custom h6 {\n font-size: 14px;\n line-height: 24px;\n color: rgba(242, 244, 248, 0.5);\n text-transform: uppercase;\n margin-top: 24px;\n}\n\nfooter.footer__custom h6+a {\n color: var(--color-white);\n}\n\nfooter.footer__custom .brands {\n margin: 32px 0;\n}\n\nfooter.footer__custom .brands img {\n width: 90px;\n height: auto;\n margin-right: 38px;\n}\n\n.footer__custom .section__row {\n padding-top: 60px;\n margin-top: 60px;\n border-top: 1px solid rgba(255, 255, 255, 0.15);\n}\n\n.footer__custom .section__row .brands img {\n width: auto;\n height: 70px;\n}\n\n.footer__custom .section__row .column:last-child {\n text-align: right;\n}\n\n@media screen and (max-width: 600px) {\n .footer__custom .section__row .column:last-child {\n text-align: left;\n }\n}\n\n.footer__custom .section__row .column:last-child img {\n width: auto;\n height: 140px;\n}\n\n.footer__custom .section__row .column:last-child p {\n font-size: 12px;\n line-height: 23px;\n color: var(--color-fog);\n margin-top: 24px;\n}\n\n/*Articles Page*/\nsite-document .documentation-main,\nsite-document aside#left-panel {\n min-height: 80vh !important;\n}\n\n@media screen and (min-width: 1600px) {\n\n site-document .documentation-main,\n site-document aside#left-panel {\n min-height: 86vh !important;\n }\n}\n\n/********************\n ** WOW SITES TEAM\n ** STYLES END\n********************/\n\n\ncode[class*=language-] {\n padding: 0px !important;\n}\n\n.content_block .content_container .page-action .article_action_links ul li.selected>a {\n color: #21a8b5;\n}\n\na {\n text-decoration: none !important;\n}\n\n/*Tabbed widget*/\n.ui-state-active,\n.ui-widget-content .ui-state-active,\n.ui-widget-header .ui-state-active,\na.ui-button:active,\n.ui-button:active,\n.ui-button.ui-state-active:hover {\n border: none !important;\n background: none !important;\n}\n\n.content_block .content_container .content_block_text dl,\n.content_block .content_container .content_block_text ol,\n.content_block .content_container .content_block_text ul {\n padding-left: 1.5rem;\n}\n\n\n.ui-tabs .ui-tabs-nav li.ui-tabs-active .ui-tabs-anchor {\n color: white !important;\n background-color: #21a8b5;\n border-top-left-radius: 10px;\n border-top-right-radius: 10px;\n}\n\n.ui-tabs-tab .ui-tabs-anchor {\n background-color: white;\n color: #454545c2 !important;\n}\n\n.ui-tabs .ui-tabs-nav li {\n border: none;\n}\n\n.ui-widget-header {\n border: none !important;\n}\n\n.ui-tabs.ui-corner-all.ui-widget.ui-widget-content ul {\n margin-left: 0px !important;\n background: none;\n margin-top: 0px;\n border-bottom: 1px solid #c5c5c5 !important;\n}\n\n\n/**letter spacing**/\n.content_block_text {\n letter-spacing: normal !important;\n}\n\n/**call out info box**/\n.infoBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Info%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 5px;\n position: relative;\n}\n\n/**align call out**/\n.warningBox .title,\n.warningBox .blockquote-title,\n.infoBox .title,\n.infoBox .blockquote-title {\n display: inline-flex !important;\n}\n\n.successBox .title,\n.successBox .blockquote-title {\n display: inline-flex !important;\n}\n\n/**remove intro text from article heading**/\n.category-index-page .category-index-list .page-content {\n display: none !important;\n}\n\n\n\n.blockquote-title {\n align-items: center;\n display: flex;\n}\n\nblockquote.infoBox {\n border-left: 4px solid #abbfdd !important;\n background-color: #EAEFF6 !important;\n}\n\n/**Call out warning box**/\n.warningBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Warning%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 5px;\n position: relative;\n}\n\nblockquote.warningBox {\n border-left: 4px solid #f6a623 !important;\n background-color: #fff6e9 !important;\n}\n\n\n\n/**Call out Tip box**/\n.successBox .blockquote-title::before {\n content: url('https://cdn.document360.io/b2461861-246e-40e9-b501-7a9fd24e09e8/Images/Documentation/Tip%20icon.png');\n display: inline-block;\n vertical-align: middle;\n margin-right: 5px;\n top: 4px;\n position: relative;\n}\n\nblockquote.successBox {\n border-left: 4px solid #80deea !important;\n background-color: #f2fbfc !important;\n}\n\n/**Call out Error box**/\nblockquote.errorBox {\n border-left: 5px solid #b0bec4 !important;\n background-color: #eceff1 !important;\n color: #1a1a1b;\n}\n\n/*\n.errorBox {\n color: #000000 !important;\n}\n\n.errorBox a:hover {\n text-decoration: underline !important;\n}\n*/\n\n\n/** table **/\ntable th {\n background: #6C6E9B !important;\n color: white;\n}\n\n/** code block title **/\ndiv.code-toolbar>.toolbar .toolbar-item:first-child {\n display: none !important;\n}\n\n/** Article snippet **/\n[_nghost-serverApp-c269487220] .category-index-page[_ngcontent-serverApp-c269487220] .category-index-list[_ngcontent-serverApp-c269487220] .page-content[_ngcontent-serverApp-c269487220] {\n display: none;\n}\n\n[_nghost-serverApp-c75797761] .nav-bar-nav[_ngcontent-serverApp-c75797761] ul[_ngcontent-serverApp-c75797761] {\n gap: 8px !important;\n}\n\n/*Code Block - Dark*/\n\n[_nghost-serverApp-c3480338300] .copy-to-clipboard-button {\n padding: 5px 4px !important;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item {\n background: #212630 !important;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item:last-child {\n border: none;\n color: #d8dee9;\n}\n\ndiv.code-toolbar>.toolbar .toolbar-item:last-child span {\n color: white;\n}\n\nem {\n font-weight: 400 !important;\n font-family: 'Inter' !important;\n}\n\n\n\n/*Table*/\n[_nghost-serverApp-c3480338300] div[data-type=table-content] table p {\n word-break: normal;\n}\n\n/*Callout color*/\n\n.successBox {\n color: black !important;\n}\n\n.warningBox {\n color: #000000 !important;\n}\n\n\n.errorBox {\n color: #000000 !important;\n}\n\n.infoBox {\n color: #000000 !important;\n}\n\n#removecopy .toolbar {\n display: none !important;\n}\n\n.ui-widget-content a {\n color: #0065FF !important;\n}\n\n.default .hero-section[_nghost-serverApp-c3510732403] .search-box[_ngcontent-serverApp-c3510732403],\n.default .hero-section [_nghost-serverApp-c3510732403] .search-box[_ngcontent-serverApp-c3510732403] {\n margin-bottom: 10px;\n}\n\n.infoBox a {\n font-weight: 400 !important;\n}\n\n#articleContent .tabs {\n border: 1px solid #c5c5c5;\n border-radius: 3px !important;\n padding: 10px !important;\n}\n\n#articleContent .tabs .tab-content {\n color: #333333 !important;\n background-color: transparent !important;\n border: none !important;\n border-top: 1px solid #d1d1d6 !important\n}\n\n#articleContent .tabs .tab.active {\n color: white !important;\n background-color: #21a8b5 !important;\n}\n\n#articleContent .tabs .tab {\n border-top-left-radius: 10px !important;\n border-top-right-radius: 10px !important;\n border: none !important;\n flex: inherit !important;\n min-width: inherit !important;\n font-size: 16px !important;\n}\n\n#articleContent .tabs .tab:not(.active):hover {\n background-color: transparent !important;\n}\n\n#articleContent .tabs .tab:not(.active) {\n color: #454545c2 !important;\n}\n\n[data-bs-theme=\"dark\"] #articleContent .tabs {\n background: #fff !important;\n}\n\n.follow-modal-body .follow-login {\n display: none !important;\n}","customJavaScript":"window.addEventListener(\"load\", function() {\n const logoWhite = \"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/logo_white.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D\";\n const logoColor = \"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/logo_color.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D\";\n \n const elNavLogo = document.querySelector(\".nav-bar-brand a img\");\n const elThemeOptionItems = document.querySelectorAll(\"div[aria-labelledby=themeOptions] button\");\n elThemeOptionItems.forEach(function(el) {\n el.addEventListener(\"click\", function(e) {\n elNavLogo.src = e.target.getAttribute(\"aria-label\") === \"Dark\" ? logoWhite : logoColor;\n })\n });\n\n const elNavLight = document.querySelector(\"html[data-bs-theme=light] .nav-bar-brand a img\");\n elNavLogo.src = elNavLight ? logoColor : logoWhite;\n \n $('#world-map area').click(function() {\n var $this = $(this);\n var country = $this.attr('id');\n var $areaLabel = $this.next();\n $this.siblings('area').addClass('inactive');\n $this.removeClass('inactive');\n $('#' + country + '-address').siblings().addClass('hidden');\n $('#' + country + '-address').removeClass('hidden');\n });\n\n $('#world-map span').click(function() {\n var $this = $(this);\n var $area = $this.prev();\n $area.trigger('click');\n });\n});","touched":true},"customScriptsSettingV1":{},"appearanceSetting":{"logoUrl":"https://cdn.us.document360.io/logo/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/345245b81b8d414da5f74b2852df3928-logo_color.png","logoText":"","useLogoText":false,"isThemeA":true,"favIconUrl":"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/favicon.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D","primaryColor":"#21a8b5","secondryColor":"#21a8b5","linkColor":"#21a8b5","hoverColor":"#156c74","visitedColor":"#21a8b5","layoutStyle":0,"linkLogoUrl":false,"isRemoveDocument360Logo":false,"headingFontFamily":"Montserrat","bodyFontFamily":"Open Sans","isFluidThemeSmall":false},"aiFeatureSettings":{"name":"","isAIAssistiveSearchEnabled":false,"aiSearchSettings":{"isAIAssistiveSearchEnabled":true,"isKbSiteEnabled":true,"isPublicApiEnabled":true,"isKBWidgetEnabled":false,"isCitationsDisabled":false,"isTurnstileDisabled":false,"enableANN":false,"responseTone":0,"responseLength":0,"aiExtensionSettings":{"isFreshServiceEnabled":false,"isFreshDeskEnabled":false},"isFeedbackFormDisabled":false,"isSourceArticleEnabled":false,"isAIAttachmentAssistiveSearchEnabled":false,"aiAttachmentAssistiveSearchFileSizeLimit":40},"isAIWriterEnabled":false,"isSEODescriptionGeneratorEnabled":false,"isTagRecommenderEnabled":false,"isTitleRecommenderEnabled":false,"isArticleSummarizerEnabled":false,"isRelatedArticlesRecommenderEnabled":false,"isAutomatedGlossaryGeneratorEnabled":false,"isDynamicRelatedArticlesEnabled":false,"isAIAltTextAutoGenerationDisabled":false,"isAIArticleCreationDisabled":false},"defaultChannelId":"42a0dfb4-2a13-46b8-b6e2-ac86232ce12e","isCookieConsentEnabled":false,"rememberState":true},"allProjectDocumentVersions":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false,"docsBaseUrl":"/docs"},{"id":"cd841a33-9655-4979-983c-b6b9fe875500","versionNumber":0,"baseVersionNumber":0,"versionCodeName":"v1-api","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2024-07-25T11:39:06.509Z","modifiedAt":"2024-07-25T11:39:06.509Z","slug":"v1-api","languageVersions":[{"id":"861dba71-84e3-4c9e-8f26-9d628c36f5fe","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":false}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":1,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectDocumentVersions":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectDocumentVersionsWithoutUserACL":[{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":false}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false}],"projectUsers":[],"isProtected":true,"isIPRestrictionAllowed":true,"ipAddressRestrictions":[],"isEnterpriseEnabled":false,"isSSODirectLoginEnabled":false,"jwtConfigurationDetails":{"isJwtConfigured":false,"isJwtEnabled":false,"jwtLogOutUrl":""},"enableSearchHighlight":true,"isSubFolderHostingEnabled":false,"isIntegrationReloadRequired":false,"isIntegrationAvailable":true,"hostingPath":"docs","projectOnHold":false,"algoliaArticlesIndexId":"articles1","isDisplayVersionAsMenuEnabled":false,"isAccountActivated":true,"activatedOn":"01/01/0001 00:00:00","isSandboxProject":false,"isSubdomainLoginOnly":false,"enableSearchAttachmentsFeature":false,"isJwtLoginRequired":false,"siteDesign":{"theme":0,"logoSettings":{"logoUrl":"https://cdn.us.document360.io/logo/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/345245b81b8d414da5f74b2852df3928-logo_color.png","logoText":"","useLogoText":false,"showCustomRedirectionLink":false,"favIconUrl":"https://cdn.us.document360.io/c3bd85d2-4ad8-4d85-9f60-f1c168a3aad9/Images/Documentation/favicon.png?sv=2022-11-02&spr=https&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A40%3A37Z&sr=c&sp=r&sig=D5k%2BN2YtnTr%2FLMG%2FBX3IlSUIh5QRwgwyIgCG67Pv%2ByE%3D"},"siteColorSettings":{"autoSetWcag":true,"lightMode":"#006d79","darkMode":"#21a8b5","selectedColor":"#21a8b5"},"hyperlinkColorSettings":{"hyperlinkColorState":2,"lightMode":{"defaultColor":"#0065FF","hoverColor":"#0052CC","visitedColor":"#86198F"},"darkMode":{"defaultColor":"#2684FF","hoverColor":"#4C9AFF","visitedColor":"#D946EF"},"selectedColor":{"defaultColor":"#0065FF","hoverColor":"#0052CC","visitedColor":"#86198F"}},"articleFontPairing":{"useCustomPairing":true,"headingFont":"Montserrat","bodyFont":"Open Sans","siteFont":"Open Sans, sans-serif"},"siteElementsStyle":1,"siteLayout":0},"versionType":0,"isAISearchEnabled":true,"isAISummaryEnabled":false,"isSmartBarConfigured":false,"referer":"https://support.fortanix.com","isGlobalHomePage":false,"globalHomeLanguages":[],"currentVersion":{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false},"currentLanguage":{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true},"eddyName":"Eddy AI","aiSupportedLanguageCodes":["no","ko","nl","de","sv","cs","pt","pl","es","he","ja","it","ar","da","en","fr","en-us","el","pt-br","fi","en-gb","es-mx","lt","en-au"],"isKbSite2PreviewEnabled":false,"aiSearchAccessAllowedlanguages":[],"kb2PreviewPdfProtectionLevel":2,"hasDecisionTreeEnabled":true},"selectedProjectVersion":{"id":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":1,"baseVersionNumber":0,"versionCodeName":"v1","isMainVersion":true,"isBeta":false,"isPublic":true,"isDeprecated":false,"createdAt":"2023-12-08T06:06:19.57Z","modifiedAt":"2023-12-08T06:06:19.57Z","slug":"v1","languageVersions":[{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true}],"order":0,"siteProtectionLevel":0,"canModifyVersion":false,"changeVersionForInternalLink":false,"projectVersionType":0,"isInheritanceDisabled":false,"isSetRedirect":false,"canShowInDocs":false,"canShowInGuides":false,"docsBaseUrl":"/docs"},"pageType":"documentation_page","leftNavigationMenus":[{"type":3,"text":"Documentation","url":"/docs","openLinkInNewTab":null,"ticketDeflectorId":null},{"type":1,"text":"Downloads","url":"https://fortanix.zendesk.com/hc/en-us/categories/360006153871-Downloads","openLinkInNewTab":true,"ticketDeflectorId":null},{"type":8,"text":"API Docs","url":"/apidocs","openLinkInNewTab":true,"ticketDeflectorId":null},{"type":1,"text":"Community","url":"https://fortanix.zendesk.com/hc/en-us/community/topics","openLinkInNewTab":true,"ticketDeflectorId":null},{"type":1,"text":"My Requests","url":"https://fortanix.zendesk.com/hc/en-us/requests","openLinkInNewTab":true,"ticketDeflectorId":null}],"rightNavigationMenus":[{"type":1,"text":"DSM Health Status","url":"https://fortanix.statuspage.io/","openLinkInNewTab":true,"ticketDeflectorId":null}],"selectedProjectLanguage":{"id":"e9721964-e18b-4ec5-82af-fd95c931c045","name":"English","code":"en","setAsDefault":true,"hidden":false,"enableRTL":false,"siteProtectionLevel":0,"isInheritanceDisabled":false,"hasInheritanceDisabledCategoriesOrArticles":false,"countryFlagCode":"us","displayName":"English","isHomePageEnabled":true},"isVersionAsMenuEnabled":false,"accountRelatedInfo":{"isJwtUser":false,"jwtConfigurationDetails":{"isJwtConfigured":false,"isJwtEnabled":false,"jwtLogOutUrl":""},"showLoginButton":true,"hostedDomain":"us.document360.io"},"whatsNewUrl":"docs/whats-newx","showWhatsNew":false,"hideVersionLanguage":false,"isAcknowledgementEnabled":false,"acknowledgementRequiredCount":0,"background":""},"FOOTER_TRANSFER_KEY":{"result":{"elementType":3,"elementName":"footerNavigation","elementGUID":"d6b4d29f-9f90-417c-ba57-676cb5edd902","displayName":"Footer","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"isBasic":false,"choosenThemeName":"none","facebook":"","twitter":"","linkedIn":"","youtube":""},"editableProperties":[],"children":[{"elementType":6,"elementName":"none","elementGUID":"656256a7-7721-40bf-b6ea-a351ca3c86d8","displayName":"Custom code section","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false},"editableProperties":[],"children":[{"elementType":15,"elementName":"customHTML","elementGUID":"34c292c8-cc65-4cba-b8c1-a9dda73fabdd","displayName":"HTML","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"customHTML":"\u003C!-- Footer Starts -->\n\u003Clink rel=\"stylesheet\" href=\"https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css\" integrity=\"sha384-wvfXpqpZZVQGK6TAh5PVlGOfQNHSoD2xbE+QkPxCAFlNEevoEH3Sl0sibVcOQVnN\" crossorigin=\"anonymous\">\n\u003Csection class=\"new-footer siteFooterRevampMainWrapper\" id=\"section-footer-revamp\">\n \u003Cdiv class=\"shell-wide\">\n \u003Csection class=\"fiveColumnWrapper\">\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/platform\">\n \u003Ch2>PLATFORM\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>Fortanix Platform\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/platform/data-security-manager/key-insight\">\n \u003Ch3>Key Insight\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/platform/data-security-manager\">\n \u003Ch3>Data Security Manager™ \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/platform/confidential-computing-manager\">\n \u003Ch3>Confidential Computing Manager\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>Open source platform\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/platform/runtime-encryption/enclave-development-platform\">\n \u003Ch3>Enclave Development Platform®\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>learn more\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/request-a-demo\">\n \u003Ch3>Request A demo \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/contact-us\">\n \u003Ch3>Contact Us\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/start-your-free-trial\">\n \u003Ch3>Free Trial\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/solutions\">\n \u003Ch2>SOLUTIONS\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Cp>by use case\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/xks-for-aws\">\n \u003Ch3>AWS KMS External Key Store (XKS) \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/ekm-for-gcp\">\n \u003Ch3>Google External Key Manager \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/bring-your-own-key-hold-your-own-key\">\n \u003Ch3>Bring Your Own Key (BYOK)\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/hsm-modernization\">\n \u003Ch3>HSM Modernization\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/multicloud-key-management\">\n \u003Ch3>Multicloud Key Management \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/enterprise-key-management/post-quantum-cryptography\">\n \u003Ch3>Post Quantum Cryptography\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/secure-your-code-signing-process\">\n \u003Ch3>Code Signing\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/secrets-management\">\n \u003Ch3>Secrets Management\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/tokenization\">\n \u003Ch3>Tokenization Transparent\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/transparent-database-encryption\">\n \u003Ch3>Database Encryption\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/filesystem-encryption\">\n \u003Ch3>Filesystem Encryption\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/confidential-data-search\">\n \u003Ch3>Confidential Data Search\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/use-case/confidential-ai\">\n \u003Ch3>Confidential AI\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Cdiv class=\"subColumnWrapper3\">\n \u003Cp>by industry\u003C/p>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-healthcare\">\n \u003Ch3>Healthcare\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-banking-and-financial-services\">\n \u003Ch3>Banking & Financial Services \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/data-security-for-fintech\">\n \u003Ch3>Fintech\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/secure-manufacturing\">\n \u003Ch3>Manufacturing \u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/web3\">\n \u003Ch3>Web 3.0\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/solutions/industry/government-data-security\">\n \u003Ch3>Federal Government\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/resources\">\n \u003Ch2>RESOURCES\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/blog\">\n \u003Ch3>Blog\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Whitepaper\">\n \u003Ch3>Whitepapers\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Datasheet\">\n \u003Ch3>Datasheets\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=SolutionBrief\">\n \u003Ch3>Solution Briefs\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Ebook\">\n \u003Ch3>Ebooks\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=Report\">\n \u003Ch3>Reports\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/resources?type=CaseStudy\">\n \u003Ch3>Case Studies\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/webinars\">\n \u003Ch3>Webinars\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/university\">\n \u003Ch3>University\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/mediakit\">\n \u003Ch3>Media Kit\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/newsletters\">\n \u003Ch3>Newsletters\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n\n \u003Cdiv class=\"oneColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/company/about\">\n \u003Ch2>COMPANY\u003C/h2>\n \u003C/a>\n \u003Cdiv class=\"subColumnWrapper\">\n \u003Ca href=\"https://www.fortanix.com/company/about\">\n \u003Ch3>About\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/careers\">\n \u003Ch3>Careers\u003Cspan class=\"hiringTag\">we’re hiring\u003C/span>\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/customers\">\n \u003Ch3>Customers\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/partners\">\n \u003Ch3>Partners\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/awards\">\n \u003Ch3>Awards\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/events\">\n \u003Ch3>Events\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/pr\">\n \u003Ch3>Press\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/company/news\">\n \u003Ch3>News\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/services\">\n \u003Ch3>Services\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://support.fortanix.com/hc/en-us\">\n \u003Ch3>Support\u003C/h3>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/faq\">\n \u003Ch3>FAQ\u003C/h3>\n \u003C/a>\n \u003C/div>\n \u003C/div>\n \u003C/section>\n \u003C/div>\n\n \u003Cdiv class=\"borderLine\">\u003C/div>\n\n \u003Cdiv class=\"siteFooterSection2\">\n \u003Cdiv class=\"shell-wide\">\n \u003Cdiv class=\"siteFooterSection2Wrapper\">\n \u003Cdiv class=\"leftSideWrapper\">\n \u003Cdiv class=\"fortanixLogoContainer\">\n \u003Cdiv class=\"fortanixLogoWrapper1\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/fortanix-footer-logo.svg\" alt=\"Fortanix-logo\" loading=\"lazy\" />\n \u003C/div>\n \u003Cdiv class=\"starRatingWrapper\">\n \u003Ch4>4.6\u003C/h4>\n \u003Cimg class=\"starGroupImage\" src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/stars-logo.png\" alt=\"star-ratings\" loading=\"lazy\" />\n \u003C/div>\n \u003Cdiv class=\"gartnerWrapper\">\n \u003Cp>As of August 2023\u003C/p>\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/about/gartner-logo-fortanix.svg\" alt=\"gartner-logo\" loading=\"lazy\" />\n\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"borderLine2\">\u003C/div>\n \u003Cdiv class=\"complianceLogo\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/SOC-2-Type-2.svg\" alt=\"SOC-2 Type-2\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/iso-27001-lite.webp\" alt=\"ISO 27001\" width=\"95\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/fips-140-2.svg\" alt=\"FIPS 140-2 Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/gartner-cool-vendor.svg\" alt=\"Gartner Logo\" loading=\"lazy\" />\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/home/homepage-redesign/pci-dss-footer-logo.svg\" alt=\"PCI DSS Compliant\" loading=\"lazy\" />\n \u003C/div>\n \u003C/div>\n \u003Cdiv class=\"c cell-md-4 cell-sm-4 cell-lg-4\">\n \u003Cdiv class=\"second-menu first-child fortanix-logos-wrapper\">\n \u003Cdiv class=\"section-20 map-container\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/worldmap.png\" width=\"188\" height=\"99\" useMap=\"#image-map\" alt=\"world map logo\" loading=\"lazy\" />\n\n \u003Cmap id=\"world-map\" name=\"image-map\">\n \u003Carea id=\"usa\" coords=\"34,60,22,47\" shape=\"rect\" />\n \u003Cspan>US\u003C/span>\n \u003Carea class=\"inactive\" id=\"netherlands\" coords=\"88,31,98,44\" shape=\"rect\" />\n \u003Cspan>Europe\u003C/span>\n \u003Carea class=\"inactive\" id=\"india\" coords=\"127,48,136,64\" shape=\"rect\" />\n \u003Cspan>India\u003C/span>\n \u003Carea class=\"inactive\" id=\"singapure\" coords=\"145,58,157,72\" shape=\"rect\" />\n \u003Cspan>Singapore\u003C/span>\n \u003C/map>\n \u003C/div>\n \u003Cdiv class=\"address text-white\">\n \u003Cdiv id=\"usa-address\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>US:\u003C/label>\n 3910 Freedom Circle, Suite 104, \u003Cbr />\n Santa Clara CA 95054 \u003Cbr />\n \u003Ca href=\"tel:+14082144760\">+1 408-214-4760\u003C/a> |\n \u003Ca href=\"mailto:info@fortanix.com\">info@fortanix.com\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"india-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>India:\u003C/label>\n UrbanVault 460,\u003Cbr /> First Floor, C S TOWERS,\u003Cbr /> 17th Cross Rd,\n 4th Sector,\u003Cbr /> HSR Layout, Bengaluru,\u003Cbr /> Karnataka 560102\u003Cbr />\n \u003Ca href=\"tel:080-41749241\">+91 080-41749241\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"netherlands-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Europe:\u003C/label>\n High Tech Campus 5, \u003Cbr />\n 5656 AE Eindhoven, The Netherlands\n \u003Cbr />\n \u003Ca href=\"tel:+31850608282\">+31850608282\u003C/a>\n \u003C/div>\n\n \u003Cdiv id=\"singapure-address\" class=\"hidden\">\n \u003Cimg src=\"https://cdn.aglty.io/fortanix/address-pointer.svg\" alt=\"address pointer\" loading=\"lazy\" />\n \u003Clabel>Singapore:\u003C/label>\n 30 Cecil St. #19-08 Prudential Tower, \u003Cbr />\n Singapore 049712\n \u003C/div>\n\n \u003Cdiv class=\"social-footer\">\n \u003Cul>\n \u003Cli>\n \u003Ca href=\"https://www.linkedin.com/company/fortanix/\">\n \u003Ci class=\"fa fa-linkedin\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://twitter.com/fortanix\">\n \u003Ci class=\"fa fa-twitter\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.facebook.com/fortanix/\">\n \u003Ci class=\"fa fa-facebook\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003Cli>\n \u003Ca href=\"https://www.youtube.com/c/fortanix\">\n \u003Ci class=\"fa fa-youtube-play\" aria-hidden=\"true\">\u003C/i>\n \u003C/a>\n \u003C/li>\n \u003C/ul>\n \u003C/div>\n\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n\n\n \u003Cfooter class=\"footerBoxWrapper\">\n \u003Cdiv class=\"shell-wide\">\n \u003Cdiv class=\"footerNavigationLinks\">\n \u003Cdiv class=\"footerNavigationLinksFirst\">\n \u003Ca href=\"https://www.fortanix.com/trust-center\">\n \u003Ch4>Trust Centre\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Privacy Policy\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/privacy\">\n \u003Ch4>Legal\u003C/h4>\n \u003C/a>\n \u003Ca href=\"https://www.fortanix.com/legal/terms\">\n \u003Ch4>Terms of Service\u003C/h4>\n \u003C/a>\n \u003C/div>\n \u003Cdiv class=\"footerNavigationLinksLast\">\n \u003Ch4>Fortanix Copyright 2025. All Right reserved\u003C/h4>\n \u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/footer>\n \u003Clink rel=\"stylesheet\" href=\"https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css\" />\n\u003C/section>"},"editableProperties":[],"children":[]},{"elementType":16,"elementName":"customCSS","elementGUID":"4bba8004-92fb-49ba-9e1b-0b73e0b21e94","displayName":"CSS","viewStyles":{},"viewProperties":{"draggable":false,"hidden":false,"customCSS":"/* revamp-styles */\n\n.hidden {\n display: none;\n}\n.shell,\n.shell-wide,\n.shell-fluid {\n margin-right: auto;\n margin-left: auto;\n padding-left: 15px;\n padding-right: 15px;\n}\n\n.shell,\n.shell-wide {\n min-width: 300px;\n max-width: 480px;\n}\n\n.shell-mobile {\n padding-right: 0;\n}\n\n@media (min-width: 768px) {\n\n .shell,\n .shell-wide {\n max-width: 750px;\n }\n\n .shell-mobile {\n padding-right: 15px;\n }\n}\n\n@media (min-width: 992px) {\n\n .shell,\n .shell-wide {\n max-width: 970px;\n }\n}\n\n@media (min-width: 1200px) {\n .shell {\n max-width: 1080px;\n }\n\n .shell-wide {\n max-width: 1200px;\n }\n}\n\n@media (min-width: 1800px) {\n .shell-wide {\n max-width: 1800px;\n }\n}\n\n.siteFooterRevampMainWrapper {\n background: #151629;\n padding-top: 80px;\n}\n\n.fiveColumnWrapper {\n display: block;\n padding-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper {\n text-align: center;\n}\n\n.fiveColumnWrapper .oneColumnWrapper h2 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n padding-bottom: 24px;\n margin: 0;\n}\n\n\n.fiveColumnWrapper .oneColumnWrapper h3 {\n color: #F2F4F8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 300;\n line-height: 20px;\n margin: 0;\n padding: 0px;\n margin-bottom: 10px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper p {\n color: rgba(242, 244, 248, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n /* 200% */\n letter-spacing: 1px;\n text-transform: uppercase;\n padding-bottom: 6px;\n}\n\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper {\n padding-bottom: 30px;\n}\n\n.hiringTag {\n padding: 2px;\n margin-left: 5px;\n color: var(--Color, #FFF);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 600;\n line-height: normal;\n letter-spacing: 0.5px;\n text-transform: uppercase;\n background: rgba(41, 42, 71, 0.29);\n}\n\n/*section2*/\n.borderLine {\n border: 1px solid #F2F4F8;\n width: 100%;\n opacity: 0.1;\n /* margin: 50px; */\n}\n\n.borderLine2 {\n border: 1px solid #F2F4F8;\n max-width: 100%;\n opacity: 0.1;\n}\n\n.siteFooterSection2 {\n padding: 45px 0px;\n}\n\n.fortanixLogoContainer {\n display: flex;\n justify-content: space-between;\n align-items: center;\n padding-bottom: 24px;\n}\n\n.fortanixLogoContainer .starRatingWrapper h4 {\n color: var(--Color, #FFF);\n font-family: var(--heading-font-family);\n font-size: 20px;\n font-style: normal;\n font-weight: 700;\n line-height: normal;\n font-variant: all-small-caps;\n letter-spacing: 1px;\n padding-bottom: 2px;\n}\n\n.starGroupImage {\n margin: 0;\n}\n\n.fortanixLogoContainer .gartnerWrapper p {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 0.5px;\n padding-bottom: 9px;\n}\n\n.complianceLogo {\n padding-top: 24px;\n display: flex;\n flex-direction: column;\n}\n\n.complianceLogo img {\n max-width: 90px;\n height: 90px;\n margin: 0 auto;\n padding: 12px;\n}\n\n\n/*section3*/\n.siteFooterRevampMainWrapper .footerBoxWrapper {\n background: rgba(41, 42, 71, 0.29);\n padding: 24px 0px;\n}\n\n.footerNavigationLinks {\n display: block;\n text-align: center;\n}\n\n.footerNavigationLinks h4 {\n color: rgba(255, 255, 255, 0.50);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 0.5px;\n padding: 14px;\n}\n\n\n@media only screen and (min-width: 768px) {\n .fiveColumnWrapper {\n display: flex;\n justify-content: space-between;\n padding-bottom: 5px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 18%;\n text-align: left;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper:nth-child(3) {\n padding-bottom: 60px;\n }\n\n .fiveColumnWrapper .oneColumnWrapper .subColumnWrapper3 p {\n padding-top: 38px;\n }\n\n .complianceLogo {\n padding: 24px 0px 0px;\n display: flex;\n flex-direction: row;\n gap: 40px;\n flex-wrap: wrap;\n }\n\n .complianceLogo img {\n padding: 0px;\n }\n\n .footerNavigationLinks {\n display: flex;\n justify-content: space-between;\n }\n\n .footerNavigationLinksFirst {\n display: flex;\n gap: 35px;\n align-items: center;\n }\n\n .footerNavigationLinks h4 {\n padding: 0px;\n }\n\n .siteFooterSection2Wrapper {\n display: flex;\n gap: 25px;\n justify-content: space-between;\n align-items: flex-start;\n }\n\n .hiringTag {\n font-size: 8px;\n }\n}\n\n@media only screen and (min-width: 1022px) {\n .fiveColumnWrapper .oneColumnWrapper {\n max-width: 22%;\n text-align: left;\n }\n\n .hiringTag {\n font-size: 10px;\n\n }\n}\n\n#section-footer-revamp {\n background-color: #151629;\n padding-bottom: 0;\n}\n\n/* #section-footer-revamp .footer-seperator {\nheight: 9px;\nbackground: linear-gradient(89.99deg, #998bed 14.37%, #70f8f8 95.31%);\n} */\n\n#section-footer-revamp .brand img {\n height: 22px;\n}\n\n#section-footer-revamp .address {\n color: #f2f4f8;\n font-weight: 500;\n}\n\n#section-footer-revamp .address label {\n font-weight: 700;\n display: block;\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address a,\n#section-footer-revamp .address a:active,\n#section-footer-revamp .address a:link,\n#section-footer-revamp .address a:hover,\n#section-footer-revamp .address a:visited {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .address>div {\n margin-bottom: 15px;\n position: relative;\n}\n\n#section-footer-revamp.new-footer .address>div {\n opacity: 0.6;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 300;\n line-height: 23px;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .address>div>img {\n position: absolute;\n left: -36px;\n display: none;\n}\n\n#section-footer-revamp .address>div>img.active {\n display: block;\n}\n\n@media (max-width: 480px) {\n #section-footer-revamp .brand img {\n height: 38px;\n }\n\n #section-footer-revamp .address {\n font-size: 10px !important;\n padding-bottom: 0px !important;\n }\n\n #section-footer-revamp .social-footer {\n display: none;\n }\n\n #section-footer-revamp .subscribe {\n display: none;\n }\n\n #section-footer-revamp .second-menu {\n padding-bottom: 0px !important;\n }\n}\n\n#section-footer-revamp .awards-wrapper {\n margin-top: 24px;\n width: 280px;\n display: flex;\n flex-wrap: wrap;\n justify-content: space-between;\n align-items: center;\n}\n\n#section-footer-revamp .awards-wrapper img {\n margin: 4px;\n}\n\n#section-footer-revamp .c {\n position: relative;\n margin-top: 0;\n}\n\n#section-footer-revamp .c:last-child::after {\n width: 0;\n}\n\n#section-footer-revamp .range {\n align-items: flex-start;\n}\n\n#section-footer-revamp .page-foot {\n background: rgba(41, 42, 71, 0.9);\n padding: 15px 0;\n color: rgba(255, 255, 255, 0.49);\n text-align: center;\n font-family: var(--heading-font-family);\n font-size: 12px;\n font-style: normal;\n font-weight: 500;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n}\n\n#section-footer-revamp .page-foot p {\n font-family: var(--heading-font-family);\n}\n\n#section-footer-revamp .page-foot a {\n color: #00c6da;\n}\n\n#section-footer-revamp .page-foot a:hover {\n opacity: 0.5;\n}\n\n#section-footer-revamp .address {\n padding: 24px 0 0;\n font-size: 14px;\n line-height: 20px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n}\n\n.rights * {\n margin-right: 0;\n}\n\n#section-footer-revamp .address a {\n color: #fff;\n}\n\n#section-footer-revamp .address a:hover {\n opacity: 0.7;\n}\n\n#section-footer-revamp .social-footer {\n font-size: 26px;\n}\n\n#section-footer-revamp .social-footer ul {\n padding-top: 30px;\n}\n\n#section-footer-revamp .social-footer li {\n display: inline;\n padding-right: 12px;\n}\n\n#section-footer-revamp .subscribe {\n padding-left: 30px;\n margin-top: 16px;\n}\n\n#section-footer-revamp .subscribe .message-ok {\n color: #fff;\n}\n\n#section-footer-revamp .subscribe .info {\n font-size: 12px;\n line-height: 17px;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #000000;\n}\n\n#section-footer-revamp .subscribe .info>div {\n font-family: var(--heading-font-family);\n font-weight: 600;\n margin-bottom: 12px;\n}\n\n#section-footer-revamp .subscribe form label {\n color: #26546d;\n font-family: var(--heading-font-family);\n font-size: 12px;\n margin-top: 15px;\n}\n\n/* #section-footer-revamp .subscribe form input[type=\"email\"] {\nborder: 1px solid #96dce8;\nbackground-color: #fff;\nbox-sizing: border-box;\nborder-radius: 3px;\nfont-size: 12px;\npadding: 5px;\nheight: auto;\n} */\n\n/* #section-footer-revamp .subscribe form input[type=\"submit\"] {\nbackground-color: #00c6da;\nwidth: 100%;\nmargin: 0;\n} */\n\n#section-footer-revamp .subscribe form .grecaptcha-badge {\n margin-top: 15px;\n background: #eee;\n}\n\n#section-footer-revamp .subscribe form .form-validation {\n display: none;\n}\n\n#section-footer-revamp .second-menu {\n font-size: 12px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-weight: 500;\n text-transform: uppercase;\n line-height: 16px;\n padding-left: 0;\n}\n\n#section-footer-revamp .icons-wrapper {\n display: flex;\n padding-bottom: 40px;\n}\n\n#section-footer-revamp .icons-wrapper img {\n padding-right: 40px;\n}\n\n#section-footer-revamp .second-menu a {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp .second-menu>li {\n padding-bottom: 20px;\n}\n\n#section-footer-revamp .second-menu>li>a {\n font-weight: 600;\n}\n\n#section-footer-revamp .second-menu ul {\n padding: 9px 0 5px;\n font-size: 12px;\n margin-bottom: 15px;\n}\n\n#section-footer-revamp .second-menu ul li {\n text-transform: none;\n font-family: var(--heading-font-family);\n font-weight: 400;\n color: #f2f4f8;\n padding-bottom: 7px;\n padding-top: 20px;\n}\n\n#section-footer-revamp .second-menu ul li:last-child {\n padding-bottom: 0;\n}\n\n#section-footer-revamp .second-menu ul li span {\n color: rgba(242, 244, 248, 0.5);\n font-family: var(--heading-font-family);\n font-size: 10px;\n font-style: normal;\n font-weight: 500;\n line-height: 20px;\n letter-spacing: 1px;\n text-transform: uppercase;\n display: block;\n}\n\n#section-footer-revamp .second-menu ul li a {\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 14px;\n font-style: normal;\n font-weight: 400;\n line-height: 20px;\n}\n\n#section-footer-revamp .second-menu ul li a:hover {\n color: #f2f4f8;\n}\n\n#section-footer-revamp area#usa+span {\n line-height: 24px;\n content: \"US\";\n position: absolute;\n top: 60px;\n left: 9px;\n cursor: pointer;\n width: 70px;\n height: 23px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n text-transform: uppercase;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#usa+span {\n top: 35px;\n}\n\n#section-footer-revamp area#usa {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 41px;\n top: 80px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#usa {\n top: 55px;\n}\n\n#section-footer-revamp area#india+span {\n line-height: 22px;\n content: \"India\";\n cursor: pointer;\n position: absolute;\n top: 65px;\n left: 120px;\n width: 62px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#india+span {\n top: 40px;\n}\n\n#section-footer-revamp area#india {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 144px;\n top: 83px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#india {\n top: 58px;\n}\n\n#section-footer-revamp area#singapure+span {\n line-height: 22px;\n content: \"Singapore\";\n cursor: pointer;\n position: absolute;\n top: 123px;\n left: 123px;\n width: 84px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#singapure+span {\n top: 98px;\n}\n\n#section-footer-revamp area#singapure {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 164px;\n top: 120px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#singapure {\n top: 95px;\n}\n\n#section-footer-revamp area#netherlands+span {\n line-height: 22px;\n content: \"Europe\";\n cursor: pointer;\n position: absolute;\n top: 94px;\n left: 65px;\n width: 66px;\n height: 22px;\n background: #fff;\n border-radius: 4px;\n text-align: center;\n color: #000;\n font-family: var(--heading-font-family);\n font-style: normal;\n font-weight: bold;\n font-size: 12px;\n}\n\n#section-footer-revamp.new-footer area#netherlands+span {\n top: 69px;\n}\n\n#section-footer-revamp area#netherlands {\n content: \"\";\n position: absolute;\n cursor: pointer;\n width: 6.53px;\n height: 6.53px;\n left: 106px;\n top: 91px;\n background: #fff;\n transform: rotate(135deg);\n}\n\n#section-footer-revamp.new-footer area#netherlands {\n top: 66px;\n}\n\n#section-footer-revamp area.inactive+span,\n#section-footer-revamp area.inactive+span {\n opacity: 30%;\n}\n\n#section-footer-revamp area.inactive,\n#section-footer-revamp area.inactive {\n opacity: 30%;\n}\n\n#section-footer-revamp .fortanix-logos-wrapper.second-menu.first-child {\n padding: 0;\n}\n\n#section-footer-revamp .fortanix-logo {\n display: flex;\n align-items: center;\n margin-bottom: 40px;\n}\n\n#section-footer-revamp .fortanix-logo img {\n height: 28px;\n padding-right: 40px;\n}\n\n#section-footer-revamp .fortanix-logo span {\n display: block;\n padding-left: 40px;\n color: #f2f4f8;\n font-family: var(--heading-font-family);\n font-size: 16px;\n font-style: normal;\n font-weight: 300;\n line-height: normal;\n letter-spacing: 1px;\n text-transform: capitalize;\n border-left: 1px solid #18b6ee;\n}\n\n#section-footer-revamp .compliance-logo {\n display: flex;\n align-items: flex-end;\n flex-wrap: wrap;\n}\n\n#section-footer-revamp .compliance-logo img {\n padding-right: 25px;\n margin-bottom: 20px;\n}\n\n#section-footer-revamp .hs_email .input::after {\n right: -5px;\n top: 6px;\n}\n\n.section-40 {\n padding-top: 40px;\n padding-bottom: 40px;\n}\n\n.section-40.border-top {\n border-top: 1px solid rgb(242, 244, 248, 0.1);\n}\n\n.section-20 {\n padding-top: 20px;\n padding-bottom: 20px;\n}\n\n.range {\n margin-left: -15px;\n margin-right: -15px;\n}\n\n[class*=\"cell-\"] {\n padding-left: 15px;\n padding-right: 15px;\n}\n\n@media (min-width: 480px) {\n .range {\n display: -ms-flexbox;\n display: -webkit-flex;\n display: flex;\n -ms-flex: 0 1 auto;\n -webkit-flex: 0 1 auto;\n flex: 0 1 auto;\n -webkit-flex-direction: row;\n -ms-flex-direction: row;\n flex-direction: row;\n -webkit-flex-wrap: wrap;\n -ms-flex-wrap: wrap;\n flex-wrap: wrap;\n }\n\n .range>[class*=\"cell\"] {\n -ms-flex: 0 0 auto;\n -webkit-flex: 0 0 auto;\n flex: 0 0 auto;\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 768px) {\n #section-footer-revamp .second-menu.first-child {\n padding-top: 40px;\n }\n\n .section-sm-top-75 {\n padding-top: 75px;\n }\n\n .text-sm-left {\n text-align: left;\n }\n\n .range-sm-middle {\n -webkit-align-items: center;\n -ms-flex-align: center;\n align-items: center;\n }\n\n .range>.cell-sm-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-sm-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-sm-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-sm-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-sm-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-sm-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-sm-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-sm-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-sm-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-sm-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-sm-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-sm-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 992px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-md-center {\n -webkit-justify-content: center;\n -ms-flex-pack: center;\n justify-content: center;\n }\n\n .range>.cell-md-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-md-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-md-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-md-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-md-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-md-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-md-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-md-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-md-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-md-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-md-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-md-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (min-width: 1200px) {\n #section-footer-revamp .second-menu {\n padding-top: 40px;\n }\n\n .range-lg-left {\n -webkit-justify-content: flex-start;\n -ms-flex-pack: start;\n justify-content: flex-start;\n }\n\n .range>.cell-lg-1 {\n -webkit-flex-basis: 8.333333%;\n -ms-flex-preferred-size: 8.333333%;\n flex-basis: 8.333333%;\n max-width: 8.333333%;\n }\n\n .range>.cell-lg-2 {\n -webkit-flex-basis: 16.666667%;\n -ms-flex-preferred-size: 16.666667%;\n flex-basis: 16.666667%;\n max-width: 16.666667%;\n }\n\n .range>.cell-lg-3 {\n -webkit-flex-basis: 25%;\n -ms-flex-preferred-size: 25%;\n flex-basis: 25%;\n max-width: 25%;\n }\n\n .range>.cell-lg-4 {\n -webkit-flex-basis: 33.333333%;\n -ms-flex-preferred-size: 33.333333%;\n flex-basis: 33.333333%;\n max-width: 33.333333%;\n }\n\n .range>.cell-lg-5 {\n -webkit-flex-basis: 41.666667%;\n -ms-flex-preferred-size: 41.666667%;\n flex-basis: 41.666667%;\n max-width: 41.666667%;\n }\n\n .range>.cell-lg-6 {\n -webkit-flex-basis: 50%;\n -ms-flex-preferred-size: 50%;\n flex-basis: 50%;\n max-width: 50%;\n }\n\n .range>.cell-lg-7 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 58.333333%;\n max-width: 58.333333%;\n }\n\n .range>.cell-lg-8 {\n -webkit-flex-basis: 66.666667%;\n -ms-flex-preferred-size: 66.666667%;\n flex-basis: 66.666667%;\n max-width: 66.666667%;\n }\n\n .range>.cell-lg-9 {\n -webkit-flex-basis: 75%;\n -ms-flex-preferred-size: 75%;\n flex-basis: 75%;\n max-width: 75%;\n }\n\n .range>.cell-lg-10 {\n -webkit-flex-basis: 83.333333%;\n -ms-flex-preferred-size: 83.333333%;\n flex-basis: 83.333333%;\n max-width: 83.333333%;\n }\n\n .range>.cell-lg-11 {\n -webkit-flex-basis: 58.333333%;\n -ms-flex-preferred-size: 58.333333%;\n flex-basis: 91.666667%;\n max-width: 91.666667%;\n }\n\n .range>.cell-lg-12 {\n -webkit-flex-basis: 100%;\n -ms-flex-preferred-size: 100%;\n flex-basis: 100%;\n max-width: 100%;\n }\n}\n\n@media (max-width: 767px) {\n .map-container {\n width: max-content;\n margin: 0 auto;\n position: relative;\n }\n\n #section-footer-revamp area#netherlands+span {\n top: 70px;\n left: 50px;\n }\n\n #section-footer-revamp area#netherlands {\n top: 67px;\n left: 91px;\n }\n\n #section-footer-revamp area#singapure+span {\n top: 98px;\n left: 117px;\n }\n\n #section-footer-revamp area#singapure {\n top: 95px;\n left: 149px;\n }\n\n #section-footer-revamp area#india+span {\n top: 39px;\n left: 109px;\n }\n\n #section-footer-revamp area#india {\n top: 58px;\n left: 127px;\n }\n\n #section-footer-revamp area#usa+span {\n top: 38px;\n left: -8px;\n }\n\n #section-footer-revamp area#usa {\n left: 24px;\n top: 58px;\n }\n\n #section-footer-revamp .second-menu {\n padding-left: 0;\n }\n}\n\n\n@media only screen and (max-width: 767px) {\n\n /* .fortanixLogoContainer {\n padding: 20px;\n margin-top: 0;\n}\n */\n #section-footer .icons-wrapper {\n margin-bottom: 30px;\n justify-content: center;\n }\n\n #section-footer .fortanix-logo {\n flex-direction: column;\n }\n\n #section-footer .fortanix-logo img {\n padding: 0;\n }\n\n #section-footer .fortanix-logo span {\n padding: 0;\n border: 0;\n margin-top: 20px;\n }\n\n #section-footer .compliance-logo {\n display: flex;\n align-items: center;\n flex-direction: column;\n }\n\n #section-footer .compliance-logo img {\n padding-right: 0;\n margin-bottom: 20px;\n }\n}\n\n/* SiteFooterRevamp Map styles */\n\n#section-footer-revamp .address {\n text-align: center;\n}\n\n@media only screen and (min-width:768px) {\n #section-footer-revamp .address {\n text-align: left;\n }\n\n #section-footer-revamp .map-container {\n min-width: 250px;\n }\n\n .footerNavigationLinksLast {\n padding-right: 90px;\n }\n}\n\n@media only screen and (min-width:1022px) {\n #section-footer-revamp .map-container {\n min-width: 300px;\n }\n\n}\n\n.fiveColumnWrapper .oneColumnWrapper a,\n.fiveColumnWrapper .oneColumnWrapper .subColumnWrapper a {\n display: block;\n}"},"editableProperties":[],"children":[]}]}]},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"DOCS_TRANSFER_KEY":{"result":{"layout":{"elementType":2,"elementName":"documentationPageBody","displayName":"Documentation","viewProperties":{"searchBarPosition":1,"docsSectionLayout":2,"categorydisplayType":1,"isBackground":false},"children":[{"elementType":24,"elementName":"secondaryNavigation","displayName":"Secondary header","viewStyles":{},"viewProperties":{},"children":[{"elementType":14,"elementName":"breadcrumbElement","displayName":"Bread crummb","viewStyles":{},"viewProperties":{},"children":[]}]},{"elementType":25,"elementName":"docsSection","displayName":"Documentation section","viewStyles":{},"viewProperties":{},"children":[{"elementType":25,"elementName":"leftPanelContainerSection","displayName":"Left panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":19,"elementName":"inputTextboxElement","displayName":"Search box","viewStyles":{},"viewProperties":{},"children":[]},{"elementType":28,"elementName":"categoryTreeElement","displayName":"Category tree","viewStyles":{},"viewProperties":{"categoryNav":"tree","isBackground":"false"},"children":[]},{"elementType":17,"elementName":"poweredByLogo","displayName":"poweredByLogo","viewProperties":{},"children":[]}]},{"elementType":25,"elementName":"contentPanelContainerSection","displayName":"Content panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":25,"elementName":"articlePanelContainerSection","displayName":"Article panel","viewStyles":{},"viewProperties":{},"children":[{"elementType":26,"elementName":"articleHeaderElement","displayName":"Article header","viewStyles":{},"viewProperties":{"displayContributors":false,"displayDownloadPdfButton":true,"displayEstimatedReadingTime":true,"displaySummaryButton":false,"displayThemeSelection":true,"enableReadOutLoudInKb":false,"displayBreadcrumb":true},"children":[]},{"elementType":27,"elementName":"articleContentElement","displayName":"Article content","viewStyles":{},"viewProperties":{},"children":[]}]},{"elementType":25,"elementName":"rightPanelContainerSection","displayName":"Right panel","viewStyles":{},"viewProperties":{"hidden":false},"children":[]}]}]}]},"articleSettings":{"displayBreadcrumb":true,"displayAIAssistiveSearch":true,"displayArticleAttachments":true,"displayArticleTags":true,"displayComments":true,"displayContributors":false,"displayDownloadPdfButton":true,"displayEstimatedReadingTime":true,"displaySummaryButton":false,"displayTableOfContent":true,"displayRelatedArticles":true,"showPreviousNextNavigations":true,"showEmailShareButton":true,"showFacebookShareButton":true,"showLinkedinShareButton":true,"showTwitterShareButton":true,"displayThemeSelection":true,"displayFeedbackForm":true,"showPdfTemplatesInKb":true,"enableReadOutLoudInKb":false}},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"ARTICLE_BODY_TRANSFER_KEY":{"result":{"articleData":{"isFollowed":false,"followedByInheritance":false,"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","title":"FAQs","content":"","categoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","projectDocumentVersionId":"899fa9b5-b30e-404f-ac00-8df45c8454b2","versionNumber":0,"publicVersion":0,"latestVersion":0,"versionId":"3c8a2a01-435f-4844-b2bf-43c497a4b6fe","hidden":false,"settings":{"slug":"faqs","seoTitle":"FAQs","allowComments":true,"showTableOfContents":false,"tags":[],"articleStatusIndicator":0,"excludeFromSearch":false,"excludeFromAISearch":false,"excludeFromExternalSearch":false,"enableTwoWayLink":false,"contentType":2,"staleStatus":{"articleStaleStatus":0,"staleReason":"","expiredAt":"0001-01-01T00:00:00Z"},"enableArticleFeedback":true,"markAsDeprecated":false,"preProcessedArticleWordCount":0,"showOutlineView":false,"isAcknowledgementEnabled":false,"siteProtectionLevel":0},"isAutoSave":false,"articleStatus":0,"order":0,"authors":[],"createdAt":"2025-08-20T17:30:37.6520432Z","modifiedAt":"2025-08-20T17:30:37.6520432Z","contentType":0,"hiddenCategory":false,"contributors":[],"langCode":"en","enableRTL":false,"isFallBackContent":false,"translationOption":0,"languageSlugs":[{"code":"en","slug":"faqs"}],"categoryType":2,"isArticleTemplateContent":false,"articleIndex":{"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","title":"FAQs","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false},{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false}],"children":[{"id":"9ebde975-74e3-4746-b0b3-0b95798911ff","title":"What is Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager is a cloud service that enables you to securely generate, store, and use cryptographic keys and certificates, as well as passwords, API keys, tokens, or any blob of data. ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:11:08.605Z","lastPublishedDate":"2024-05-30T15:11:08.605Z","updatedAt":"2024-07-15T19:26:19.586Z","order":1,"childrenCount":0,"categoryType":0},{"id":"abedd2d7-07d4-48b7-8b07-93d1053f0f41","title":"Why should I use Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager ( DSM ) provides HSM-grade security at the cost of software. Fortanix DSM is built to be highly-available, fault-tolerant, and horizontally scalable. If you use HSMs for your encryption needs in your organization, y...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"why-should-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:35:05.639Z","lastPublishedDate":"2024-05-30T15:36:12.032Z","updatedAt":"2024-07-15T19:30:01.026Z","order":2,"childrenCount":0,"categoryType":0},{"id":"9e60abd4-3098-46dd-ad88-e439a71be90d","title":"How do I get started with Fortanix Data Security Manager?","description":" You can try out Fortanix-Data-Security-Manager ( DSM ) by signing up for a free account at \" https://\" . Once signed in, you can add your applications to use Fortanix DSM. Fortanix DSM is also available for on-premises deployment. For more infor...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-do-i-get-started-with-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:12:24.853Z","lastPublishedDate":"2025-07-24T09:52:22.1Z","updatedAt":"2025-07-24T09:52:22.1Z","order":3,"childrenCount":0,"categoryType":0},{"id":"4f1faa21-8e1b-4a29-8158-f49489f5aabc","title":"What is the default version of DSM installed in on-prem?","description":" Fortanix DSM does not have any software installed by default. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-default-version-of-dsm-installed-in-on-prem","firstPublishedDate":"2024-12-17T12:28:08.462Z","lastPublishedDate":"2024-12-17T12:28:08.462Z","updatedAt":"2024-12-17T12:28:08.462Z","order":4,"childrenCount":0,"categoryType":0},{"id":"dbc251d3-bfee-4342-aca1-8a8c7fbab247","title":"How does Fortanix Data Security Manager work?","description":" The Fortanix-Data-Security-Manager ( DSM ) allows you to manage, store, and use your keys and secrets. You can generate keys in Fortanix DSM or import your own keys. You can use these keys to perform cryptographic operations on your data that you ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-does-fortanix-data-security-manager-work","firstPublishedDate":"2024-05-30T15:14:02.95Z","lastPublishedDate":"2024-05-30T15:14:02.95Z","updatedAt":"2024-07-15T19:28:57.371Z","order":5,"childrenCount":0,"categoryType":0},{"id":"2f73eb62-e101-49af-8f8a-e2f76f684cf9","title":"What languages and interfaces are supported by Fortanix Data Security Manager?","description":" Fortanix-Data-Security-Manager ( DSM ) currently provides PKCS#11, KMIP, JCE, Microsoft CAPI, and CNG interfaces. Additionally, it provides a REST API interface to communicate with DSM for cryptography and key management operations. Fortanix DSM ...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:37:18.139Z","lastPublishedDate":"2024-10-22T16:26:39.395Z","updatedAt":"2024-10-22T16:26:39.395Z","order":6,"childrenCount":0,"categoryType":0},{"id":"e3843c06-22e2-4661-807c-b59a6d8593e7","title":"How will I be charged and billed for using Fortanix DSM as a Service?","description":" Fortanix DSM as a Service is available on a monthly subscription basis. Try a 30 Day Free Trial today. ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service","firstPublishedDate":"2024-05-30T15:10:29.028Z","lastPublishedDate":"2024-05-30T15:10:29.028Z","updatedAt":"2024-05-30T15:10:29.028Z","order":7,"childrenCount":0,"categoryType":0},{"id":"57834e64-5c87-4dd9-8594-6200d64be95b","title":"How to check the Fortanix DSM SaaS version?","description":" To know your Fortanix-Data-Security-Manager (DSM) SaaS version, you can query the sys/v1/version endpoint. For example: curl -v https://amer.smartkey.io/sys/v1/version To check the DSM SaaS version from the user interface (...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-fortanix-dsm-saas-version","firstPublishedDate":"2025-04-08T08:25:52.253Z","lastPublishedDate":"2025-04-08T08:25:52.253Z","updatedAt":"2025-04-08T08:25:52.253Z","order":8,"childrenCount":0,"categoryType":0},{"id":"b4f3f4ce-7ba5-4fd1-9c7e-57c6e1548ff5","title":"What algorithms are supported by Fortanix Data Security Manager?","description":" Please refer to the Algorithm Support page to view the algorithms supported by Fortanix-Data-Security-Manager . ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-algorithms-are-supported-by-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:03:16.392Z","lastPublishedDate":"2024-05-30T16:03:16.392Z","updatedAt":"2024-05-30T16:03:16.392Z","order":9,"childrenCount":0,"categoryType":0},{"id":"4f582d1e-559c-4e18-9f38-06884995e873","title":"What are the list of browsers that Fortanix DSM supports?","description":" The list of browsers that Fortanix DSM supports are based on a dynamic \" browserslist \" query, ( https://github.com/browserslist/browserslist ). The query is: > 0.5%, last 2 versions, Firefox ESR, not dead, not IE 11, not IE_Mob 11 Th...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-list-of-browsers-that-fortanix-dsm-supports","firstPublishedDate":"2024-05-30T15:42:25.314Z","lastPublishedDate":"2024-05-30T15:42:25.314Z","updatedAt":"2024-05-30T15:42:25.314Z","order":10,"childrenCount":0,"categoryType":0},{"id":"be287ad8-790b-4f4a-a77f-f78f1b005635","title":"What KMIP coverage do we provide?","description":" 1.0 KMIP The Key Management Interoperability Protocol (KMIP) is an extensible communication protocol that defines message formats for the manipulation of cryptographic keys on a key management server. This facilitates data encryption by simplifying...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-kmip-coverage-do-we-provide","firstPublishedDate":"2024-05-30T15:48:04.314Z","lastPublishedDate":"2025-07-24T09:51:27.922Z","updatedAt":"2025-07-24T09:51:27.922Z","order":11,"childrenCount":0,"categoryType":0},{"id":"da1bf994-4fa1-46b2-beb7-a881fb359392","title":"Is it possible to talk to Fortanix DSM using PyKMIP?","description":" Yes, Python implementation of the Key Management Interoperability Protocol (KMIP) can interact with Fortanix-Data-Security-Manager (DSM). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-it-possible-to-talk-to-fortanix-dsm-using-pykmip","firstPublishedDate":"2024-11-05T04:05:02.116Z","lastPublishedDate":"2024-11-05T04:05:02.116Z","updatedAt":"2024-11-05T04:05:02.116Z","order":12,"childrenCount":0,"categoryType":0},{"id":"aa320a2d-38ce-4610-9057-6aa695ca60a6","title":"What is Key Check Value for a Fortanix DSM security object ?","description":" The Key Checksum Value (KCV) is the checksum of a cryptographic key. It is used to validate the key integrity or match the keys without knowing their actual values. ","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-key-check-value-for-a-fortanix-dsm-security-object","firstPublishedDate":"2025-04-08T08:51:48.292Z","lastPublishedDate":"2025-04-29T04:25:57.498Z","updatedAt":"2025-04-29T04:25:57.498Z","order":13,"childrenCount":0,"categoryType":0},{"id":"d3a4bb75-b16a-4151-8439-695076bc18fe","title":"Can Fortanix do secrets lifecycle management?","description":" Fortanix-Data-Security-Manager (DSM) can help you import and update secrets. DSM does not currently support the creation and rotation of secrets. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-do-secrets-lifecycle-management","firstPublishedDate":"2024-11-05T04:18:02.136Z","lastPublishedDate":"2024-11-05T04:18:02.136Z","updatedAt":"2024-11-05T04:18:02.136Z","order":14,"childrenCount":0,"categoryType":0},{"id":"d6d6b509-18fd-4b90-925e-5bb3bbd1e2e4","title":"Does a Fortanix DSM application search for secrets that are only created by it?","description":" A Fortanix DSM application (app) can search all secrets within the groups it has access to, not only the secrets it created. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-a-fortanix-dsm-application-search-secrets-which-are-only-created-by-it-in-the-kms","firstPublishedDate":"2025-05-20T11:43:33.279Z","lastPublishedDate":"2025-05-20T11:43:33.279Z","updatedAt":"2025-05-20T11:43:33.279Z","order":15,"childrenCount":0,"categoryType":0},{"id":"c654000e-56f1-41c1-9061-2d18dd4649cf","title":"Can I add a Quorum approval policy for system-level log management changes in Fortanix Data Security Manager?","description":" Yes, you can set up an account-level Quorum approval policy for logging system-level log management changes. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-i-add-a-quorum-approval-policy-for-system-level-log-management-changes-in-fortanix-data-security-manager","firstPublishedDate":"2025-06-09T06:49:19.906Z","lastPublishedDate":"2025-06-09T06:49:19.906Z","updatedAt":"2025-06-09T06:49:19.906Z","order":16,"childrenCount":0,"categoryType":0},{"id":"c2df6658-e66b-4991-b659-a12651542429","title":"What is the difference between Invite User and Create New User API","description":" In Fortanix Data Security Manager (DSM), the “Invite User” method is the recommended way to create users in any DSM environment. The “Create User” API is intended for the user sign-up flow, which is typically disabled in most clusters and not usable...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-difference-between-invite-user-and-create-new-user-api","firstPublishedDate":"2025-07-01T08:23:14.914Z","lastPublishedDate":"2025-07-01T08:23:14.914Z","updatedAt":"2025-07-01T08:23:14.914Z","order":17,"childrenCount":0,"categoryType":0},{"id":"1a1f8ce5-ae19-4eef-868c-e4af585eb465","title":"How to download all secrets?","description":" You can upload one or multiple secrets into a single secret object in Fortanix DSM. If you have multiple secret objects, you can programmatically use the /crypto/v1/keys/exports API in a loop to export secrets from a specific DSM group or account....","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-download-all-secrets","firstPublishedDate":"2024-12-17T13:12:54.689Z","lastPublishedDate":"2025-01-28T08:21:50.817Z","updatedAt":"2025-01-28T08:21:50.817Z","order":18,"childrenCount":0,"categoryType":0},{"id":"381f6783-8e9e-4f46-bc2c-1d6e03dac202","title":"Can an account in Fortanix DSM be a tenant account?","description":" Fortanix DSM supports the creation of multiple tenant accounts within a cluster. Each tenant account is a cryptographically isolated entity and can be used for different purposes, such as a tenant per line of business or a tenant per technology. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-an-account-in-dsm-be-a-tenant-account","firstPublishedDate":"2025-03-12T08:06:06.773Z","lastPublishedDate":"2025-03-12T08:06:06.773Z","updatedAt":"2025-03-12T08:06:06.773Z","order":19,"childrenCount":0,"categoryType":0},{"id":"47464be3-6fb5-40d4-aa5e-20208ce951bd","title":"Does Fortanix DSM support PKCS#12 ?","description":" Yes, Fortanix-Data-Security-Manager (DSM) supports PKCS#12 (PFX) files, which contain private keys, certificates, and associated certificate chains. However, it does not support uploading PFX files through the user interface (UI) or REST API. The ...","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-support-pkcs12","firstPublishedDate":"2024-11-05T03:57:41.559Z","lastPublishedDate":"2024-12-17T12:17:44.044Z","updatedAt":"2024-12-17T12:17:44.044Z","order":20,"childrenCount":0,"categoryType":0},{"id":"547db959-69e0-4b79-adcd-35a33dad4f21","title":"Does Fortanix DSM support the Certificate Management Protocol (CMP)?","description":" No, Fortanix does not support Certificate Management Protocol (CMP). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-support-the-certificate-management-protocol-cmp","firstPublishedDate":"2024-11-05T04:02:18.045Z","lastPublishedDate":"2024-11-05T04:02:18.045Z","updatedAt":"2024-11-05T04:02:18.045Z","order":21,"childrenCount":0,"categoryType":0},{"id":"830c2742-369f-4731-b515-e22233581cb3","title":"Can I import keys into Fortanix Data Security Manager?","description":" Yes, keys can be imported into Fortanix-Data-Security-Manager (DSM) using any of the supported interfaces. For more information on how to import a key into Fortanix DSM, refer to the User's Guide: Fortanix Data Security Manager Key Lifecycle...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-i-import-keys-into-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:56:09.058Z","lastPublishedDate":"2025-07-24T09:50:21.809Z","updatedAt":"2025-07-24T09:50:21.809Z","order":22,"childrenCount":0,"categoryType":0},{"id":"05b08c8d-dd2b-479a-9f0c-d5db13d1a508","title":"What is application-level encryption in Fortanix DSM?","description":" Business-critical applications can integrate with Fortanix Data Security Manager (DSM) using legacy cryptographic interfaces such as PKCS#11, CNG, and JCE, or through the native Fortanix DSM RESTful interface. This enables the encryption of sensitiv...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-application-level-encryption-in-fortanix-dsm","firstPublishedDate":"2025-07-01T08:54:15.556Z","lastPublishedDate":"2025-07-01T08:54:15.556Z","updatedAt":"2025-07-01T08:54:15.556Z","order":23,"childrenCount":0,"categoryType":0},{"id":"935c9961-4c19-4446-8057-e340e368c685","title":"What is MFA device attestation, self-attestation, and the attestation ID, response, and type? What does the binary response from a U2F device include?","description":" In Fortanix Data Security Manager (DSM), MFA (Multi-Factor Authentication) device attestation is the process of validating the authenticity and integrity of a hardware authenticator. During attestation, the device provides an attestation object , w...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-mfa-device-attestation-including-self-attestation-and-the-attestation-id-response-and-type-what-does-the-binary-response-from-a-u2f-device","firstPublishedDate":"2025-07-01T08:31:58.413Z","lastPublishedDate":"2025-07-01T08:31:58.413Z","updatedAt":"2025-07-01T08:31:58.413Z","order":24,"childrenCount":0,"categoryType":0},{"id":"8c261fc5-e811-4583-a638-eda9ae5a6913","title":"Can you change the non-exportable key attribute to export?","description":" No, once a key is marked as non-exportable, it cannot be changed to exportable. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-you-change-the-non-export-key-attribute-to-export","firstPublishedDate":"2024-12-17T13:15:04.377Z","lastPublishedDate":"2024-12-17T13:15:04.377Z","updatedAt":"2024-12-17T13:15:04.377Z","order":25,"childrenCount":0,"categoryType":0},{"id":"e008c3c5-ce14-4c15-9b1b-5d9495ca8d0c","title":"Which key will be created on Fortanix DSM in the MinIO integration?","description":" The MinIO KEK server stores OPAQUE key as the root of trust in Fortanix DSM. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"which-key-will-be-created-on-fortanix-dsm-in-the-minio-integration","firstPublishedDate":"2024-10-21T06:14:38.545Z","lastPublishedDate":"2024-10-21T06:14:38.545Z","updatedAt":"2024-10-21T06:14:38.545Z","order":26,"childrenCount":0,"categoryType":0},{"id":"3e01b8af-8a67-4269-8d4b-b15dee07fe61","title":"What kind of policies can be applied to Secret security objects in Fortanix DSM?","description":" There is no automated rotation feature currently available for secrets in Fortanix-Data-Security-Manager (DSM). However, you can set activation and deactivation dates for secrets, and use the Key metadata policy at the group level to ensu...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-kind-of-policies-can-be-applied-to-secret-security-objects-in-fortanix-dsm","firstPublishedDate":"2025-04-08T08:50:10.294Z","lastPublishedDate":"2025-04-08T08:50:10.294Z","updatedAt":"2025-04-08T08:50:10.294Z","order":27,"childrenCount":0,"categoryType":0},{"id":"89451d2f-3a37-463e-b711-3ae9e12791bb","title":"How to restart an sdkms-ui service on a hardware cluster?","description":" The sdkms-ui is an integrated service in the Fortanix DSM cluster. You must do a rolling restart of the sdkms-ui service from the DSM command line interface (CLI), or you can run the following command one by one on each node: kubectl delete pod sd...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-restart-an-sdkms-ui-service-on-a-hardware-cluster","firstPublishedDate":"2024-10-21T06:07:01.706Z","lastPublishedDate":"2024-10-21T06:07:01.706Z","updatedAt":"2024-10-21T06:07:01.706Z","order":28,"childrenCount":0,"categoryType":0},{"id":"b9f9579e-631e-488a-a1a3-f961e1f2c39d","title":"Can Fortanix DSM API retrieve more than 1001 account information?","description":" Yes, you can use the Fortanix DSM GET /sys/v1/accounts API to retrieve details for more than 1001 accounts by implementing pagination to fetch information beyond the initial 1,001 entries. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-dsm-api-retrieve-more-than-1001-account-information","firstPublishedDate":"2025-05-20T11:39:31.791Z","lastPublishedDate":"2025-05-20T11:39:31.791Z","updatedAt":"2025-05-20T11:39:31.791Z","order":29,"childrenCount":0,"categoryType":0},{"id":"c75b0822-2129-46f6-865b-18599454b4b3","title":"How to check the crypto operations by transient keys in DSM?","description":" Currently, cryptographic operations of transient keys in Fortanix-Data-Security-Manager (DSM) are not logged. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-crypto-operations-by-transient-keys-in-dsm","firstPublishedDate":"2024-11-05T04:23:50.747Z","lastPublishedDate":"2024-11-05T04:23:50.747Z","updatedAt":"2024-11-05T04:23:50.747Z","order":30,"childrenCount":0,"categoryType":0},{"id":"64145265-5c0f-4602-98f8-32af0f2c3644","title":"Is there an option to expire a security object at a specific date or after a certain time period?","description":" Fortanix-Data-Security-Manager ( DSM ) does support the expiry of security objects, including SECRET type. You can set the expiry for a future date or you can expire an object immediately. On expiry/deactivation, the object goes into the \"Deact...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period","firstPublishedDate":"2024-05-30T15:44:57.551Z","lastPublishedDate":"2024-05-30T15:44:57.551Z","updatedAt":"2024-05-30T15:44:57.551Z","order":31,"childrenCount":0,"categoryType":0},{"id":"6108dcf5-861e-4b06-bdd1-129959f36b10","title":"What is cluster attestation and why should I use it? (on-prem only)","description":" Customers can enable attestation of Fortanix-Data-Security-Manager ( DSM ) installed on Intel ® Software Guard Extension (SGX) enabled FX2200 appliances and Azure Confidential Computing Virtual Machines (VM). For more information about why and ...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only","firstPublishedDate":"2024-05-30T15:52:09.647Z","lastPublishedDate":"2025-07-24T09:48:55.999Z","updatedAt":"2025-07-24T09:48:55.999Z","order":32,"childrenCount":0,"categoryType":0},{"id":"1239ebe1-3d83-4789-9f99-777a219771e8","title":"What key management features are available in Fortanix Data Security Manager?","description":" The following key management features are provided by Fortanix-Data-Security-Manager : Create symmetric and asymmetric keys Import your own keys Derive new keys from existing keys Role-based access control to determine which users, grou...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-key-management-features-are-available-in-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:02:20.981Z","lastPublishedDate":"2024-05-30T16:02:20.981Z","updatedAt":"2024-07-15T19:38:13.552Z","order":33,"childrenCount":0,"categoryType":0},{"id":"482a71b6-e41b-4c04-a532-b3f3fee9a76c","title":"What does unregistered user mean in Fortanix DSM?","description":" An unregistered user refers to someone who has not been added to Fortanix Data Security Manager (DSM), either by invitation or manual creation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-does-unregistered-user-mean-in-fortanix-dsm","firstPublishedDate":"2025-07-01T08:41:41.802Z","lastPublishedDate":"2025-07-01T08:41:41.802Z","updatedAt":"2025-07-01T08:41:41.802Z","order":34,"childrenCount":0,"categoryType":0},{"id":"84690147-6845-4ecd-aeaf-b72d01519ceb","title":"Why is the FPE policy not set for a key?","description":" When a tokenization key is created, a Format-Preserving Encryption (FPE) policy is set by default. This policy is not applied to a normal AES key but only to a tokenization key. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"why-is-the-fpe-policy-not-set-for-a-key","firstPublishedDate":"2025-03-12T07:52:49.125Z","lastPublishedDate":"2025-03-12T07:52:49.125Z","updatedAt":"2025-03-12T07:52:49.125Z","order":35,"childrenCount":0,"categoryType":0},{"id":"521879ed-bd6b-4c4b-bd90-7cd45e39cb17","title":"Where is encryption and decryption done if I use Fortanix Data Security Manager?","description":" The encryption and decryption operations are done inside an Intel® SGX enclave created by Fortanix-Data-Security-Manager . ","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:57:55.513Z","lastPublishedDate":"2024-05-30T15:57:55.513Z","updatedAt":"2024-05-30T15:57:55.513Z","order":36,"childrenCount":0,"categoryType":0},{"id":"438454cc-cc59-4dea-aa56-67e72a0d3282","title":"Where do my keys live if I use Fortanix Data Security Manager?","description":" The keys, as well as other types of secrets stored in Fortanix-Data-Security-Manager ( DSM ), are held in an encrypted database when not in use. When in use, the keys are only available inside a secure enclave created using Intel® SGX technology, ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T15:59:35.746Z","lastPublishedDate":"2024-05-30T15:59:35.746Z","updatedAt":"2024-07-15T19:36:42.634Z","order":37,"childrenCount":0,"categoryType":0},{"id":"8b391f3d-a8a9-42de-9e78-414f16ae1858","title":"What cryptographic operations are available in Fortanix Data Security Manager?","description":" The following cryptographic operations are provided by Fortanix-Data-Security-Manager : Generation of symmetric (AES, DES, 3DES, HMAC) and asymmetric (RSA, EC) keys Encryption and decryption using symmetric and asymmetric keys Sign and ver...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager","firstPublishedDate":"2024-05-30T16:01:31.304Z","lastPublishedDate":"2024-05-30T16:01:31.304Z","updatedAt":"2024-05-30T16:01:31.304Z","order":38,"childrenCount":0,"categoryType":0},{"id":"cb10a231-655b-4fc4-ac3a-9400cc2956a3","title":"What is tokenization transaction per second in DSM?","description":" The Tokenization transaction in Fortanix-Data-Security-Manager (DSM) per second is the number of security object tokenization operations completed in one second in DSM or Webservice. For more information about the latest performance statistics f...","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-tokenization-transaction-per-second-in-dsm","firstPublishedDate":"2024-11-05T09:57:51.268Z","lastPublishedDate":"2025-07-24T09:48:21.42Z","updatedAt":"2025-07-24T09:48:21.42Z","order":39,"childrenCount":0,"categoryType":0},{"id":"62877012-d2ee-4d62-a168-861cb4e4e17b","title":"Can Fortanix employees access my keys?","description":" Fortanix does not have access to customer keys. The keys, including the key material and the related metadata, are encrypted both in use and at rest using an encryption key which is derived by the Fortanix-Data-Security-Manager process and the Int...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-employees-access-my-keys","firstPublishedDate":"2024-05-30T15:58:44.369Z","lastPublishedDate":"2024-05-30T15:58:44.369Z","updatedAt":"2024-07-15T19:35:49.951Z","order":40,"childrenCount":0,"categoryType":0},{"id":"da50f81a-7c42-4b77-b2e4-33c3d64bd748","title":"What are the differences between the two types of objects we can use to store sensitive information, OPAQUE and SECRET?","description":" The difference between an Opaque object and a Secret object is as follows: When you do a GET on an Opaque object, you get its value along with metadata. For all other types, the value is not returned. You can get the value of the Secret object...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret","firstPublishedDate":"2024-05-30T15:39:38.809Z","lastPublishedDate":"2024-05-30T15:39:38.809Z","updatedAt":"2024-07-15T19:31:36.784Z","order":41,"childrenCount":0,"categoryType":0},{"id":"e61313c4-31f3-4e36-87d2-1dccac9c69d4","title":"What has Fortanix DSM done to mitigate UI slowdown if an account contains many (> 700) very large (>300kb) security objects?","description":" Fortanix-Data-Security-Manager ( DSM ) has resolved this issue by limiting the number of security objects that can be displayed on a page to 100. If there are more than 100 security objects in an account, searching and sorting functionality is ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects","firstPublishedDate":"2024-05-30T15:49:08.787Z","lastPublishedDate":"2024-05-30T15:49:08.787Z","updatedAt":"2024-07-15T19:33:38.201Z","order":42,"childrenCount":0,"categoryType":0},{"id":"d6c695c1-e2d3-4819-ad61-3ee27d875045","title":"FAQs - Fortanix Data Security Manager UI","description":" 1. What are the default Fortanix Data Security Manager accounts and how do I delete or disable them? Users do not have any accounts by default. A user must either create an account or get invited to an account. A System Administrator can disa...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"faqs-fortanix-data-security-manager-ui","firstPublishedDate":"2024-05-30T15:45:36.311Z","lastPublishedDate":"2024-05-30T15:45:36.311Z","updatedAt":"2024-07-15T19:32:26.502Z","order":43,"childrenCount":0,"categoryType":0},{"id":"549d60b9-dca2-4744-8591-c8e844a772ba","title":"What are Transient keys?","description":" Transient keys are short-lived keys. For example, if you need to do a key agreement, you encrypt with the agreed key, and then throw away the agreed key. A benefit of such a key is that no other user/app can see a transient key, only its creator ca...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-transient-keys","firstPublishedDate":"2024-05-30T15:50:36.198Z","lastPublishedDate":"2024-05-30T15:50:36.198Z","updatedAt":"2024-05-30T15:50:36.198Z","order":44,"childrenCount":0,"categoryType":0},{"id":"ad32a763-611c-414f-bafd-26324f1da43a","title":"How to check the subscription type for a DSM on-premises deployment?","description":" Subscription type can be seen on home page of the Fortanix-Data-Security-Manager (DSM) account or from the DSM System Administration dashboard. However, on-premises systems are licensed based on application (app) credits. Please reach out to the r...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-check-the-subscription-type-for-a-dsm-on-premises-deployment","firstPublishedDate":"2024-11-05T04:08:30.7Z","lastPublishedDate":"2024-11-05T04:08:30.7Z","updatedAt":"2024-11-05T04:08:30.7Z","order":45,"childrenCount":0,"categoryType":0},{"id":"88cae2c0-a1aa-40f9-bc7d-338fee2c8b69","title":"How does Fortanix Data Security Manager compare with AWS KMS and Azure Key Vault?","description":" Fortanix-Data-Security-Manager ( DSM ) is the first cloud service built using the Intel® SGX technology. This enables Fortanix DSM to provide HSM-grade security in software. Fortanix DSM is distributed software, written to scale on-demand, and is ...","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault","firstPublishedDate":"2024-05-30T15:54:54.422Z","lastPublishedDate":"2024-05-30T15:54:54.422Z","updatedAt":"2024-05-30T15:54:54.422Z","order":46,"childrenCount":0,"categoryType":0},{"id":"1347ee84-3e6d-4a5a-a8f2-2449474c38a3","title":"Does Fortanix support Cassandra encryption using DSM?","description":" Yes Fortanix supports Cassandra encryption using Fortanix-Data-Security-Manager (DSM). For more information about the integration steps, refer to Using Fortanix Data Security Manager with Cassandra TDE . ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-support-cassandra-encryption-using-dsm","firstPublishedDate":"2024-11-05T04:01:11.353Z","lastPublishedDate":"2025-07-24T09:46:41.298Z","updatedAt":"2025-07-24T09:46:41.298Z","order":47,"childrenCount":0,"categoryType":0},{"id":"b5bec9f9-c4bb-4359-9f85-51686c374799","title":"What is the difference between Lua and Rust programming language in Fortanix Data Security Manager?","description":" Fortanix DSM is developed using the Rust programming language, while Lua is used to develop its plugins. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-difference-between-lua-and-rust-programming-language-in-fortanix-data-security-manager","firstPublishedDate":"2025-06-09T08:13:42.896Z","lastPublishedDate":"2025-06-09T08:13:42.896Z","updatedAt":"2025-06-09T08:13:42.896Z","order":48,"childrenCount":0,"categoryType":0},{"id":"0aad2e42-52bd-49dd-84f8-284cc5410dab","title":"Where to find CA certs to run Fortanix DSM Accelerator Webservice?","description":" CA certs can be downloaded from the Fortanix-Data-Security-Manager (DSM) URL Certificate to which the DSM Accelerator Webservice connects. It is usually available if you click the padlock icon next to the DSM URL. From the signed installed certs,...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-to-find-ca-certs-to-run-fortanix-dsm-accelerator-webservice","firstPublishedDate":"2024-11-05T04:22:19.395Z","lastPublishedDate":"2025-04-10T06:44:28.611Z","updatedAt":"2025-04-10T06:44:28.611Z","order":49,"childrenCount":0,"categoryType":0},{"id":"636ce56b-21fa-4ea5-8e8c-2ff0d93adee3","title":"What are the bandwidth network requirements when deploying Fortanix DSM in multiple sites?","description":" The minimum bandwidth network requirement when deploying Fortanix-Data-Security-Manager (DSM) in multiple sites is 1G for site to site connectivity with a 10% commit. Ideal network bandwidth is 10G. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-bandwidth-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","firstPublishedDate":"2024-11-05T04:11:30.408Z","lastPublishedDate":"2024-11-05T04:11:30.408Z","updatedAt":"2024-11-05T04:11:30.408Z","order":50,"childrenCount":0,"categoryType":0},{"id":"70e57633-f61b-42f7-afc4-62e56d57075d","title":"What are the latency network requirements when deploying Fortanix DSM in multiple sites?","description":" The maximum latency network requirements when deploying Fortanix-Data-Security-Manager (DSM) in multiple sites are 100 milliseconds or less, ideally 60 milliseconds. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-are-the-latency-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","firstPublishedDate":"2024-11-05T04:14:45.496Z","lastPublishedDate":"2024-11-05T04:15:09.903Z","updatedAt":"2024-11-05T04:15:09.903Z","order":51,"childrenCount":0,"categoryType":0},{"id":"3228bd22-b713-465f-b720-02f01ffce011","title":"Could a failed power supply even though indicator light is green be a firmware issue in DSM?","description":" This is not likely a firmware issue. If you notice such behavior, you should open a support ticket with Fortanix support ( support@fortanix.com ) for further investigation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"could-a-failed-power-supply-even-though-indicator-light-is-green-be-a-firmware-issue","firstPublishedDate":"2024-11-05T04:48:01.483Z","lastPublishedDate":"2024-11-05T09:58:44.345Z","updatedAt":"2024-11-05T09:58:44.345Z","order":52,"childrenCount":0,"categoryType":0},{"id":"fe5365f6-82b2-4860-a3f9-3ebc23faf824","title":"LMS Keys - FAQs","description":" 1.0 Frequently Asked Questions What are Fortanix's limitations on LMS Key tree size? Fortanix LMS implementation is a two-level Hierarchical Signature System (HSS) whose heights are a list of heights [ h₁ , h₂ ] respectively. Where h...","authors":[{"id":"fd17a2e9-1887-4318-93e1-6b6d785f49e8","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"Krishnamoorthy","lastName":"Hegde","uniqueUserName":"krishnamoorthyhegde","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"krishnamoorthy.hegde@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3d8010ba411417392ae0e74abdba3cf2?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=WHTOL4kfjK8v%2FUE%2FOf69u151R%2BhwajeZF4uarNQ9bVU%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false},{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"lms-keys-faqs","firstPublishedDate":"2024-06-21T14:44:22.262Z","lastPublishedDate":"2025-03-12T07:54:57.41Z","updatedAt":"2025-03-12T07:54:57.41Z","order":53,"childrenCount":0,"categoryType":0},{"id":"f83febaa-a9d5-4f3f-85b0-65a479777807","title":"Where can I find the IPMI logs?","description":" The Intelligent Platform Management Interface ( IPMI) logs can be found in the IPMI console under Logs and Reports. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"where-can-i-find-the-ipmi-logs","firstPublishedDate":"2025-03-12T07:49:55.702Z","lastPublishedDate":"2025-03-12T07:49:55.702Z","updatedAt":"2025-03-12T07:49:55.702Z","order":54,"childrenCount":0,"categoryType":0},{"id":"47e94fc6-7f82-4e71-b0b6-a400bbd675fd","title":"Can Fortanix protect against quantum computing?","description":" Yes, Fortanix supports new algorithms certified by NIST against Post-Quantum Computing (PQC). ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"can-fortanix-protect-against-quantum-computing","firstPublishedDate":"2024-12-17T12:45:37.559Z","lastPublishedDate":"2024-12-17T12:45:37.559Z","updatedAt":"2024-12-17T12:45:37.559Z","order":55,"childrenCount":0,"categoryType":0},{"id":"8bb4b284-066f-49ff-ae33-76c07952e923","title":"What is the Fortanix security vulnerability reporting process?","description":" To report any security vulnerability, please send in the details to support@fortanix.com and it will be forwarded to the necessary team for investigation. ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"what-is-the-fortanix-security-vulnerability-reporting-process","firstPublishedDate":"2024-11-05T04:19:25.58Z","lastPublishedDate":"2024-11-05T04:19:25.58Z","updatedAt":"2024-11-05T04:19:25.58Z","order":56,"childrenCount":0,"categoryType":0},{"id":"8bc23b9d-1eb4-422b-8be3-3c27605d35ad","title":"How to get the authorized redirect URI for Workspace CSE?","description":" The redirect URI for Google Workspace CSE can be found at https://support.google.com/a/answer/10743588#zippy=%2Coption-to-connect-to-your-idp-using-a-well-known-file under \"Step 2: Create client IDs for CSE\". ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-get-the-authorized-redirect-uri-for-workspace-cse","firstPublishedDate":"2024-12-17T07:37:55.511Z","lastPublishedDate":"2024-12-17T07:37:55.511Z","updatedAt":"2024-12-17T07:37:55.511Z","order":57,"childrenCount":0,"categoryType":0},{"id":"875296fa-8d59-459f-bc7c-2a800130418d","title":"How to perform Cassandra replication in Fortanix DSM?","description":" Run the following command on Fortanix DSM CLI to get the current replication details: sudo -E kubectl exec cassandra-0 -- cqlsh -e \"select * from system_schema.keyspaces where keyspace_name ='public'\"; ","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"how-to-perform-cassandra-replication-in-fortanix-dsm","firstPublishedDate":"2025-03-12T08:02:36.068Z","lastPublishedDate":"2025-03-12T08:40:34.802Z","updatedAt":"2025-03-12T08:40:34.802Z","order":58,"childrenCount":0,"categoryType":0},{"id":"b7dbd4bd-bcc7-4108-b0ad-b55bdd176d4d","title":"Your Hardware Enablement Stack (HWE) is supported until April 2025. What does this mean?","description":" When you log in to Fortanix DSM you see the message “ Your Hardware Enablement Stack (HWE) is supported until April 2025”. This allows for long-term support (LTS) releases to take advantage of hardware compatibility and performance improvements with...","authors":[{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"your-hardware-enablement-stack-hwe-is-supported-until-april-2025-what-does-this-mean","firstPublishedDate":"2024-12-17T09:49:35.36Z","lastPublishedDate":"2024-12-17T09:49:35.36Z","updatedAt":"2024-12-17T09:49:35.36Z","order":59,"childrenCount":0,"categoryType":0},{"id":"fc14710f-ede8-4490-95d2-6bafd0b77755","title":"Is Fortanix ISO 27001 certified?","description":" Yes, Fortanix is ISO 27001 certified. For more information about the certification, refer to Fortanix Trust Center . ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"is-fortanix-iso-27001-certified","firstPublishedDate":"2024-12-17T13:18:46.246Z","lastPublishedDate":"2025-07-24T09:45:26.772Z","updatedAt":"2025-07-24T09:45:26.772Z","order":60,"childrenCount":0,"categoryType":0},{"id":"4a364cfa-95b5-41dc-9e9f-ea3133bf4876","title":"Does Fortanix DSM have any hardened OS best practices?","description":" Fortanix follows the Center for Internet Security (CIS) Ubuntu Linux 24.04 Long Term Support (LTS) Benchmark v1.0.0. ","authors":[{"id":"7e725a20-868e-45ec-b239-8f60faaf727c","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"shivani","lastName":"garg","uniqueUserName":"shivani-garg","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"shivani.garg@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/3347b1f968fe5b896ab2600518bef8e9?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=aDau5QQWshDgMAnQuYoysyldq0indOAY%2B%2B2WCmf3F6A%3D","isEnterpriseUser":false},{"id":"fd8a2106-c109-4778-accd-4885d6d99577","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"nithya","lastName":"ramakrishnan","uniqueUserName":"nithya-ramakrishnan","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"nithya.ramakrishnan@fortanix.com","profileLogoUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/4d0e0618a57d5b65fc0d24c17178ddc7?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=TZst1ehdm%2F%2BDhJISAl7jThQ%2FqsfPHQSEaSkXoxi6njw%3D","isEnterpriseUser":false}],"documentationType":1,"slug":"does-fortanix-dsm-have-any-hardened-os-best-practices","firstPublishedDate":"2025-03-12T08:17:43.689Z","lastPublishedDate":"2025-07-09T09:06:13.54Z","updatedAt":"2025-07-09T09:06:13.54Z","order":61,"childrenCount":0,"categoryType":0},{"id":"061acbab-e538-4730-95ba-c114408a8cf9","title":"Security","authors":[{"id":"6a3a52d0-52dd-4b33-bf9a-d9bac1aea06f","customerId":"00000000-0000-0000-0000-000000000000","status":0,"firstName":"d360migrationteam","lastName":"","uniqueUserName":"d360migrationteam","isUserExistinCurrentProject":true,"initialTourShown":false,"isActive":false,"emailId":"d360migrationteam@kovai.co","profileLogoUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","profileLogoCDNUrl":"https://www.gravatar.com/avatar/42dd7e31b57fc11d9c47590e32471db5?sv=2022-11-02&st=2025-08-20T17%3A30%3A37Z&se=2025-08-20T17%3A50%3A37Z&sr=b&sp=r&sig=FsZpdGfxK3xjXBW5X5xhM6HK6tnESp5%2BjFW5OJMZ4ZE%3D","isEnterpriseUser":false}],"documentationType":2,"slug":"security","updatedAt":"0001-01-01T00:00:00","order":62,"childrenCount":2,"categoryType":2}]},"aiSummaryData":{"isSummaryEligible":false,"isSummaryCreditAvailable":false},"protectionLevel":0,"articleType":0,"operationType":0,"isStarred":false,"preprocessedArticleContentWordCount":0,"isArticleContentCompressed":false,"isGitHubArticle":false,"repoId":0,"isDefaultGitHubPath":false,"isCategory":true,"languageVersionId":"e9721964-e18b-4ec5-82af-fd95c931c045","changeVersionForInternalLink":false,"isAcknowledged":false,"acknowledgedDate":"0001-01-01T00:00:00","isShowAcknowledgementInfo":false,"isBlockEditor":false,"isMarkdownEditor":true,"isBlockEditorSetting":true,"versionCreatedAt":"0001-01-01T00:00:00","hasConditionalBlock":false,"unpublishedVersion":0,"aiArticleCreationStatus":0,"readingTime":0,"isPreview":false},"categories":{"isFollowed":false,"followedByInheritance":false,"order":0,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f04f777e-8870-4a58-8192-2f4bc8c478ac","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"e32f4db3-f90a-4bd4-afdd-caf50628a506","order":1,"documentationType":1,"children":[],"parentCategoryId":"f04f777e-8870-4a58-8192-2f4bc8c478ac","slug":"fortanix-support-sign-up-process","title":"Fortanix Support Sign Up Process","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"slug":"getting-started","title":"Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"1c660f27-d8b4-4f43-92c2-5670cb490388","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"0ed190d7-be57-4b2b-94aa-181a06f2c985","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f5b85bd8-3872-4a95-b483-b4b6b682fc71","order":1,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-overview","title":"Fortanix DSM SaaS Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"59268374-f3c1-4c46-ab0c-ad5f53c351f9","order":2,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"why-fortanix-dsm-saas","title":"Why Fortanix DSM SaaS?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b36c6fb0-ac62-48e4-8543-4c9ca044da80","order":3,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-does-fortanix-dsm-saas-offer","title":"What does Fortanix DSM SaaS Offer?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9a807513-8631-4a0f-82b9-4bacd4a953a2","order":4,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-does-fortanix-dsm-saas-work","title":"How does Fortanix DSM SaaS Work?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3a1b51d8-44ae-4f82-8ed6-c4d503d35760","order":5,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-will-i-be-billed","title":"How will I be Billed?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"06ab2f06-32f3-40ec-ab31-7c73bd1028a5","order":6,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-global-availability-map","title":"Fortanix DSM SaaS Global Availability Map","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cec839a2-3d31-4867-ab67-fe727d854a35","order":7,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"scalability","title":"Scalability","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d9102cc1-046e-4703-ae2d-07a98715206c","order":8,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-architecture","title":"Fortanix DSM SaaS Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88e3694b-2139-4a6f-9060-8843263fb99d","order":9,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-support","title":"Fortanix Support","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1c18567-bd7e-40c4-9a33-d6448aa00c06","order":10,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-are-the-fortanix-dsm-saas-account-states","title":"What are the Fortanix DSM SaaS Account States?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47e6b72d-6ba8-492f-b8ad-76a3fb7f426d","order":11,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"what-is-the-lifecycle-of-a-fortanix-dsm-saas-trial-account","title":"What is the lifecycle of a Fortanix DSM SaaS Trial Account?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"338fd1d0-1a18-442c-87b3-402bf7d059bf","order":12,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"how-do-i-check-the-fortanix-dsm-saas-status-in-real-time","title":"How do I Check the Fortanix DSM SaaS Status in Real-time?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1cad39f-2ec2-435d-8bc6-b62ee804a1c0","order":13,"documentationType":1,"children":[],"parentCategoryId":"0ed190d7-be57-4b2b-94aa-181a06f2c985","slug":"fortanix-dsm-saas-homepage","title":"Fortanix DSM SaaS Homepage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"about-fortanix-dsm-saas","title":"About Fortanix DSM SaaS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"68cb16ce-e258-4716-ad03-04bbe04cb292","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ec78cf1a-95da-4363-a18a-bdb49c81971c","order":1,"documentationType":1,"children":[],"parentCategoryId":"68cb16ce-e258-4716-ad03-04bbe04cb292","slug":"fortanix-data-security-manager-quickstart","title":"Fortanix Data Security Manager - Quickstart","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"quickstart","title":"Quickstart","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7ebf8863-d216-4c02-b5da-814befbcb1bf","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a2ec0e3-9074-42d2-8af5-d8127e2a29c3","order":1,"documentationType":1,"children":[],"parentCategoryId":"7ebf8863-d216-4c02-b5da-814befbcb1bf","slug":"definitions","title":"Definitions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"overview-and-definitions","title":"Overview and Definitions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"39d0253b-d378-44c2-acd7-8196a27b54b3","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9907a655-633d-406b-8813-f4e1cc8ca0f8","order":31,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"58eba385-5877-40c0-bf84-6240c14dcd6f","order":1,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"reserve-static-ip-addresses","title":"Reserve Static IP Addresses","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3486f0f-58d6-4e1f-998f-e1cbbe5b7ceb","order":2,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"firewall-rules","title":"Firewall Rules","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"22d27836-9ba2-4488-85b7-6715e7894a63","order":3,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"define-hostnames","title":"Define Hostnames","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ba4aaf5b-9e12-489d-8767-37e96fc36fcd","order":4,"documentationType":1,"children":[],"parentCategoryId":"9907a655-633d-406b-8813-f4e1cc8ca0f8","slug":"identify-ntp-network-time-protocol-sources","title":"Identify NTP (Network Time Protocol) Sources","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","slug":"infrastructure","title":"Infrastructure","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ed8a5ec1-e8af-4759-b0ee-71bf48d40a0f","order":32,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7bfe67c4-4da5-44e7-adf4-632cde0f07ac","order":1,"documentationType":1,"children":[],"parentCategoryId":"ed8a5ec1-e8af-4759-b0ee-71bf48d40a0f","slug":"services-to-be-implemented","title":"Services to be Implemented","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d7cb0274-3cee-442f-a31b-8add7a69b6f9","slug":"cluster-setup","title":"Cluster Setup","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"pre-installation","title":"Pre-Installation","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"979d08ce-c966-4148-8927-dffaf32bdae0","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","order":34,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"620200a0-e449-4bf6-a70e-8b7508815803","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aca3304b-c16f-497d-a7d5-eebb0d62722d","order":1,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-return-merchandise-authorization-rma-fx2200-process","title":"Fortanix Return Merchandise Authorization (RMA) FX2200 Process","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6714f829-5b8c-45f4-97fc-b03798b56f6e","order":2,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-setup-for-fx2200-series-i","title":"Fortanix IPMI Setup for FX2200 Series I","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0556ad97-e8de-4791-9a0d-d6e1e3e24f9a","order":3,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-data-security-manager-fx2200-hardware-guide","title":"Fortanix Data Security Manager FX2200 Hardware Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0cdd9b1a-361b-4b66-bc3b-1db0bbac65f1","order":4,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-setup-for-fx2200-series-ii","title":"Fortanix IPMI Setup for FX2200 Series II","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"743e3718-f63c-45d8-86b8-9d2a6efb69a1","order":5,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-ipmi-ssl-certificate-renewal-for-fx2200-series-ii","title":"Fortanix IPMI SSL Certificate Renewal For FX2200 Series II","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2c43bc5-b2b9-4df0-801b-4ae8fda81ff2","order":6,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-data-security-manager-fx2200-console-port-db9-configuration-guide","title":"Fortanix Data Security Manager FX2200 - Console Port (DB9) Configuration Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"37cdf195-47ea-4af9-b30e-d3a8189f40d6","order":7,"documentationType":1,"children":[],"parentCategoryId":"620200a0-e449-4bf6-a70e-8b7508815803","slug":"fortanix-fx2200-series-ii-appliance-physical-security-guide","title":"Fortanix FX2200 Series II Appliance - Physical Security Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"hardware-guide","title":"Hardware Guide","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d7d9732e-83da-492f-b37b-49b83661686c","order":1,"documentationType":1,"children":[],"parentCategoryId":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","slug":"fortanix-data-security-manager-installation-guide-on-prem","title":"Fortanix Data Security Manager Installation Guide - On-Prem","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"401c5618-069c-4e3c-bd67-ab4663d6f6e8","order":2,"documentationType":1,"children":[],"parentCategoryId":"1e064ee6-ccbe-4a56-b6af-120f21139cbd","slug":"fortanix-data-security-manager-fips-replication","title":"Fortanix Data Security Manager FIPS Replication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"fortanix-cluster-setup","title":"Cluster Setup","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"53227c80-ccee-449a-80a1-5bd98fbba856","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"35bf9167-7b3f-4b42-9c24-21a7b062b4ac","order":1,"documentationType":1,"children":[],"parentCategoryId":"53227c80-ccee-449a-80a1-5bd98fbba856","slug":"securing-fx2200-oob-management-ports","title":"Securing FX2200 OOB Management Ports","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b1d7de6e-56e3-40a5-88ab-57eb2e17c76e","slug":"security-deploymentimplementationarchitecture","title":"Security (deployment/implementation/architecture)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"979d08ce-c966-4148-8927-dffaf32bdae0","slug":"fortanix-data-security-on-premises","title":"Fortanix Data Security Manager On-premises","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","order":37,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc212a6b-9a3a-4c1d-8bcb-a0052185de87","order":1,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-on-aws","title":"Fortanix Data Security Manager Installation on AWS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"afb5f1f4-4248-4cca-8947-4704c988da59","order":2,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-from-azure-marketplace","title":"Fortanix Data Security Manager Installation from Azure Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3bcde1d8-4c22-4b6a-812e-5eed9099ca81","order":3,"documentationType":1,"children":[],"parentCategoryId":"fbc643a2-2237-4b22-8b8d-3f35c1e56b03","slug":"fortanix-data-security-manager-installation-on-vmware","title":"Fortanix Data Security Manager Installation on VMware","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"979d08ce-c966-4148-8927-dffaf32bdae0","slug":"fortanix-data-security-manager-cloud-publicprivate","title":"Fortanix Data Security Manager Cloud (Public/Private)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"deployment","title":"Deployment","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"820410be-9915-45bf-add4-e60daa4a0a0b","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9ad4892f-9eb8-4c8b-89b4-39c2b05139b9","order":1,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-authentication","title":"Fortanix Data Security Manager - Sysadmin Settings - Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e0745154-8eff-43c3-ba0b-366e026377dc","order":2,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-ip-policy","title":"Fortanix Data Security Manager - Sysadmin Settings - IP Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bdc0b500-50ea-430c-b07e-54705f90cecd","order":3,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-policies","title":"Fortanix Data Security Manager - Sysadmin Settings - Policies","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5ded81c2-26c3-494c-886a-c047ac35e380","order":4,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-interfaces","title":"Fortanix Data Security Manager - Sysadmin Settings - Interfaces","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0fea841e-8b67-4f9a-a70e-4ef794a24dee","order":5,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-email","title":"Fortanix Data Security Manager - Sysadmin Settings - Email","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"66343ff7-674c-4b36-8ba0-98ffe331dc71","order":6,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-frontend","title":"Fortanix Data Security Manager - Sysadmin Settings - Frontend","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"227a5e70-7c82-47d0-9ed0-5faf02d336bf","order":7,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-log-management","title":"Fortanix Data Security Manager - Sysadmin Settings - Log Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6850aeda-06b9-4084-b23b-efe1617e109f","order":8,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-enrollment-policy","title":"Fortanix Data Security Manager - Sysadmin Settings - Enrollment Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ef8b7d5a-fdc1-4e54-91fd-75a5ca83a844","order":9,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-settings-customization","title":"Fortanix Data Security Manager - Sysadmin Settings - Customization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb93029e-26e9-402f-ae84-e568c3a26f70","order":10,"documentationType":1,"children":[],"parentCategoryId":"4f658bd9-db4c-4cd1-8a38-e9518230ce84","slug":"fortanix-data-security-manager-sysadmin-delete-users-and-accounts","title":"Fortanix Data Security Manager - Sysadmin - Delete Users and Accounts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"system-administration-settings","title":"System Administration Settings","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"99d63564-7634-4e10-95f9-2803cbd2f0f0","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"65cbe4cc-8c79-41c3-a548-6d05fadf2392","order":1,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"fortanix-data-security-manager-monitoring-and-alerting-solution","title":"Fortanix Data Security Manager Monitoring and Alerting Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"78e0acdb-eb43-4fc1-ba87-b6264ff5c7b2","order":2,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"splunk-integration-with-sensu-server","title":"Splunk Integration with Sensu Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"80c8f615-c95b-4002-a79e-1ec2e4106fe1","order":3,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"okta-integration-with-sensu-server","title":"Okta Integration with Sensu Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ebe32440-7db7-4680-ba2c-376fcef391f8","order":4,"documentationType":1,"children":[],"parentCategoryId":"99d63564-7634-4e10-95f9-2803cbd2f0f0","slug":"fortanix-data-security-manager-upgrade-prechecks-using-sensu-automated","title":"Fortanix Data Security Manager Upgrade Prechecks Using Sensu - Automated","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"monitoring-and-alerting","title":"Monitoring and Alerting","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e7c349fc-1435-4df8-982a-0cfb68c97250","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8acc6cf0-8ab3-4710-9e07-7fa366ddbec7","order":1,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"introduction-to-fortanix-dsm-backup-and-restore","title":"Introduction to Fortanix DSM Backup and Restore","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3446e3f-8b4c-42e9-87a6-6c45526cf6ad","order":2,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-password-based-backup-and-restore-using-scp-sgx","title":"Fortanix DSM Password-Based Backup and Restore Using SCP - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7b6f8e18-dcbe-4c8e-adf1-1e9fdd6deaf2","order":3,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-passwordless-based-backup-and-restore-using-scp-sgx","title":"Fortanix DSM Passwordless-Based Backup and Restore Using SCP - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"86bf06b7-c1c6-4efd-9cc8-1c99c1ce9f9a","order":4,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-aws-s3-bucket-sgx","title":"Fortanix DSM Backup and Restore for AWS S3 Bucket - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"007e34ce-933c-405c-8fb6-5933eced0457","order":5,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-azure-blob-storage-sgx","title":"Fortanix DSM Backup and Restore for Azure Blob Storage - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb4565d0-9ca2-4594-b82e-3c511f694501","order":6,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-non-sgx","title":"Fortanix DSM Backup and Restore - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"182b4b25-7d8a-43c8-875b-d203b01de130","order":7,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-and-restore-for-cdk-non-sgx","title":"Fortanix DSM Backup and Restore for CDK - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a7da75c6-42da-49a4-bea9-af069224d9be","order":8,"documentationType":1,"children":[],"parentCategoryId":"e7c349fc-1435-4df8-982a-0cfb68c97250","slug":"fortanix-dsm-backup-for-audit-log","title":"Fortanix DSM Backup for Audit Log","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"backup-and-restore-manual","title":"Backup and Restore - Manual","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"092d755e-219b-48a0-a117-13b3d5896bb5","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"29e02bfd-fa12-4406-84ec-444cea181e59","order":1,"documentationType":1,"children":[],"parentCategoryId":"092d755e-219b-48a0-a117-13b3d5896bb5","slug":"fortanix-dsm-restoration-guide-automated","title":"Fortanix DSM Restoration Guide - Automated","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"restoration-using-script-automated","title":"Restoration Using Script - Automated","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c80242d2-d0dc-4353-8a78-5f40de497cfa","order":5,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-port-requirements","title":"Fortanix Data Security Manager Port Requirements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d06e7f5-8425-43d2-b43a-6ed48b2e6c65","order":6,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-cluster-recovery-best-practices","title":"Fortanix Data Security Manager Cluster Recovery Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"39988196-d2ec-498c-9d07-0bb67dbee7df","order":7,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-cluster-management-quick-reference","title":"Fortanix Data Security Manager Cluster Management Quick Reference","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c6fa1f6f-b026-486b-a8b6-964e2c5376ea","order":8,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-continuous-restoration","title":"Fortanix Data Security Manager Continuous Restoration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"476ecd39-e00d-4996-9643-c4206f2f7f36","order":9,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-read-only-mode-of-operation","title":"Fortanix Data Security Manager Read-Only Mode of Operation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"738dbb74-3525-42e4-8cb1-7664ac60ada2","order":10,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"fortanix-data-security-manager-data-center-labeling","title":"Fortanix Data Security Manager Data Center Labeling","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6888369-98f4-4f49-aaa0-6d90a3f769a1","order":11,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"cluster-deployment-key-protection-non-sgx","title":"Cluster Deployment Key Protection - Non-SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3297f40b-437b-4de6-874d-eeeea225cb00","order":12,"documentationType":1,"children":[],"parentCategoryId":"820410be-9915-45bf-add4-e60daa4a0a0b","slug":"cluster-master-key-rotation","title":"Cluster Master Key Rotation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"cluster-configuration-and-management","title":"Cluster Configuration and Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c2ad6465-f071-4cd4-ae87-ba1c7388bbf3","order":3,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-pre-upgrade-checks-manual","title":"Fortanix Data Security Manager Software Pre-Upgrade Checks - Manual","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1a6b4001-b255-4c3a-926b-d7fa721f5b22","order":4,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-upgrade","title":"Fortanix Data Security Manager Software Upgrade","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e7506ef8-8f44-4cfe-b185-e4e2b71b009a","order":5,"documentationType":1,"children":[],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"fortanix-data-security-manager-software-post-upgrade-checks","title":"Fortanix Data Security Manager Software Post-Upgrade Checks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9806349a-306a-400c-8ee3-03d145d33594","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"67f004a6-f099-4805-b968-3673a59f0dc1","order":1,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-43-kubernetes-version-upgrade-to-114-k8s","title":"Fortanix Data Security Manager (Release 4.3) Kubernetes Version Upgrade to 1.14 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d01286a2-3d2b-4ccf-8942-72a96c5aa443","order":2,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-411-kubernetes-version-upgrade-to-119-k8s","title":"Fortanix Data Security Manager (Release 4.11) Kubernetes Version Upgrade to 1.19 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ac8008ce-312d-48e6-8ba2-1294ba5affda","order":3,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-415-kubernetes-version-upgrade-to-121-k8s","title":"Fortanix Data Security Manager (Release 4.15) Kubernetes Version Upgrade to 1.21 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"eb7c9adb-63ef-4f10-a7e8-7749253771e8","order":4,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-423-kubernetes-version-upgrade-to-127-k8s","title":"Fortanix Data Security Manager (Release 4.23) Kubernetes Version Upgrade to 1.27 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"321b00b3-ade9-47f0-ad16-c43b50c86d0e","order":5,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-431-kubernetes-version-upgrade-to-129-k8s","title":"Fortanix Data Security Manager (Release 4.31) Kubernetes Version Upgrade to 1.29 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c9f11cd-20ba-4bc1-93b0-c79b0dbf6e01","order":6,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-434-kubernetes-version-upgrade-to-130-k8s","title":"Fortanix Data Security Manager (Release 4.34) Kubernetes Version Upgrade to 1.30 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3c5697cb-00ac-4e35-8050-80627331fec5","order":7,"documentationType":1,"children":[],"parentCategoryId":"9806349a-306a-400c-8ee3-03d145d33594","slug":"fortanix-data-security-manager-release-52-kubernetes-version-upgrade-to-132-k8s","title":"Fortanix Data Security Manager (Release 5.2) Kubernetes Version Upgrade to 1.32 K8s","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"774646f0-405b-4884-9e52-1cc0e2c3a4e6","slug":"kubernetes-upgrade","title":"Fortanix DSM Kubernetes Upgrade","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"fortanix-data-security-manager-upgrade","title":"Fortanix Data Security Manager Upgrade","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"41cd4410-4eb7-4013-97f2-166d326dc607","order":1,"documentationType":1,"children":[],"parentCategoryId":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","slug":"fortanix-faqs-installupgradeadministration","title":"FAQs - Install/Upgrade/Administration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e8857a9d-1d6e-41a1-b4d7-089dec058eeb","order":2,"documentationType":1,"children":[],"parentCategoryId":"4d2b9775-eb3a-470e-a948-fd7b6298ea0a","slug":"how-to-check-fortanix-dsms-node-join-policy","title":"How to Check Fortanix DSM's Node Join Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"39d0253b-d378-44c2-acd7-8196a27b54b3","slug":"faqs-installupgradeadministration","title":"FAQs - Install/Upgrade/Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"setting-up-fortanix-dsm-system-administration-on-prem-only","title":"Setting Up Fortanix DSM - System Administration (on-prem only)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e54895e6-6f7a-4dab-82ea-d45c57f284f3","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"d8ef83a7-ae17-4cfb-b70e-8c1d6f9ec554","order":1,"documentationType":1,"children":[],"parentCategoryId":"e54895e6-6f7a-4dab-82ea-d45c57f284f3","slug":"users-guide-sign-up-for-fortanix-data-security-manager-saas","title":"User's Guide: Sign Up for Fortanix Data Security Manager SaaS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"sign-up-for-fortanix-dsm-saas","title":"Sign Up for Fortanix DSM SaaS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4f6f671e-461c-4fea-b522-a09a15d2eadc","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9f9a930f-7eea-4688-b45b-d64409f64781","order":1,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-high-availability-concepts-on-prem-only","title":"Fortanix Data Security Manager High Availability Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7ece15e2-ddd7-4ec3-955c-311a6b774fef","order":2,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-cluster-attestation-guide-on-prem-only","title":"Fortanix Data Security Manager Cluster Attestation Guide (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"be00507b-283a-4150-9b61-eacd3616a416","order":3,"documentationType":1,"children":[],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"fortanix-data-security-manager-deployment-options","title":"Fortanix Data Security Manager Deployment Options","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aade5591-3352-4f57-abae-28d79232fd38","order":1,"documentationType":1,"children":[],"parentCategoryId":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","slug":"fortanix-data-security-manager-architecture","title":"Fortanix Data Security Manager Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5f620c5f-ea69-4168-9625-675fcf2ef5a5","order":2,"documentationType":1,"children":[],"parentCategoryId":"e8befa8f-7fe0-4c74-98c9-4109fc9825ec","slug":"security-architecture-of-running-fortanix-dsm-in-a-non-sgx-virtual-environment-on-prem-only","title":"Security Architecture of Running Fortanix DSM in a non-SGX Virtual Environment (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"4f6f671e-461c-4fea-b522-a09a15d2eadc","slug":"architecture-on-prem-only","title":"Architecture (on-prem only)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"concepts","title":"Concepts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"efe108a5-ec7c-4ced-b950-a258c16b7b41","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c5aaf9b-c05b-4e35-908f-3f1b2409804d","order":1,"documentationType":1,"children":[],"parentCategoryId":"efe108a5-ec7c-4ced-b950-a258c16b7b41","slug":"users-guide-inviting-a-user-to-fortanix-data-security-manager","title":"User's Guide: Inviting a User to Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"invite-a-user-to-fortanix-dsm","title":"Invite a User to Fortanix DSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc485f16-f29c-4eae-961e-f1fdc3245b19","order":1,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-getting-started-with-fortanix-data-security-manager-ui","title":"User's Guide: Getting Started with Fortanix Data Security Manager - UI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"800256f2-2a38-472e-85d6-fae73018de17","order":2,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-account-replication","title":"User's Guide: Account Replication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"53d9d597-c609-4b51-a90e-12529d17853e","order":3,"documentationType":1,"children":[],"parentCategoryId":"4b932921-7a0a-4937-b073-b5cfa7a58f1d","slug":"users-guide-custom-role","title":"User's Guide: Custom Role","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b39d2c88-e04c-4e99-b07c-f093b3e237e7","slug":"fortanix-dsm-setting-up-the-account","title":"Fortanix DSM - Setting Up the Account","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"getting-started-with-fortanix-dsm","title":"Getting Started with Fortanix DSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8c5663cf-6346-4f16-b984-d8cc19cfe91a","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9a1036ba-5a2d-4e5f-83e9-cd2fbee429e0","order":1,"documentationType":1,"children":[],"parentCategoryId":"8c5663cf-6346-4f16-b984-d8cc19cfe91a","slug":"users-guide-logging","title":"User's Guide: Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"log-management","title":"Log Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a59ce090-d9ca-4c51-aa05-4919ff6360e9","order":1,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-quorum-policy","title":"User's Guide: Account Quorum Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d6180df-5fe6-49d5-9792-d043ced6e352","order":2,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-cryptographic-policy","title":"User's Guide: Account Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f74f114f-cf57-4ef7-9e40-71bb478bbc3a","order":3,"documentationType":1,"children":[],"parentCategoryId":"8904c7b5-8ae3-4d13-93e7-7b82218a2fe6","slug":"users-guide-account-key-metadata-policy","title":"User's Guide: Account Key Metadata Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"security-and-audit-control","title":"Security and Audit Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"05610a26-f773-47db-a0b8-0387935895ee","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c8b735c-cbf0-49d3-9c5e-8e80d4343efd","order":1,"documentationType":1,"children":[],"parentCategoryId":"05610a26-f773-47db-a0b8-0387935895ee","slug":"users-guide-account-client-configurations","title":"User's Guide: Account Client Configurations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"client-configurations","title":"Client Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3d6be27e-a54b-4a1f-a4fe-110744ad4c36","order":4,"documentationType":1,"children":[],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"users-guide-account-customization","title":"User's Guide: Account Customization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4d6c6b7c-0697-4bbc-8b5c-712bcd7e105e","order":5,"documentationType":1,"children":[],"parentCategoryId":"f7d5c534-f131-4bc0-9c23-17eed3f677fe","slug":"fortanix-data-security-manager-sysadmin-settings-alert-management","title":"User's Guide: Alert Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"account-level-configurations","title":"Account-Level Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2608dd35-dfdc-4abc-be1b-90263f68cd64","order":1,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-group-quorum-policy","title":"User's Guide: Group Quorum Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ef6e180-2e44-4b50-a517-929296699e26","order":2,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-key-metadata-policy","title":"User's Guide: Group Key Metadata Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"09f7cc28-a061-413b-9500-d49a978ad66d","order":3,"documentationType":1,"children":[],"parentCategoryId":"bc56bd2a-3e62-4df9-b149-5c1f49dbd6a6","slug":"users-guide-group-cryptographic-policy","title":"User's Guide: Group Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"fortanix-security-and-audit-control","title":"Security and Audit Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8e69262b-1c4d-44a6-91d7-50b3a1f16a46","order":1,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-key-components","title":"User's Guide: Key Components","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2d2185eb-8a30-4b7c-9d37-d45e9d9607dd","order":2,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-group-key-encryption-key","title":"User's Guide: Group Key Encryption Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a93d36f7-03d7-47ee-8672-050347673324","order":3,"documentationType":1,"children":[],"parentCategoryId":"d87d2bb2-a30b-44aa-b852-4ff2674dbc0f","slug":"users-guide-key-undo-policy","title":"User's Guide: Key Undo Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"key-management","title":"Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"7e29c55d-1475-49c2-95fe-48d7e03498b9","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b5e3efa-9b32-43d7-8957-c680dae8f28d","order":1,"documentationType":1,"children":[],"parentCategoryId":"7e29c55d-1475-49c2-95fe-48d7e03498b9","slug":"users-guide-group-client-configurations","title":"User's Guide: Group Client Configurations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"b3b70c3b-4e41-42c7-97b8-9396ae1d3bb5","slug":"fortanix-client-configurations","title":"Client Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"group-level-configurations","title":"Group-Level Configurations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0df90479-24df-4ce6-afca-7608d5d2a198","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b574589e-d7c5-44a2-afe1-d31ae367acc4","order":1,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-fortanix-data-security-manager-key-lifecycle-management","title":"User's Guide: Fortanix Data Security Manager Key Lifecycle Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0988458e-0a35-479c-85d9-c00a2dbdfc0d","order":2,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-export-key","title":"User's Guide: Export Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"58947b09-1185-4ea6-9867-a49f729ce73f","order":3,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-data-export","title":"User's Guide: Data Export","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"435a1aa9-d1eb-4509-aaab-788f4dfabfcf","order":4,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-copy-key","title":"User's Guide: Copy Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"800817c0-0e92-4c1e-ba69-96c66bb4c584","order":5,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-key-move","title":"User's Guide: Key Move","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8f6c4d0-b997-448b-a6da-8ba1c5b0bb83","order":6,"documentationType":1,"children":[],"parentCategoryId":"0df90479-24df-4ce6-afca-7608d5d2a198","slug":"users-guide-export-policy","title":"User's Guide: Export Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"key-management-service","title":"Key Management Service","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"31a9274a-ad74-4dcf-abb5-32480901e053","order":1,"documentationType":1,"children":[],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"could-data-control-feature-comparison-matrix","title":"Cloud Data Control - Feature Comparison Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a4217518-e12e-4ce8-9f74-0c776bf52e5a","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"06c4334b-3ece-40a7-8347-7f99d937ce76","order":1,"documentationType":1,"children":[],"parentCategoryId":"a4217518-e12e-4ce8-9f74-0c776bf52e5a","slug":"fortanix-dsm-cloud-data-control-getting-started","title":"Fortanix DSM - Cloud Data Control - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"cloud-data-control-getting-started","title":"Cloud Data Control - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"37aeafca-00ff-4bd0-a4ff-0e8fd1fdd791","order":1,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-key-management-service-cdc-group-setup","title":"Fortanix DSM - AWS Key Management Service CDC Group Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"63fcbf2c-3f8e-4a84-9bbb-aeea328fd801","order":2,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-key-management-service-cdc-group-setup-using-easy-wizard","title":"Fortanix DSM - AWS Key Management Service CDC Group Setup - Using Easy Wizard","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1645af1c-516e-4e31-8d3e-92aac69d9600","order":3,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-cloud-native-key-management","title":"Fortanix DSM - AWS Cloud Native Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e1d2757-307b-4790-8256-65de9eae5889","order":4,"documentationType":1,"children":[],"parentCategoryId":"c5bb8a0a-cf4b-43cc-a1b2-fa836eb69e0b","slug":"fortanix-dsm-aws-kms-byok-bring-your-own-key","title":"Fortanix DSM - AWS KMS BYOK (Bring Your Own Key)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-aws-kms","title":"Fortanix DSM with AWS KMS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"89cf2fba-bcbc-417a-a2bf-4893534256ff","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8506ff1b-d9ba-4c46-aa72-1f26cbea6780","order":1,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-cdc-group-setup","title":"Fortanix DSM - Azure Key Vault CDC Group Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c37f9bd8-5730-4b02-bb50-9d5bc7e4775b","order":2,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-cloud-native-key-management","title":"Fortanix DSM - Azure Key Vault Cloud Native Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"24a47cb4-9605-4172-a286-0c2a0d04676d","order":3,"documentationType":1,"children":[],"parentCategoryId":"89cf2fba-bcbc-417a-a2bf-4893534256ff","slug":"fortanix-dsm-azure-key-vault-byok-bring-your-own-key","title":"Fortanix DSM - Azure Key Vault BYOK (Bring Your Own Key)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-azure-key-vault","title":"Fortanix DSM with Azure Key Vault","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"972d9a07-3f1c-4d54-9e70-6867e97390c4","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"40d5f0ec-a549-4a51-b0d4-d8aa6bbc170e","order":1,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-fortanix-dsm-azure-managed-hsm-setup-guide","title":"Fortanix DSM - Azure Managed HSM Group Setup Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"995a0546-cba4-41b1-8064-34aa96b08182","order":2,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-azure-managed-hsm","title":"Fortanix DSM - Azure Managed HSM Cloud Native Key Management Service","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"994f4d61-87a5-427e-9107-18dc2939c007","order":3,"documentationType":1,"children":[],"parentCategoryId":"972d9a07-3f1c-4d54-9e70-6867e97390c4","slug":"users-guide-fortanix-dsm-azure-managed-hsm-bring-your-own-keyguide","title":"Fortanix DSM - Azure Managed HSM BYOK (Bring Your Own Key Guide)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-azure-managed-hsm","title":"Fortanix DSM with Azure Managed HSM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"71514718-a33a-41c0-919e-142f022d6a06","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8f027f3e-113f-48cd-b074-6f1f3fff0c8d","order":1,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"fortanix-data-security-manager-gcp-kms-keyring-setup-user-guide","title":"Fortanix Data Security Manager GCP KMS Keyring Setup User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7ca4f9b6-64e0-4be4-88f4-00dea13d0fbf","order":2,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"fortanix-data-security-manager-gcp-kms-cnkms-keyring-setup-user-guide","title":"Fortanix Data Security Manager GCP KMS Cloud Native Key Management User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e1dd178b-c064-46e0-bda3-2a6773c8dced","order":3,"documentationType":1,"children":[],"parentCategoryId":"71514718-a33a-41c0-919e-142f022d6a06","slug":"users-guide-google-cloud-kms","title":"Fortanix Data Security Manager GCP KMS Bring Your Own Key User Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"fortanix-dsm-with-google-cloud-kms","title":"Fortanix DSM with Google Cloud KMS","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ec7fc978-e82a-4104-a27e-0afe0cee8576","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7a99adb-4350-46b9-9b65-24fc87820c96","order":1,"documentationType":1,"children":[],"parentCategoryId":"ec7fc978-e82a-4104-a27e-0afe0cee8576","slug":"manually-importing-fortanix-data-security-manager-keys-into-cloud-providers","title":"Manually Importing Fortanix Data Security Manager Keys into Cloud Providers","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a8de5464-a4eb-44c3-a3d0-c00c8cae8ba3","slug":"manual-cloud-key-management","title":"Manual Cloud Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"cloud-data-control","title":"Cloud Data Control","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"65506edd-d65d-4d5c-893d-38c40a4fc76f","order":1,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"extended-virtual-keys-concepts","title":"Extended Virtual Keys - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b39b33ee-0a66-422c-8b25-041c4b992886","order":2,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"users-guide-store-keys-externally-setup","title":"User's Guide: Store Keys Externally - Setup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93b7b877-f8f1-46f7-bb81-5f1193430e40","order":3,"documentationType":1,"children":[],"parentCategoryId":"02065167-83d9-4fcf-b606-d5e7fd01c3cd","slug":"users-guide-store-keys-externally-key-management","title":"User's Guide: Store Keys Externally - Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"store-keys-externally-and-extended-virtual-keys","title":"Store Keys Externally and Extended Virtual Keys","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fde662a2-f9eb-44bd-a429-700c7caf807d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c1bf1b6a-428a-4212-810e-e915b26ce0b2","order":1,"documentationType":1,"children":[],"parentCategoryId":"fde662a2-f9eb-44bd-a429-700c7caf807d","slug":"users-guide-security-controls-for-fortanix-data-security-manager-applications","title":"User's Guide: Security Controls for Fortanix Data Security Manager Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"security-controls-for-fortanix-dsm-applications","title":"Security Controls for Fortanix DSM Applications","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d61c049d-f1f2-416e-b71e-3703fd3c2693","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","order":39,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6065d82c-e486-4372-b144-d0f81b3481d9","order":1,"documentationType":1,"children":[],"parentCategoryId":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","slug":"users-guide-authentication","title":"User's Guide: Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a6b12642-f3b0-41f9-affb-d4c740d4b5dc","order":1,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"users-guide-single-sign-on","title":"User's Guide: Single Sign-On","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00657ac8-1229-452c-8122-3fe0d8a4184f","order":2,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-ping-identity","title":"Using Fortanix Data Security Manager with Ping Identity","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6a585e39-7d20-4a69-b54c-6b9e8175d349","order":3,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-rsa-secure-id-access","title":"Using Fortanix Data Security Manager with RSA SecurID Access","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93c06ceb-240e-4312-9cd7-819c6f665b2a","order":4,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-sso-with-okta","title":"Using Fortanix Data Security Manager with Okta","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c3f5bd82-3a23-4108-badf-60cdbbe9b09c","order":5,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"users-guide-configuring-a-saml-provider-application-in-azure","title":"User's Guide: Configuring a SAML Provider Application in Azure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9463f1bf-eb92-4a25-a96f-3de1703801d6","order":6,"documentationType":1,"children":[],"parentCategoryId":"3fbd42d7-6588-4d4a-89dc-be265b421f9a","slug":"using-fortanix-data-security-manager-with-forgerock-oauth-20","title":"Using Fortanix Data Security Manager with ForgeRock OAuth 2.0","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"2ac94d4b-0eec-4d7e-9d67-3dd1db41faab","slug":"single-sign-on","title":"Single Sign-On","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"d61c049d-f1f2-416e-b71e-3703fd3c2693","slug":"authentication","title":"Authentication","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b63f3165-5fe1-44b4-b1a8-9634be82e9aa","order":41,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6934675e-deba-4b4d-8558-df5037650ba2","order":1,"documentationType":1,"children":[],"parentCategoryId":"b63f3165-5fe1-44b4-b1a8-9634be82e9aa","slug":"users-guide-authorization","title":"User's Guide: Authorization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d61c049d-f1f2-416e-b71e-3703fd3c2693","slug":"authorization","title":"Authorization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"authentication-and-authorization","title":"Authentication and Authorization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"798e9043-e9fd-48bc-b9c2-e93b040e7ff8","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"603e8eb2-3265-4045-838f-838bf5af2f72","order":1,"documentationType":1,"children":[],"parentCategoryId":"798e9043-e9fd-48bc-b9c2-e93b040e7ff8","slug":"users-guide-usage-metrics","title":"User's Guide : Usage Metrics","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"dsm-usage-metrics","title":"DSM Usage Metrics","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e0320e4d-761b-4b53-90ec-ed3231aef0c5","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"205a3c2d-45a4-4454-a501-87f3f1c59852","order":1,"documentationType":1,"children":[],"parentCategoryId":"e0320e4d-761b-4b53-90ec-ed3231aef0c5","slug":"users-guide-hsm-gateway","title":"User's Guide: HSM Gateway","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"376a7303-f0e1-4cf6-8cd4-bd58373103cb","slug":"hsm-gateway-server","title":"HSM Gateway Server","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"fortanix-dsm-administration","title":"Fortanix DSM Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d687c192-f87f-4631-a96c-b0ce63896846","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ba1e2823-e0bd-42b0-8d45-31c31ee832c1","order":1,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-quickstart","title":"Security Objects Tokenization Quickstart","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e6f5482-f718-4020-a961-d49678391e0f","order":2,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"users-guide-tokenization","title":"User's Guide: Tokenization","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99e80bdc-437b-41e3-a958-dc3e9edc85f6","order":3,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-examples","title":"Security Objects Tokenization Examples","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"22ccbe45-9b2f-4ff9-bea4-ff626840d6ad","order":4,"documentationType":1,"children":[],"parentCategoryId":"6a9793b3-6019-4a6d-b5c5-a644d59145d5","slug":"security-objects-tokenization-best-practices","title":"Security Objects Tokenization Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-tokenization","title":"Tokenization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"033ca568-e1b1-4c87-bedd-6632a241d5cc","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"374081e1-646e-4c89-9d47-a0337742067e","order":1,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"users-guide-plugin-library","title":"User's Guide: Plugin Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f06af77e-947f-4002-810f-ca06ed5e35f9","order":2,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"plugins-getting-started","title":"Plugins - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"54c27d4f-e3f7-463c-88bf-fdaabb1c0d33","order":3,"documentationType":1,"children":[],"parentCategoryId":"033ca568-e1b1-4c87-bedd-6632a241d5cc","slug":"plugins-lua-programming-reference","title":"Plugins – Lua Programming Reference","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"plugin-library","title":"Plugin library","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"297c81e1-6ed4-445e-80c2-05c2ed169259","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b4fbdd7-766d-4ea4-aafe-97bb9f11e423","order":1,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-compatibility-matrix","title":"Clients: Compatibility Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64efc224-d7d6-4363-9c5e-dae11590afc5","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"da3eb785-645b-4488-bc5f-f73230d4aa6b","order":1,"documentationType":1,"children":[],"parentCategoryId":"64efc224-d7d6-4363-9c5e-dae11590afc5","slug":"clients-pkcs11-library","title":"Clients: PKCS#11 Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7cae51cd-cee5-4100-8cd6-5396b34b63e0","order":2,"documentationType":1,"children":[],"parentCategoryId":"64efc224-d7d6-4363-9c5e-dae11590afc5","slug":"pkcs11-supported-functions-and-mechanisms","title":"Clients: PKCS#11 Supported Functions and Mechanisms","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"pkcs11","title":"Clients: PKCS#11","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c8407ee0-57cc-474e-ba56-dc5f94057dbb","order":3,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-microsoft-cng-key-storage-provider","title":"Clients: Microsoft CNG Key Storage Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bc03f3a0-9a29-420d-ac4e-a8380b24dc79","order":4,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-java-cryptography-extension-jce-provider","title":"Clients: Java Cryptography Extension (JCE) Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d4749783-4238-4331-a8ad-ce821e41e17c","order":5,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-sequoia-pgp","title":"Clients: Sequoia-PGP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c4159b38-a958-4485-9880-dd24850cdb5a","order":6,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-terraform-provider","title":"Clients: Terraform Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"967b68b0-2927-484b-928e-6d44b5bed94f","order":7,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-command-line-interface-cli-for-fortanix-data-security-manager","title":"Clients: Command-Line Interface (CLI) for Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d683d41-6bc5-4558-9c7b-f84aad24ae21","order":8,"documentationType":1,"children":[],"parentCategoryId":"297c81e1-6ed4-445e-80c2-05c2ed169259","slug":"clients-sdks-for-rest-api","title":"Clients: SDKs for REST API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"clients","title":"Clients","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"20dab1cf-53cb-4cda-9da3-05e350b67943","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f4723bb3-b178-4a07-b398-a3b6c71e180b","order":1,"documentationType":1,"children":[],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-compatibility-matrix","title":"DSM Accelerator - Compatibility Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"10536081-39ca-498c-97f1-a85b497ecca5","order":2,"documentationType":1,"children":[],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-concepts","title":"DSM Accelerator - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b99f8271-aa76-4375-9920-ef5b2be7395a","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c1757c5-8f48-4844-91db-3e7f8b45c8e5","order":1,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-deployment-guide","title":"DSM-Accelerator Webservice Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"74726b67-0fd8-441e-a134-1d24a436dd3e","order":2,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-developer-guide","title":"DSM Accelerator Webservice Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3a5a7ce6-1ba6-4d5e-8e0d-2e992cc533c1","order":3,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-for-nitro-with-ccm-setup-guide","title":"DSM Accelerator Webservice for Nitro with CCM Setup Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b726352d-e668-43ee-9ec8-f842bc1cf374","order":4,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"deploying-dsm-accelerator-on-aws-lambda","title":"DSM Accelerator Deployment on AWS Lambda","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6509ae07-71db-4312-b274-643da4c7dbb2","order":5,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"fortanix-data-security-manager-accelerator-webservice-with-snowflake","title":"DSM Accelerator Webservice with Snowflake","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"93aed4aa-63fb-4301-83e4-51d59adbd92d","order":6,"documentationType":1,"children":[],"parentCategoryId":"b99f8271-aa76-4375-9920-ef5b2be7395a","slug":"dsm-accelerator-webservice-external-logging","title":"DSM Accelerator Webservice - External Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-webservice","title":"DSM Accelerator Webservice","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"dbded0c8-b383-4082-8e8f-8810798317c5","order":1,"documentationType":1,"children":[],"parentCategoryId":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","slug":"dsm-accelerator-jce-provider-deployment-guide","title":"DSM Accelerator JCE Provider Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00f173b4-8d29-4a6b-9c5a-9ab458c3e210","order":2,"documentationType":1,"children":[],"parentCategoryId":"3a46cfec-7f05-4aeb-bd32-cbffa1736d79","slug":"dsm-accelerator-jce-provider-developer-guide","title":"DSM Accelerator JCE Provider Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-jce-provider","title":"DSM Accelerator JCE Provider","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"e9c53f6e-c43b-4072-bfc2-a467f7c5ca9a","order":1,"documentationType":1,"children":[],"parentCategoryId":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","slug":"dsm-accelerator-pkcs11-deployment-guide","title":"DSM Accelerator PKCS#11 Deployment Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c6487420-4063-40ae-85b9-4aca65230cbc","order":2,"documentationType":1,"children":[],"parentCategoryId":"2f067870-d23a-46bb-b9fa-9e2ef9311ce4","slug":"dsm-accelerator-pkcs11-developer-guide","title":"DSM Accelerator PKCS#11 Developer Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"20dab1cf-53cb-4cda-9da3-05e350b67943","slug":"dsm-accelerator-pkcs11","title":"DSM Accelerator PKCS#11","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"dsm-accelerator","title":"DSM Accelerator","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e5a58617-9db0-4d9d-a51c-40811717fe16","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"1340a313-8f0d-43f8-a6e0-150d41d61a52","order":1,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"introduction","title":"Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b54bf06c-5436-4336-8b6f-66e801cc96f5","order":2,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"create-a-group","title":"Create a Group","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"954c1506-912a-42b7-81b5-af02df4e1075","order":3,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"listing-all-security-objects","title":"Listing all Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ea8755c3-c3ba-4a04-a732-31a69ced8ccf","order":4,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"configure-api-client","title":"Configure API Client","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"35b13061-9bc3-4ea3-bb6f-515a4f2e8661","order":5,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"encryption","title":"Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e05fbf5f-9832-4f00-8791-136720d9c4bd","order":6,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"user-authentication","title":"User Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3281aada-6145-4ab7-9a06-5db2c62d79d2","order":7,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"add-quorum-approval-policy","title":"Add Quorum Approval Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9e2dd961-2db9-40ed-951d-d64ef05b0d97","order":8,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"details-of-security-object-by-uuid","title":"Details of Security Object by UUID","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"52307e72-214b-4e71-9034-0c98a1bd63a7","order":9,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"app-authentication-with-an-api-key","title":"App Authentication with an API Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0e0428b3-c8a1-4529-9c2e-26383a0d7725","order":10,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"decryption","title":"Decryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4e784639-7c4d-48ff-a8a6-e885e220eef0","order":11,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"update-quorum-approval-policy","title":"Update Quorum Approval Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bdfc71f0-592e-4cf9-82b2-dba5d70c8169","order":12,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"signature-generation","title":"Signature Generation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"43beebc6-1c8f-4e2a-a7e0-18df9c8dc7c4","order":13,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"details-of-security-object-by-name","title":"Details of Security Object by Name","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64ca0d7e-5351-4ff9-9f17-3bfeb327cf6d","order":14,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"app-authentication-with-client-certificate","title":"Application Authentication with Client Certificate","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"97b65beb-4f7f-461c-93e0-f0d98f305913","order":15,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"addupdate-cryptographic-policy","title":"Add/Update Cryptographic Policy","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ad05dea-1c20-4f6e-81c1-55ae69a178b0","order":16,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"signature-verification","title":"Signature Verification","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c1e5f6d-a643-4236-8d06-debab816a771","order":17,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"creating-a-security-object","title":"Creating a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2f61578-69e2-41b4-b10d-2e5f15a0f081","order":18,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"importing-a-security-object","title":"Importing a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2722b36-fd1f-4c2c-ab21-7de1e0baa0ea","order":19,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"wrapping-a-key","title":"Wrapping a Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7a169999-a1ab-4aa5-8bc2-b80f7b602a87","order":20,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"unwrapping-a-key","title":"Unwrapping a Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6beec5d2-bdb7-48af-8faa-1ef091d736b2","order":21,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"exporting-a-security-object","title":"Exporting a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"32ba7659-d486-494f-a3cb-4d648cd475f7","order":22,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"generic-batch-operations","title":"Generic Batch Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"68367017-374a-49b3-995a-7670105f8419","order":23,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"specific-batch-operations","title":"Specific Batch Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"761a1952-3c2e-40d0-83bf-44d5097ab2ff","order":24,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"deleting-a-security-object","title":"Deleting a Security Object","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"26a52e77-afe4-4279-93cc-75d007ad3328","order":25,"documentationType":1,"children":[],"parentCategoryId":"e5a58617-9db0-4d9d-a51c-40811717fe16","slug":"log-out","title":"Log out","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"example-code","title":"Example Code","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b344162c-cce7-445f-ab3a-6b1fd91ddfc1","order":1,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"fortanix-data-security-manager-sdk-contents","title":"Fortanix Data Security Manager SDK Contents","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"36392b0d-ea9b-45ec-a396-fb69dd241047","order":2,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"client-api-basics","title":"Client API Basics","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"735b57de-e033-44fe-a32d-e3a91f42c47a","order":3,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"configure-api-client-and-client-authentication","title":"Configure API Client and Client Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ffeb7532-3359-4bba-a037-e005643d49c1","order":4,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"listing-security-objects","title":"Listing Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e89acd0b-0831-40f6-bd2b-c2d65f9a1593","order":5,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"generating-security-objects","title":"Generating Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c1469ed-0ec6-4427-b290-a48aca7afb1d","order":6,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"wrapping-security-objects","title":"Wrapping Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f626e13-d20d-48a0-b3f8-4ad608723fec","order":7,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"unwrapping-security-objects","title":"Unwrapping Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6365df25-dad3-4904-bec6-e3d3cb9ca266","order":8,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"deriving-security-objects","title":"Deriving Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7632b15b-e00c-4798-a1e7-6edc28614cbc","order":9,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"importing-security-objects","title":"Importing Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a4f43251-0305-4f69-b2eb-d8af086edb54","order":10,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"updating-security-objects","title":"Updating Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7c5a0772-fd71-4df9-ae53-bbbdd8e39323","order":11,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"deleting-security-objects","title":"Deleting Security Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"50dec9e0-9bd5-4b83-904c-f995e0fd3beb","order":12,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"symmetric-cryptography","title":"Symmetric Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2240fbd-f1a3-4b9c-9fc2-dc4ab56227ec","order":13,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"message-digests","title":"Message Digests","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6794fe9a-4f30-4897-9054-d321e4c703de","order":14,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"message-authentication-codes","title":"Message Authentication Codes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d13769b8-4267-48ed-9445-7ce74f2c62d1","order":15,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"public-key-cryptography","title":"Public Key Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4efbbcb4-a35d-4843-bc78-8ad0ec551f46","order":16,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"public-key-signing-and-verification","title":"Public Key Signing and Verification","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c896b54-9cad-4307-9a97-9c68b8443295","order":17,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"batch-cryptography","title":"Batch Cryptography","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e43a6b20-f7b7-42fa-958e-106101482319","order":18,"documentationType":1,"children":[],"parentCategoryId":"2cd62585-4ed8-4634-ba8a-cf5a7a8544b3","slug":"x-request-id","title":"X-Request-ID","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-data-security-manager-sdk-for-java","title":"Fortanix Data Security Manager SDK for Java","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"97477383-05c5-4972-b956-6eaa7193936f","order":7,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-authentication-app-and-user","title":"Authentication - App and User","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b5321ea0-3b5e-44b3-81ae-476d92175539","order":8,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"fortanix-authorization-user","title":"Authorization - User","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"30a03738-058a-469e-b5c3-52458b2b419a","order":9,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"key-operations","title":"Key Operations","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f6195dc-b2e8-4d91-b027-20e5f6c45162","order":10,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"filtering-security-objects-using-fortanix-dsm-rest-api","title":"Filtering Security Objects Using Fortanix DSM REST API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"237cb0f9-c18c-4e5b-a10b-608402ef21cb","order":11,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"using-opaque-and-secret-objects","title":"Using Opaque and Secret Objects","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"27f8b5c8-1449-48a7-99ac-1e71a151f061","order":12,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"algorithm-support","title":"Algorithm Support","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c048b6fb-99ae-4ef3-98ca-f8dc2b6d98c6","order":13,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"algorithm-support-strict-fips-mode","title":"Algorithm Support - Strict FIPS Mode","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ebc0ad22-e4dd-4279-815e-9b72d6f77cd1","order":14,"documentationType":1,"children":[],"parentCategoryId":"d687c192-f87f-4631-a96c-b0ce63896846","slug":"list-of-third-party-software-installed","title":"List of Third-Party Software Installed","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"developer-guide-developer-operations","title":"Developer Guide - Developer Operations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"cb5c9616-7768-432a-a272-c754e2b4308d","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4bc2b4f9-8f6b-4374-a6eb-c50c638f7988","order":1,"documentationType":1,"children":[],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"fortanix-dsm-integrations-and-use-cases-matrix","title":"Fortanix DSM - Integrations and Use-cases Matrix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"77195e79-4095-4797-af66-02c9f7016cc7","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"eedc6efc-7aff-489b-83c5-37e0d00cb077","order":1,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-introduction","title":"Filesystem Encryption for Linux - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bd805d9f-c882-4369-96b9-48fd73ad9fec","order":2,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-concepts","title":"Filesystem Encryption for Linux - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"db44fdb8-ebb4-499e-9067-d03f6bc5bb35","order":3,"documentationType":1,"children":[],"parentCategoryId":"fe3c4eda-d773-4bb5-8bdb-fa58a305c49f","slug":"filesystem-encryption-for-linux-using-fortanix-data-security-manager-setup-and-usage","title":"Filesystem Encryption for Linux Using Fortanix Data Security Manager - Setup and Usage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-linux","title":"Filesystem Encryption for Linux","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"9a8be1a5-6072-48c1-af7f-53418d6639bc","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"60d05359-ebe9-4e2b-aaf6-98eea56bfa56","order":1,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-introduction","title":"Filesystem Encryption for Windows - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2782c4b5-22aa-4998-ac6c-d2fb913e4ea4","order":2,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-concepts","title":"Filesystem Encryption for Windows as a Service - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"97ee8b68-0038-4f1e-bf1f-1269a34747a1","order":3,"documentationType":1,"children":[],"parentCategoryId":"9a8be1a5-6072-48c1-af7f-53418d6639bc","slug":"filesystem-encryption-for-windows-using-fortanix-data-security-manager-setup-and-usage","title":"Filesystem Encryption for Windows as a Service Using Fortanix Data Security Manager - Setup and Usage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-windows","title":"Filesystem Encryption for Windows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"957669ac-53be-4e77-87e2-0f39a815d276","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"eafba5c5-5238-48b3-96e2-b738151c0a0f","order":1,"documentationType":1,"children":[],"parentCategoryId":"957669ac-53be-4e77-87e2-0f39a815d276","slug":"using-fortanix-data-security-manager-with-couchbase-filesystem-encryption","title":"Filesystem Encryption for Couchbase Using Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-database","title":"Filesystem Encryption for Databases","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f630f4f6-0959-4253-9c02-603c4d11d0f3","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"6b30383d-108a-4fa5-8021-edee469e528a","order":1,"documentationType":1,"children":[],"parentCategoryId":"f630f4f6-0959-4253-9c02-603c4d11d0f3","slug":"filesystem-encryption-for-nutanix","title":"Filesystem Encryption for Nutanix Using Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77195e79-4095-4797-af66-02c9f7016cc7","slug":"filesystem-encryption-for-virtual-machines","title":"Filesystem Encryption for Virtual Machines","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"filesystem-encryption","title":"Filesystem Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"14925bae-bbb4-40b9-896b-514af3dca0d0","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"51a305d7-9576-45d6-98b5-7fdf54518171","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a3a1d793-c076-45dd-bcaf-3d90d35a4c15","order":1,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"using-fortanix-data-security-manager-with-oracle-tde-introduction","title":"Using Fortanix Data Security Manager with Oracle TDE - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1f75b048-8e0c-4aac-85d2-829f90b638e7","order":2,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"fortanix-using-fortanix-data-security-manager-with-oracle-tde","title":"Using Fortanix Data Security Manager with Oracle TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"06af913c-717d-4434-b490-46e3672574a2","order":3,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"using-fortanix-data-security-manager-with-oracle-tde-advanced-integration","title":"Using Fortanix Data Security Manager with Oracle TDE - Advanced","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ada9d40d-4f94-45d4-b0a3-6c6a7e563674","order":4,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"fortanix-data-security-manager-with-oracle-tde-best-practices","title":"Using Fortanix Data Security Manager with Oracle TDE - Best Practices","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"40190f63-e34e-4146-968a-8c7dca149622","order":5,"documentationType":1,"children":[],"parentCategoryId":"cbbc4185-5a03-4191-9e27-1f1f233d2bbf","slug":"migrating-non-container-oracle-database-to-container-oracle-database","title":"Migrating Non-Container Oracle Database to Container Oracle Database","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-oracle-tde","title":"Using Fortanix Data Security Manager with Oracle TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"5db797b2-fee0-4bb4-8e96-5e79bd548407","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ba54b12c-f767-4f44-b0ba-66b497c4665c","order":1,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-introduction","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Introduction","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4015ae70-fa66-4078-9605-5d214c08880f","order":2,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-before-you-begin","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Before You Begin","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"feff4019-0be2-4e55-aef0-48da10aa8303","order":3,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-standalone-server","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Standalone Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"45809849-d385-41c5-a589-d5635fa75441","order":4,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-key-rotation","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Key Rotation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"552994f0-5239-48ab-9d93-5fc63a847ec6","order":5,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-always-on-group-aog","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Always On Availability Group (AG)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dfec2867-66ed-44b6-8d31-f7659c8a96b3","order":6,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-backup-restore","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Backup & Restore","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"61b54ad9-6981-40f3-a230-d3b73afc64c9","order":7,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"data-security-manager-with-microsoft-sql-server-tde-integration-advanced","title":"Fortanix Data Security Manager with Microsoft SQL Server TDE Integration - Advanced","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9eeee61e-3885-452f-b698-4528c52d34e4","order":8,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"fortanix-data-security-manager-with-microsoft-sql-server-always-encrypted","title":"Fortanix Data Security Manager with Microsoft SQL Server - Always Encrypted","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a902df42-9fd7-4daf-962d-a0ebcea5e260","order":9,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"using-fortanix-data-security-manager-with-mssql-server-tde-mirror-database","title":"Fortanix Data Security Manager with MSSQL Server TDE - Mirror Database","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f6bc85d7-6723-4b10-8bc3-be788bc19360","order":10,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"migrating-mssql-server-tde-keys-from-local-environment-to-fortanix-dsm","title":"Migrating MSSQL Server TDE Keys from Local Environment to Fortanix DSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"60f6cfd9-847a-47e7-a0f2-f7079f782567","order":11,"documentationType":1,"children":[],"parentCategoryId":"5db797b2-fee0-4bb4-8e96-5e79bd548407","slug":"microsoft-sql-tde-automation-deployment-and-key-rotation","title":"Automating Microsoft SQL TDE with Fortanix DSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-microsoft-sql-server-tde","title":"Using Fortanix Data Security Manager with Microsoft SQL Server TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"58f8f8f5-2d92-477a-9a7a-17423a02022d","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c72c41f4-0600-4d61-9496-0c186134fd32","order":1,"documentationType":1,"children":[],"parentCategoryId":"58f8f8f5-2d92-477a-9a7a-17423a02022d","slug":"fortanix-using-fortanix-data-security-manager-with-cassandra-tde","title":"Using Fortanix Data Security Manager with Cassandra TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-cassandra-tde","title":"Using Fortanix Data Security Manager with Cassandra TDE","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"61591bcc-0758-443b-a128-6b59dc354fc1","order":4,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-intersystems-cache-using-kmip","title":"Using Fortanix Data Security Manager for InterSystems Cache using KMIP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7eb5ca53-f1e8-4abf-bb2c-19aa46faef6a","order":5,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-ibm-db2","title":"Using Fortanix Data Security Manager with IBM Db2","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f4f34917-bb36-49b2-b026-193b767b7ba0","order":6,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-data-security-manager-with-oracle-key-vault","title":"Using Data Security Manager With Oracle Key Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4450dfce-4c13-41e9-9e82-88f989f3104c","order":7,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mongodb-encryption-at-rest-linux","title":"Using Fortanix Data Security Manager for MongoDB Encryption at Rest - Linux","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9db36e79-4ad5-4e96-a462-cbd6d7e08fd3","order":8,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-percona-mysql-encryption-at-rest","title":"Using Fortanix Data Security Manager for Percona MySQL Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b709cdba-8744-4cca-b5ec-d920b42ff392","order":9,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mysql-encryption-at-rest","title":"Using Fortanix Data Security Manager for MySQL Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e51d89a1-2c8e-425a-95d6-635e3de45a20","order":10,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-ibm-informix","title":"Using Fortanix Data Security Manager with IBM Informix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5b7cb8c1-7180-4506-befb-53e5693bdd39","order":11,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-for-mariadb-encryption-at-rest","title":"Using Fortanix Data Security Manager for MariaDB Encryption at Rest","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fa011950-9f12-4ac8-9664-d37fea99f261","order":12,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-mongodb-encryption-at-rest-windows","title":"Using Fortanix Data Security Manager with MongoDB Encryption at Rest - Windows","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"587a219c-cc4a-4c3b-9b20-eb5ed450f26f","order":13,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-fortanix-data-security-manager-with-edb-postgres-for-tde","title":"Using Fortanix Data Security Manager with EDB Postgres for TDE","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"84bba412-c4dc-4a66-a6de-0919d4f38bd1","order":14,"documentationType":1,"children":[],"parentCategoryId":"51a305d7-9576-45d6-98b5-7fdf54518171","slug":"using-data-security-manager-for-mongodb-client-side-field-level-encryption","title":"Using Fortanix Data Security Manager for MongoDB Client-Side Field-Level Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"transparent-data-encryption","title":"Transparent Data Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"34c3f4bf-3bd6-4057-aaac-81846b8f865b","order":2,"documentationType":1,"children":[],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"using-fortanix-data-security-manager-with-servicenow","title":"Using Fortanix Data Security Manager with ServiceNow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d683390-3a49-4d0b-851c-354d7508c49b","order":3,"documentationType":1,"children":[],"parentCategoryId":"14925bae-bbb4-40b9-896b-514af3dca0d0","slug":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-primera-a630","title":"Using Fortanix Data Security Manager for Hewlett Packard Enterprise (HPE) Primera A630","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"database-encryption","title":"Database Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a711b857-a52e-42a4-9765-428f25568bf5","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b6b72ca7-9281-42ec-b3e0-d3125500746f","order":1,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"using-fortanix-data-security-manager-with-google-cloud-ekm-interface","title":"Using Fortanix Data Security Manager with Google Cloud EKM Interface","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4024ae53-920a-4bcf-9700-e369aa2dee01","order":2,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-best-practices-and-faq","title":"Fortanix Data Security Manager with Google Cloud EKM - Best Practices and FAQ","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2d976d73-b09c-4de3-b905-d0184c6cf001","order":3,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-support-model","title":"Fortanix Data Security Manager with Google Cloud EKM - Support Model","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"46afcb19-06d5-46ae-9ea9-159e4e9d8e63","order":4,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"using-fortanix-dsm-for-google-workspace-client-side-encryption","title":"Using Fortanix DSM for Google Workspace Client-Side Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1e20cc5a-60f1-4a28-9312-cd58b021a4a5","order":5,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-cloud-ekm-interface-using-virtual-private-cloud","title":"Fortanix Data Security Manager with Google Cloud EKM Interface Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"68f83c41-b1b2-4ac4-a546-7ff4e50f3992","order":6,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-google-control-plane-using-virtual-private-cloud","title":"Fortanix Data Security Manager with Google Control Plane Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ec08ad5e-1ff2-4e4c-b490-69e21dfd4c2c","order":7,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-google-cloud","title":"Exporting Fortanix Data Security Manager keys to Cloud Providers for BYOK - Google Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe4ef917-04c2-4ff2-95fe-203b8ade32bc","order":8,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-aws-key-management-service-for-byok","title":"Fortanix Data Security Manager with AWS Key Management Service for BYOK","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"875aa39d-a7a0-456d-bf3a-74e358de8054","order":9,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-using-zoho","title":"Fortanix Data Security Manager using Zoho","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7b041aa-0436-47ff-849e-990657b87ec8","order":1,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"fortanix-dsm-with-aws-external-key-store-xks-concepts","title":"Fortanix DSM with AWS External Key Store (XKS) - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8d1572ee-e2cf-49f9-a335-bcff748c0dba","order":2,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"using-fortanix-dsm-with-aws-external-key-store-xks","title":"Using Fortanix Data Security Manager with AWS External Key Store (XKS)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"39a22601-1ff3-4219-b730-f522765d1f2f","order":3,"documentationType":1,"children":[],"parentCategoryId":"83f4ff06-2f9c-40ae-8877-ca1c57ad7a8a","slug":"data-security-manager-with-amazon-xks-using-virtual-private-cloud","title":"Using Fortanix Data Security Manager with Amazon XKS Using Virtual Private Cloud","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-dsm-with-aws-external-key-store-xks","title":"Fortanix DSM with AWS External Key Store (XKS)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4909f66e-895f-4303-bfcf-6b03c1a3105d","order":11,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-azure-key-vault-for-byok","title":"Fortanix Data Security Manager with Azure Key Vault for BYOK","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1ba69630-7864-4b16-8ce9-778cbde9fba9","order":12,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce","title":"Exporting Fortanix Data Security Manager Keys to Cloud Providers for BYOK - Salesforce","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7d757a32-b98f-4640-b0dd-782a324ae411","order":13,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-fortanix-data-security-manager-keys-to-cloud-providers-for-byok-salesforce-using-cache-only-keys","title":"Exporting Fortanix Data Security Manager keys to Cloud Providers for BYOK - Salesforce (Using Cache-Only Keys)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4ce7364b-479a-4a1a-b36f-1e282380e4a4","order":14,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"exporting-dsm-keys-to-cloud-providers-for-byok-alibaba","title":"Exporting DSM keys to Cloud Providers for BYOK - Alibaba","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"aade4a5d-3d08-461b-8ec7-efd7266263cd","order":15,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-data-security-manager-with-double-key-encryption-for-microsoft-365","title":"Fortanix Data Security Manager with Double Key Encryption for Microsoft 365","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3fc5992-416d-438f-8363-dabd18f91233","order":17,"documentationType":1,"children":[],"parentCategoryId":"a711b857-a52e-42a4-9765-428f25568bf5","slug":"fortanix-dsm-with-sap","title":"Fortanix DSM with SAP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"cloud-key-management-byok","title":"Cloud Key Management / BYOK","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"18d917bb-71a3-4467-8d57-ab261f0258f5","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"12300bce-b4f7-4b1a-947f-c742360557e6","order":1,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-data-security-manager-with-idcentral-key-management","title":"Using Data Security Manager with IDcentral Key Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a9e10432-b014-4fc0-8506-7facd396c30c","order":2,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-for-secrets-injection-in-kubernetes","title":"Using Fortanix Data Security Manager for Secrets Injection in Kubernetes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ba42720f-d313-4fee-a3a2-7707f4b2e6e9","order":3,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-cyberark-enterprise-password-vault","title":"Using Fortanix Data Security Manager with CyberArk Enterprise Password Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d5089173-ea81-4f62-ac1f-4bf5c5de6ec6","order":4,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-cortex-xsoar","title":"Using Fortanix Data Security Manager with Cortex XSOAR","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"636bb35b-7e2c-4c9d-9205-108f710a5cc1","order":5,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-gitlab","title":"Using Fortanix Data Security Manager with GitLab","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f7ec1366-8305-41b1-832e-45e8b25ac1f5","order":6,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-hashicorp-vault-enterprise","title":"Using Fortanix Data Security Manager with HashiCorp Vault Enterprise","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"02f8f334-75de-4906-9f5e-c9e4fd2a6e32","order":7,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-for-encrypting-kubernetes-secrets-stored-in-etcd","title":"Using Fortanix Data Security Manager for Encrypting Kubernetes Secrets Stored in etcd","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"588410af-c631-43a5-9806-2d0942925416","order":8,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-beyondtrust-password-safe","title":"Using Fortanix Data Security Manager with BeyondTrust Password Safe","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2013e79-d723-4cb4-b243-1a88435cba35","order":9,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-using-delinea-secret-server","title":"Fortanix Data Security Manager Using Delinea Secret Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f3657122-c0c3-438e-af3d-dc37556fbaf7","order":10,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-ansible-lookup-plugin","title":"Using Fortanix Data Security Manager with Ansible Lookup Plugin","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62c4e8ea-4459-4ec3-8274-fa640e4f6750","order":11,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-jenkins-plugin-library","title":"Fortanix Data Security Manager Jenkins Plugin Library","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4bb23154-ff65-467f-98c8-87d7cfc254aa","order":12,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"using-fortanix-data-security-manager-with-versasec","title":"Using Fortanix Data Security Manager with Versasec","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a8708f8c-5e4f-47ea-a234-29d2dfa9275b","order":13,"documentationType":1,"children":[],"parentCategoryId":"18d917bb-71a3-4467-8d57-ab261f0258f5","slug":"fortanix-data-security-manager-using-secret-store-csi-driver","title":"Fortanix Data Security Manager Using Secret Store CSI Driver","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"secrets-management","title":"Secrets Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2164867c-d440-4a29-a4ce-ac9b9a759887","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5e88bc0c-9d39-440b-a1e7-8beffbde237c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-to-secure-servers-and-client-keys","title":"Using Fortanix Data Security Manager to Secure Servers and Client Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"13dc0cfe-cefe-4b32-8fc7-3f75cf488269","order":2,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"generating-certificates-using-a-fortanix-data-security-manager-key","title":"Generating Certificates using a Fortanix Data Security Manager Key","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1d30be3-a39d-4725-b626-831d9ec4673c","order":3,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"migrating-private-key-from-microsoft-ad-cs-certificate-authority-to-fortanix-data-security-manager","title":"Migrating Private Key from Microsoft AD CS Certificate Authority to Fortanix Data Security Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b613d8c0-0689-49b2-a9ec-6c76d428ce15","order":4,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-appviewx-on-premises","title":"Using Fortanix Data Security Manager With AppViewX On-Premises","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cdfa9dcc-357c-4e95-ab73-03eb1d98de39","order":5,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-venafi-keyless-tls","title":"Using Fortanix Data Security Manager with Venafi - Keyless TLS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f777b0da-8fe0-47c8-a6f6-3806f0ebf03f","order":6,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-keyfactor-iis-orchestrator","title":"Using Fortanix Data Security Manager with Keyfactor IIS Orchestrator","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4d511f66-8485-442d-8f0d-c89025e4b11f","order":7,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-microsoft-pki","title":"Using Fortanix Data Security Manager with Microsoft PKI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe0cd84d-c312-46a5-8262-2a2931c8643c","order":8,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-keyfactor-ejbca-primekey","title":"Using Fortanix Data Security Manager with Keyfactor EJBCA (Primekey)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a95677cf-7bb8-4301-916f-305ce35ccc18","order":9,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-appviewx-clmaas","title":"Using Fortanix Data Security Manager With AppViewX CLMaaS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"012b3da2-18cf-4a7f-9992-42b51b1e899b","order":10,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-venafi-hsm","title":"Using Fortanix Data Security Manager with Venafi - HSM","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ee901223-210e-4d19-873d-2f54429ff290","order":11,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-manager-with-nexus-certificate-manager","title":"Using Fortanix Data Manager with Nexus Certificate Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"856c2946-3f1c-43db-913c-aface8cc7e8a","order":12,"documentationType":1,"children":[],"parentCategoryId":"2164867c-d440-4a29-a4ce-ac9b9a759887","slug":"using-fortanix-data-security-manager-with-microsoft-network-device-enrollment-service","title":"Using Fortanix Data Security Manager with Microsoft Network Device Enrollment Service","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"certificate-management","title":"Certificate Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0500104a-28fd-489f-a24f-58deaf445b22","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"1971b0b0-459e-4eb4-b60a-493b138535a5","order":1,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-with-vmware-cloud-director-encryption-management","title":"Using Fortanix Data Security Manager with VMware Cloud Director Encryption Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"722a0a05-abe8-4fc3-8678-be377a91c02f","order":2,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-for-vmware-cloud-director","title":"Using Fortanix Data Security Manager for VMware Cloud Director","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"799acc4b-bb72-4466-90b8-ebaf8d36232a","order":3,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-for-vmware-encryption-on-gcp","title":"Using Fortanix Data Security Manager For VMware Encryption on GCP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f3a13dd-f8d2-445a-a253-9769dca19dfd","order":4,"documentationType":1,"children":[],"parentCategoryId":"0500104a-28fd-489f-a24f-58deaf445b22","slug":"using-fortanix-data-security-manager-as-a-kms-to-secure-vmware-virtual-environments","title":"Using Fortanix Data Security Manager as a KMS to Secure VMware Virtual Environments","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"vmware-encryption-and-key-management","title":"VMware Encryption and Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"516e442e-34d4-4695-bf31-6145c7ef2d43","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"019c6c0f-20bf-4040-b4ff-8cb9e3352297","order":1,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-with-microsoft-iis-integration-guide","title":"Using Fortanix Data Security Manager with Microsoft IIS Integration Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc35afd6-01ae-462a-b99e-c3826a6a0f87","order":2,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-nginx-and-apache-tls-keys","title":"Using Fortanix Data Security Manager for NGINX and Apache TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c61a8cec-fba3-4004-b585-74a4ff8c9684","order":3,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"managing-fortanix-data-security-manager-keys-with-openssl-and-pkcs11-tool","title":"Managing Fortanix Data Security Manager Keys With OpenSSL and PKCS#11 Tool","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4a41afa7-0a11-4def-8206-56e200212537","order":4,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-apache-web-server-tls-keys","title":"Using Fortanix Data Security Manager for Apache Web Server TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"159cb9ff-fa1d-4be6-8625-e2f4b341f810","order":6,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"mutual-transport-layer-security-using-fortanix-data-security-manager-on-prem-only","title":"Mutual Transport Layer Security using Fortanix Data Security Manager (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"28d8a8ef-2a1a-47a1-8403-330a30329f64","order":7,"documentationType":1,"children":[],"parentCategoryId":"516e442e-34d4-4695-bf31-6145c7ef2d43","slug":"using-fortanix-data-security-manager-for-nginx-tls-keys","title":"Using Fortanix Data Security Manager for NGINX TLS Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"ssltls-encryption-and-key-management","title":"SSL/TLS Encryption and Key Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"cd743a1a-2b33-4410-84f5-df5a177cf43c","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a7bdff10-bb2e-4b0f-b571-1a9bc471e937","order":2,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-shardsecure","title":"Using Fortanix Data Security Manager with ShardSecure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d1cc998d-926b-43c0-ae52-99884fa2a129","order":3,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-nutanix","title":"Using Fortanix Data Security Manager With Nutanix","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"988cf633-a77c-4d59-a82d-c031986ac280","order":4,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-block-storage-encryption-on-linux-servers","title":"Using Fortanix Data Security Manager for Block Storage Encryption on Linux Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0d0040be-52ba-4c99-aaec-66562c31394d","order":5,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-commvault","title":"Using Fortanix Data Security Manager with Commvault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3b85fd3-7c0f-4a9c-a7ab-bd5d9414a012","order":6,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-veritas-netbackup","title":"Using Fortanix Data Security Manager with Veritas NetBackup","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3b07ada1-7b79-4fd0-84e1-856a3546aac4","order":7,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-veeam-backup-encryption","title":"Using Fortanix Data Security Manager for Veeam Backup Encryption","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2cf64a88-1685-4ec8-bbe7-fbced998780a","order":8,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-bloombase-storesafe","title":"Using Fortanix Data Security Manager with Bloombase Storesafe","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"453a367a-4f1e-460e-b5a7-b2fd14c5210b","order":9,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-as-external-kmip-in-rubrik","title":"Using Fortanix Data Security Manager as External KMIP in Rubrik","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dd68b62b-89e3-4b95-a49c-fe8c96cdc00d","order":10,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-minio-kes-server","title":"Using Fortanix Data Security Manager with MinIO (KES Server)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"29e0a744-98cd-4d99-9ab5-785adc59b0fc","order":11,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-scality-s3c","title":"Using Fortanix Data Security Manager with Scality S3C","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3bc6bb7b-aa3f-4394-afaa-c0cc7d3a4c06","order":12,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-netapp-ontap","title":"Using Fortanix Data Security Manager with NetApp ONTAP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"20e3ce07-4b08-4032-a546-06abd11347ad","order":13,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-pure-storage","title":"Using Fortanix Data Security Manager with Pure Storage","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d88a70c-7920-4c16-83c1-6ef3848e4c07","order":14,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-cohesity-encryption-keys","title":"Using Fortanix Data Security Manager for Cohesity Encryption Keys","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9b561119-09e3-44cd-bb11-501438599319","order":15,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-for-hewlett-packard-enterprise-hpe-alletra-9000","title":"Using Fortanix Data Security Manager for Hewlett Packard Enterprise (HPE) Alletra 9000","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b999b37-8b59-48f8-9f66-aa76a8801dbf","order":16,"documentationType":1,"children":[],"parentCategoryId":"cd743a1a-2b33-4410-84f5-df5a177cf43c","slug":"using-fortanix-data-security-manager-with-dell-powerflex-using-cloudlink","title":"Using Fortanix Data Security Manager with Dell PowerFlex Using CloudLink","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"storage-encryption","title":"Storage Encryption","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f8ec8d81-7e77-4581-8f59-6609819bb96a","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"172b1e0d-ddc2-484a-8bdf-ef491f2ae1b2","order":1,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-quadient-inspire-designer","title":"Using Fortanix Data Security Manager with Quadient Inspire Designer","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"87598207-106e-4b2d-9557-b4931815c300","order":2,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-for-git-commit-signing","title":"Using Fortanix Data Security Manager for Git Commit Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"65a8329d-e5b0-4fe2-8abd-bf3b83b85c78","order":3,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-sectigo-ca-for-secure-certificate-generation","title":"Using Fortanix Data Security Manager with Sectigo CA for Secure Certificate Generation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"109b9088-2618-49ed-80d0-5f9537447d3e","order":4,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-dsm-for-verifying-key-attestation-statements","title":"Using Fortanix DSM for Verifying Key Attestation Statements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"38c720f9-0d15-48b9-9a7b-dcdd8bdb6322","order":5,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-gitlab-for-code-signing","title":"Using Fortanix Data Security Manager with GitLab for Code Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ee5f03dd-b3cb-472f-939d-b9c925eaa66b","order":6,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-microsoft-cng-provider-and-signtool","title":"Using Fortanix Data Security Manager with Microsoft CNG Provider and SignTool","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bd13567d-7598-4ee1-b863-fe8d5c00a84d","order":7,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-dsm-for-issuing-key-attestation-statements","title":"Using Fortanix DSM for Issuing Key Attestation Statements","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"183b156d-5b61-49a0-b566-f7bcbfa4bb02","order":8,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"data-security-manager-with-docker-notary-for-pkcs11","title":"Fortanix Data Security Manager with Docker Notary for PKCS#11","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f4170a7-b0f9-41cc-9e34-085dcee94694","order":9,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-for-kernel-module-signing-module-guide","title":"Using Fortanix Data Security Manager for Kernel Module Signing Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d8dc8199-aba7-4e6c-8d81-2b5f24e21681","order":10,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-32-bit-signtool-for-signing-and-verifying-microsoft-office-macro-files","title":"Using Fortanix Data Security Manager with 32-Bit SignTool for Signing and Verifying Microsoft Office Macro Files","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b0e6bae2-fabd-4ce8-a121-7205b641d7fc","order":11,"documentationType":1,"children":[],"parentCategoryId":"f8ec8d81-7e77-4581-8f59-6609819bb96a","slug":"using-fortanix-data-security-manager-with-microsoft-cng-and-java-8-for-jar-signing","title":"Using Fortanix Data Security Manager with Microsoft CNG and Java 8 for JAR Signing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"code-signing","title":"Code Signing","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"858057fd-91fc-4afb-8d13-b9677a324a6d","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"71ff49a4-ebd9-48ab-b18b-9eaf29029ae7","order":1,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-data-security-manager-with-databricks","title":"Using Data Security Manager with Databricks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"411c4905-a5c0-41e9-b127-ca8483b90a80","order":3,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-data-security-manager-with-snowflake","title":"Using Data Security Manager with Snowflake","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"40e8f28e-edc7-496e-972a-592666a062eb","order":4,"documentationType":1,"children":[],"parentCategoryId":"858057fd-91fc-4afb-8d13-b9677a324a6d","slug":"using-fortanix-data-security-manager-to-create-tokenization-secret","title":"Using Fortanix Data Security Manager to Create Tokenization Secret","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"tokenization","title":"Tokenization","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a8e6ca86-3b4a-4525-868a-f7bb13367ebb","order":2,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-windows-server","title":"Using Fortanix DSM with Sumo Logic (SIEM) Integration Guide for Windows Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3b9c6e11-a924-4acb-9db8-4a093f4c2f02","order":3,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-data-security-manager-with-rapid7-insightidr","title":"Using Fortanix Data Security Manager with Rapid7 InsightIDR","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"00bc7501-92b2-4fa7-8209-b06e8df9de25","order":4,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-dsm-with-sumo-logic-siem-integration-guide-for-linux-server","title":"Using Fortanix DSM with Sumo Logic (SIEM) Integration Guide for Linux Server","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"72c9c3e5-aeb2-4343-afa1-2f574a18d838","order":5,"documentationType":1,"children":[],"parentCategoryId":"0d9e1966-27a7-4abe-b3d8-1ffe046a2609","slug":"using-fortanix-data-security-manager-with-logrhythm","title":"Using Fortanix Data Security Manager with LogRhythm","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"fortanix-log-management","title":"Log Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","order":13,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f402500b-dcdc-4672-9b6d-2c833eba1496","order":1,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"fortanix-data-security-manager-with-cloudflare-integration","title":"Fortanix Data Security Manager with Cloudflare Integration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9b529758-a084-4c0c-8823-3be88d4b4440","order":2,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"using-fortanix-data-security-manager-with-skyhigh-secure-web-gateway-swg","title":"Using Fortanix Data Security Manager with Skyhigh Secure Web Gateway (SWG)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"71165056-b87e-46e3-a944-596cafdd2f31","order":2,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"using-fortanix-data-security-manager-with-f5-big-ip-virtual-edition","title":"Using Fortanix Data Security Manager with F5 BIG-IP Virtual Edition","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"60b61fc6-8b93-4c31-9b4e-63d8aa609196","order":3,"documentationType":1,"children":[],"parentCategoryId":"2ee46bac-f3a4-4b20-b5ef-afd8470e9325","slug":"fortanix-data-security-manager-with-imperva-cloud-waf","title":"Fortanix Data Security Manager with Imperva Cloud WAF","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"firewall","title":"Web Application Firewall (WAF)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c8301ae3-0e60-40eb-89cb-6d4683b03584","order":14,"documentationType":1,"children":[],"parentCategoryId":"cb5c9616-7768-432a-a272-c754e2b4308d","slug":"pgp-integration-with-jce-provider-and-bouncy-castle","title":"PGP Integration with JCE Provider and Bouncy Castle","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"use-cases-and-integrations","title":"Use-cases and Integrations","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"b0f2a62b-1633-4fd9-8696-61173ae92df6","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"570ed4e0-3007-45bc-8bd9-09342e9299c0","order":1,"documentationType":1,"children":[],"parentCategoryId":"b0f2a62b-1633-4fd9-8696-61173ae92df6","slug":"dsm-rest-apis","title":"DSM REST APIs","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3aa415f1-1f4d-450f-99c5-d64069526dda","order":2,"documentationType":1,"children":[],"parentCategoryId":"b0f2a62b-1633-4fd9-8696-61173ae92df6","slug":"dsm-java-sdk-and-jce-provider-documentation","title":"DSM Java SDK and JCE Provider Documentation","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"dsm-api-documentation","title":"DSM API Documentation","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9ebde975-74e3-4746-b0b3-0b95798911ff","order":1,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-fortanix-data-security-manager","title":"What is Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"abedd2d7-07d4-48b7-8b07-93d1053f0f41","order":2,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"why-should-i-use-fortanix-data-security-manager","title":"Why should I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9e60abd4-3098-46dd-ad88-e439a71be90d","order":3,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-do-i-get-started-with-fortanix-data-security-manager","title":"How do I get started with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4f1faa21-8e1b-4a29-8158-f49489f5aabc","order":4,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-default-version-of-dsm-installed-in-on-prem","title":"What is the default version of DSM installed in on-prem?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"dbc251d3-bfee-4342-aca1-8a8c7fbab247","order":5,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-does-fortanix-data-security-manager-work","title":"How does Fortanix Data Security Manager work?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f73eb62-e101-49af-8f8a-e2f76f684cf9","order":6,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-languages-and-interfaces-are-supported-by-fortanix-data-security-manager","title":"What languages and interfaces are supported by Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e3843c06-22e2-4661-807c-b59a6d8593e7","order":7,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-will-i-be-charged-and-billed-for-using-fortanix-dsm-as-a-service","title":"How will I be charged and billed for using Fortanix DSM as a Service?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"57834e64-5c87-4dd9-8594-6200d64be95b","order":8,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-fortanix-dsm-saas-version","title":"How to check the Fortanix DSM SaaS version?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b4f3f4ce-7ba5-4fd1-9c7e-57c6e1548ff5","order":9,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-algorithms-are-supported-by-fortanix-data-security-manager","title":"What algorithms are supported by Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4f582d1e-559c-4e18-9f38-06884995e873","order":10,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-list-of-browsers-that-fortanix-dsm-supports","title":"What are the list of browsers that Fortanix DSM supports?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"be287ad8-790b-4f4a-a77f-f78f1b005635","order":11,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-kmip-coverage-do-we-provide","title":"What KMIP coverage do we provide?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da1bf994-4fa1-46b2-beb7-a881fb359392","order":12,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-it-possible-to-talk-to-fortanix-dsm-using-pykmip","title":"Is it possible to talk to Fortanix DSM using PyKMIP?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"aa320a2d-38ce-4610-9057-6aa695ca60a6","order":13,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-key-check-value-for-a-fortanix-dsm-security-object","title":"What is Key Check Value for a Fortanix DSM security object ?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d3a4bb75-b16a-4151-8439-695076bc18fe","order":14,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-do-secrets-lifecycle-management","title":"Can Fortanix do secrets lifecycle management?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6d6b509-18fd-4b90-925e-5bb3bbd1e2e4","order":15,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-a-fortanix-dsm-application-search-secrets-which-are-only-created-by-it-in-the-kms","title":"Does a Fortanix DSM application search for secrets that are only created by it?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c654000e-56f1-41c1-9061-2d18dd4649cf","order":16,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-i-add-a-quorum-approval-policy-for-system-level-log-management-changes-in-fortanix-data-security-manager","title":"Can I add a Quorum approval policy for system-level log management changes in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c2df6658-e66b-4991-b659-a12651542429","order":17,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-difference-between-invite-user-and-create-new-user-api","title":"What is the difference between Invite User and Create New User API","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1a1f8ce5-ae19-4eef-868c-e4af585eb465","order":18,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-download-all-secrets","title":"How to download all secrets?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"381f6783-8e9e-4f46-bc2c-1d6e03dac202","order":19,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-an-account-in-dsm-be-a-tenant-account","title":"Can an account in Fortanix DSM be a tenant account?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47464be3-6fb5-40d4-aa5e-20208ce951bd","order":20,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-support-pkcs12","title":"Does Fortanix DSM support PKCS#12 ?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"547db959-69e0-4b79-adcd-35a33dad4f21","order":21,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-support-the-certificate-management-protocol-cmp","title":"Does Fortanix DSM support the Certificate Management Protocol (CMP)?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"830c2742-369f-4731-b515-e22233581cb3","order":22,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-i-import-keys-into-fortanix-data-security-manager","title":"Can I import keys into Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"05b08c8d-dd2b-479a-9f0c-d5db13d1a508","order":23,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-application-level-encryption-in-fortanix-dsm","title":"What is application-level encryption in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"935c9961-4c19-4446-8057-e340e368c685","order":24,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-mfa-device-attestation-including-self-attestation-and-the-attestation-id-response-and-type-what-does-the-binary-response-from-a-u2f-device","title":"What is MFA device attestation, self-attestation, and the attestation ID, response, and type? What does the binary response from a U2F device include?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c261fc5-e811-4583-a638-eda9ae5a6913","order":25,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-you-change-the-non-export-key-attribute-to-export","title":"Can you change the non-exportable key attribute to export?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e008c3c5-ce14-4c15-9b1b-5d9495ca8d0c","order":26,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"which-key-will-be-created-on-fortanix-dsm-in-the-minio-integration","title":"Which key will be created on Fortanix DSM in the MinIO integration?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3e01b8af-8a67-4269-8d4b-b15dee07fe61","order":27,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-kind-of-policies-can-be-applied-to-secret-security-objects-in-fortanix-dsm","title":"What kind of policies can be applied to Secret security objects in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"89451d2f-3a37-463e-b711-3ae9e12791bb","order":28,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-restart-an-sdkms-ui-service-on-a-hardware-cluster","title":"How to restart an sdkms-ui service on a hardware cluster?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b9f9579e-631e-488a-a1a3-f961e1f2c39d","order":29,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-dsm-api-retrieve-more-than-1001-account-information","title":"Can Fortanix DSM API retrieve more than 1001 account information?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"c75b0822-2129-46f6-865b-18599454b4b3","order":30,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-crypto-operations-by-transient-keys-in-dsm","title":"How to check the crypto operations by transient keys in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"64145265-5c0f-4602-98f8-32af0f2c3644","order":31,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-there-an-option-to-expire-a-security-object-at-a-specific-date-or-after-a-certain-time-period","title":"Is there an option to expire a security object at a specific date or after a certain time period?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6108dcf5-861e-4b06-bdd1-129959f36b10","order":32,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-cluster-attestation-and-why-should-i-use-it-on-prem-only","title":"What is cluster attestation and why should I use it? (on-prem only)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1239ebe1-3d83-4789-9f99-777a219771e8","order":33,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-key-management-features-are-available-in-fortanix-data-security-manager","title":"What key management features are available in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"482a71b6-e41b-4c04-a532-b3f3fee9a76c","order":34,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-does-unregistered-user-mean-in-fortanix-dsm","title":"What does unregistered user mean in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"84690147-6845-4ecd-aeaf-b72d01519ceb","order":35,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"why-is-the-fpe-policy-not-set-for-a-key","title":"Why is the FPE policy not set for a key?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"521879ed-bd6b-4c4b-bd90-7cd45e39cb17","order":36,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-is-encryption-and-decryption-done-if-i-use-fortanix-data-security-manager","title":"Where is encryption and decryption done if I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"438454cc-cc59-4dea-aa56-67e72a0d3282","order":37,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-do-my-keys-live-if-i-use-fortanix-data-security-manager","title":"Where do my keys live if I use Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b391f3d-a8a9-42de-9e78-414f16ae1858","order":38,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-cryptographic-operations-are-available-in-fortanix-data-security-manager","title":"What cryptographic operations are available in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb10a231-655b-4fc4-ac3a-9400cc2956a3","order":39,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-tokenization-transaction-per-second-in-dsm","title":"What is tokenization transaction per second in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62877012-d2ee-4d62-a168-861cb4e4e17b","order":40,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-employees-access-my-keys","title":"Can Fortanix employees access my keys?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da50f81a-7c42-4b77-b2e4-33c3d64bd748","order":41,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-differences-between-the-two-types-of-objects-we-can-use-to-store-sensitive-information-opaque-and-secret","title":"What are the differences between the two types of objects we can use to store sensitive information, OPAQUE and SECRET?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e61313c4-31f3-4e36-87d2-1dccac9c69d4","order":42,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-has-fortanix-dsm-done-to-mitigate-ui-slowdown-if-an-account-contains-many-700-very-large-300kb-security-objects","title":"What has Fortanix DSM done to mitigate UI slowdown if an account contains many (> 700) very large (>300kb) security objects?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d6c695c1-e2d3-4819-ad61-3ee27d875045","order":43,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"faqs-fortanix-data-security-manager-ui","title":"FAQs - Fortanix Data Security Manager UI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"549d60b9-dca2-4744-8591-c8e844a772ba","order":44,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-transient-keys","title":"What are Transient keys?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ad32a763-611c-414f-bafd-26324f1da43a","order":45,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-check-the-subscription-type-for-a-dsm-on-premises-deployment","title":"How to check the subscription type for a DSM on-premises deployment?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88cae2c0-a1aa-40f9-bc7d-338fee2c8b69","order":46,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-does-fortanix-data-security-manager-compare-with-aws-kms-and-azure-key-vault","title":"How does Fortanix Data Security Manager compare with AWS KMS and Azure Key Vault?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1347ee84-3e6d-4a5a-a8f2-2449474c38a3","order":47,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-support-cassandra-encryption-using-dsm","title":"Does Fortanix support Cassandra encryption using DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b5bec9f9-c4bb-4359-9f85-51686c374799","order":48,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-difference-between-lua-and-rust-programming-language-in-fortanix-data-security-manager","title":"What is the difference between Lua and Rust programming language in Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0aad2e42-52bd-49dd-84f8-284cc5410dab","order":49,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-to-find-ca-certs-to-run-fortanix-dsm-accelerator-webservice","title":"Where to find CA certs to run Fortanix DSM Accelerator Webservice?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"636ce56b-21fa-4ea5-8e8c-2ff0d93adee3","order":50,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-bandwidth-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","title":"What are the bandwidth network requirements when deploying Fortanix DSM in multiple sites?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"70e57633-f61b-42f7-afc4-62e56d57075d","order":51,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-are-the-latency-network-requirements-when-deploying-fortanix-dsm-in-multiple-sites","title":"What are the latency network requirements when deploying Fortanix DSM in multiple sites?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3228bd22-b713-465f-b720-02f01ffce011","order":52,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"could-a-failed-power-supply-even-though-indicator-light-is-green-be-a-firmware-issue","title":"Could a failed power supply even though indicator light is green be a firmware issue in DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fe5365f6-82b2-4860-a3f9-3ebc23faf824","order":53,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"lms-keys-faqs","title":"LMS Keys - FAQs","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f83febaa-a9d5-4f3f-85b0-65a479777807","order":54,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"where-can-i-find-the-ipmi-logs","title":"Where can I find the IPMI logs?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"47e94fc6-7f82-4e71-b0b6-a400bbd675fd","order":55,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"can-fortanix-protect-against-quantum-computing","title":"Can Fortanix protect against quantum computing?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8bb4b284-066f-49ff-ae33-76c07952e923","order":56,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"what-is-the-fortanix-security-vulnerability-reporting-process","title":"What is the Fortanix security vulnerability reporting process?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8bc23b9d-1eb4-422b-8be3-3c27605d35ad","order":57,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-get-the-authorized-redirect-uri-for-workspace-cse","title":"How to get the authorized redirect URI for Workspace CSE?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"875296fa-8d59-459f-bc7c-2a800130418d","order":58,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"how-to-perform-cassandra-replication-in-fortanix-dsm","title":"How to perform Cassandra replication in Fortanix DSM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b7dbd4bd-bcc7-4108-b0ad-b55bdd176d4d","order":59,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"your-hardware-enablement-stack-hwe-is-supported-until-april-2025-what-does-this-mean","title":"Your Hardware Enablement Stack (HWE) is supported until April 2025. What does this mean?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc14710f-ede8-4490-95d2-6bafd0b77755","order":60,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"is-fortanix-iso-27001-certified","title":"Is Fortanix ISO 27001 certified?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4a364cfa-95b5-41dc-9e9f-ea3133bf4876","order":61,"documentationType":1,"children":[],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"does-fortanix-dsm-have-any-hardened-os-best-practices","title":"Does Fortanix DSM have any hardened OS best practices?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"061acbab-e538-4730-95ba-c114408a8cf9","order":62,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"34ea6969-f0f1-4106-bbd7-0f786dd7d820","order":1,"documentationType":1,"children":[],"parentCategoryId":"061acbab-e538-4730-95ba-c114408a8cf9","slug":"does-fortanix-data-security-manager-include-a-web-application-firewall-waf-should-i-configure-a-waf-with-fortanix-data-security-manager","title":"Does Fortanix Data Security Manager include a Web Application Firewall (WAF)? Should I configure a WAF with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"21950b53-819f-4274-83fe-49cb20d6a07a","order":2,"documentationType":1,"children":[],"parentCategoryId":"061acbab-e538-4730-95ba-c114408a8cf9","slug":"can-i-use-a-proxy-with-fortanix-data-security-manager","title":"Can I use a proxy with Fortanix Data Security Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"5d97baeb-9bf1-415a-ba0b-aa760fd016eb","slug":"security","title":"Security","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"1c660f27-d8b4-4f43-92c2-5670cb490388","slug":"faqs","title":"FAQs","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-data-security-manager-dsm","title":"Fortanix Data Security Manager (DSM)","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"46d0d3d3-3c76-4767-983e-c95de9be2445","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"33ab26db-3c4d-4230-962a-9331ba7b7f83","order":2,"documentationType":1,"children":[],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-saas-ip-whitelisting","title":"Fortanix SaaS IP Whitelisting","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2385c68c-ad4e-4a10-8ff6-4e007ad1df76","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7b9f6be0-466f-451e-ad28-1c9f98e9797c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2385c68c-ad4e-4a10-8ff6-4e007ad1df76","slug":"fortanix-armor-overview","title":"Fortanix Armor Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"about-fortanix-armor","title":"About Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"469eb425-34a1-4341-8a5c-18ce2aa12953","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5f1acea8-5722-437a-b8b4-5b170f3207a9","order":1,"documentationType":1,"children":[],"parentCategoryId":"469eb425-34a1-4341-8a5c-18ce2aa12953","slug":"fortanix-armor-getting-started","title":"Fortanix Armor - Getting Started","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"getting-started-with-fortanix-armor","title":"Getting Started with Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"25b04517-45ef-46b6-8fa3-e2186d9b6534","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"120c1003-4e39-4e41-b2f4-421dbb5e1060","order":1,"documentationType":1,"children":[],"parentCategoryId":"25b04517-45ef-46b6-8fa3-e2186d9b6534","slug":"fortanix-armor-solutions","title":"Fortanix Armor - Solutions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-armor--solutions","title":"Fortanix Armor Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4d459ac7-bec0-4b68-b634-2fc0a0f84622","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"670f7799-ff5e-488e-87cc-74c0274d6168","order":1,"documentationType":1,"children":[],"parentCategoryId":"4d459ac7-bec0-4b68-b634-2fc0a0f84622","slug":"fortanix-armor-identity-and-access-management-iam","title":"Fortanix Armor Identity and Access Management (IAM)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"46d0d3d3-3c76-4767-983e-c95de9be2445","slug":"fortanix-armor-identity-and-access-management","title":"Fortanix Armor Identity and Access Management","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-armor","title":"Fortanix Armor","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ec4b7d6b-13c6-44b6-a4fb-d10142e1b86d","order":1,"documentationType":1,"children":[],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-overview","title":"Fortanix Key Insight Overview","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b7353a0c-64e5-4f77-8e46-93dfa040793f","order":2,"documentationType":1,"children":[],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-architecture","title":"Fortanix Key Insight Architecture","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"30502515-b145-463b-8389-c5b7e49c360f","order":1,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-concepts","title":"Fortanix Key Insight Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3dcd1537-1644-4825-8594-b59696b33b93","order":2,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-aws-concepts","title":"Fortanix Key Insight for AWS Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99bd7edd-1937-4e71-ae1d-4b7117afc292","order":3,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-azure-concepts","title":"Fortanix Key Insight for Azure Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2e3d1999-b4b2-4271-9cd7-1d39332d3d16","order":4,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-on-premises-concepts","title":"Fortanix Key Insight for On-Premises Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8bf4d44-cd62-435f-b4fc-f7e29c82f5a7","order":5,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-external-key-source-concepts","title":"Fortanix Key Insight for External Key Source Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5925d92f-a45f-4c91-b03a-43cba7df20fa","order":6,"documentationType":1,"children":[],"parentCategoryId":"a2ae711b-41b8-4ca0-ab8c-a6e28998f72c","slug":"fortanix-key-insight-for-pqc-central-concepts","title":"Fortanix Key Insight for PQC Central Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-definitions","title":"Fortanix Key Insight Concepts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"748d51eb-aa0f-468e-ba4f-f285a13edd6f","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"18828884-4e91-4eb9-ab85-72136dea03f2","order":1,"documentationType":1,"children":[],"parentCategoryId":"748d51eb-aa0f-468e-ba4f-f285a13edd6f","slug":"fortanix-key-insight-getting-started-with-cloud-connection","title":"Fortanix Key Insight - Getting Started With Cloud Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"fortanix-key-insight-getting-started-with-cloud","title":"Cloud Connection - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"eacfad66-53d2-4729-88a1-a85197cefef1","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ae20ee86-fd4b-4895-b198-fa44a70d41de","order":1,"documentationType":1,"children":[],"parentCategoryId":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","slug":"fortanix-key-insight-aws-connection-permissions","title":"Fortanix Key Insight - AWS Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2c13255f-23da-4988-b3db-fb46ea3b1e25","order":2,"documentationType":1,"children":[],"parentCategoryId":"564f0b2d-df2f-4fbb-8cea-3a52e7f0003c","slug":"fortanix-key-insight-azure-connection-permissions","title":"Fortanix Key Insight - Azure Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"cloud-connection-permissions","title":"Cloud Connection - Permissions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"c481542b-a8de-442b-b934-40488bf73815","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"3b14e71e-bed7-45d8-821b-6dd5dc814ca0","order":1,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-azure-configuration-for-microsoft-entra-id-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - Azure Configuration For Microsoft Entra ID as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"66184394-7fc7-4f2b-8540-23a280f2c872","order":2,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-azure-configuration-for-pingone-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - Azure Configuration For PingOne as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e02c41a1-a820-4166-8a2a-1e7940fd1766","order":3,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-aws-configuration-for-pingone-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - AWS Configuration For PingOne as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d7ac61a4-3b20-447c-a7e3-da333b081661","order":4,"documentationType":1,"children":[],"parentCategoryId":"c481542b-a8de-442b-b934-40488bf73815","slug":"fortanix-key-insight-aws-configuration-for-microsoft-entra-id-as-open-id-connect-identity-provider","title":"Fortanix Key Insight - AWS Configuration For Microsoft Entra ID as Open ID Connect Identity Provider","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"cloud-connection-configuration-for-open-id-connect","title":"Cloud Connection - Open ID Connect IdP Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"3b6264ef-002f-4717-9e67-4dd73930ca1c","order":3,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-aws-configuration-for-scanning","title":"Fortanix Key Insight - AWS Configuration for Scanning","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"96801005-b8c0-4ae6-b40f-f3ed66835581","order":4,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-azure-configuration-for-scanning-using-custom-roles","title":"Fortanix Key Insight - Azure Configuration for Scanning Using Custom Roles","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb94cc66-0158-4029-aa8d-f4ad88f71508","order":5,"documentationType":1,"children":[],"parentCategoryId":"eacfad66-53d2-4729-88a1-a85197cefef1","slug":"fortanix-key-insight-azure-configuration-for-scanning-using-built-in-roles","title":"Fortanix Key Insight - Azure Configuration for Scanning Using Built-In Roles","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"cloud-connection-scanning-configuration","title":"Cloud Connection - Scanning Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9e69bb13-5af6-477c-b437-b7a90755b98c","order":1,"documentationType":1,"children":[],"parentCategoryId":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","slug":"fortanix-key-insight-user-interface-components-aws","title":"Fortanix Key Insight User Interface Components - AWS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9c49abd7-877c-4922-840c-c2e74de88e6d","order":2,"documentationType":1,"children":[],"parentCategoryId":"bd66e79f-ea67-4e8d-9b0e-bded9126c2a4","slug":"fortanix-key-insight-user-interface-components-azure","title":"Fortanix Key Insight User Interface Components - Azure","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"588fd67f-81a9-46c9-9f2b-f7c4a319b204","slug":"cloud-connection-user-interface-components","title":"Cloud Connection - User Interface Components ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-cloud-connection","title":"Fortanix Key Insight - Cloud Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2d7ff7db-6f3e-40f5-93d1-2affd79a9d2a","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"f051e8e8-74bf-4aa3-a0fc-79afcc89561c","order":1,"documentationType":1,"children":[],"parentCategoryId":"2d7ff7db-6f3e-40f5-93d1-2affd79a9d2a","slug":"fortanix-key-insight-getting-started-with-on-premises-connection","title":"Fortanix Key Insight - Getting Started With On-Premises Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-getting-started","title":"On-Premises Connection - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"571a3715-bc8d-464e-95e2-a83897dc82d1","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"09eaf7b4-a85a-458f-b876-38644280e6ad","order":1,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-connection-permissions","title":"Fortanix Key Insight - On-Premises Connection Permissions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"82a93b31-f4e9-4584-87cd-46c3c6642458","order":2,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-configuration-for-scanning","title":"Fortanix Key Insight - On-Premises Configuration for Scanning","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bb13b841-409d-402b-889f-8797f52d1b2b","order":3,"documentationType":1,"children":[],"parentCategoryId":"571a3715-bc8d-464e-95e2-a83897dc82d1","slug":"fortanix-key-insight-on-premises-scanner-integration-with-hashicorp-vault","title":"Fortanix Key Insight - On-Premises Scanner Integration With HashiCorp Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-scanning-configuration","title":"On-Premises Connection - Scanning Configuration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"894cc29f-c2a7-4308-a7d5-8d2ecb5b676a","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b1cfb70b-2eb0-4a27-8fa5-3549526de6a7","order":1,"documentationType":1,"children":[],"parentCategoryId":"894cc29f-c2a7-4308-a7d5-8d2ecb5b676a","slug":"fortanix-key-insight-user-interface-components-on-premises","title":"Fortanix Key Insight User Interface Components - On-Premises Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"e8325282-ecf7-4f4a-b3c1-3b7a7c714bc1","slug":"on-premises-connection-user-interface-components","title":"On-Premises Connection - User Interface Components ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-on-premises-connection","title":"Fortanix Key Insight - On-Premises Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"ae620651-a681-45a4-a9f0-c490b7b27401","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ecdf3a9b-ff4f-40d1-ab7f-16ed43e29bb5","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a3338d3-e7e9-413e-abf2-2533787da892","order":1,"documentationType":1,"children":[],"parentCategoryId":"ecdf3a9b-ff4f-40d1-ab7f-16ed43e29bb5","slug":"fortanix-key-insight-getting-started-with-external-key-source-connection","title":"Fortanix Key Insight - Getting Started With External Key Source Connection","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"ae620651-a681-45a4-a9f0-c490b7b27401","slug":"external-key-source-getting-started","title":"External Key Source - Getting Started","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"16d91802-75c4-4f37-bf4b-4acc3f47f967","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"cc9f23f8-8b79-4d3b-9d62-07db7c034975","order":1,"documentationType":1,"children":[],"parentCategoryId":"16d91802-75c4-4f37-bf4b-4acc3f47f967","slug":"fortanix-key-insight-user-interface-components-external-key-source","title":"Fortanix Key Insight User Interface Components - External Key Source","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"ae620651-a681-45a4-a9f0-c490b7b27401","slug":"external-key-source-user-interface-components","title":"External Key Source - User Interface Components","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-external-key-source-connection","title":"Fortanix Key Insight - External Key Source Connection","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"075544a4-05f1-44fd-b605-2f02f3639bcd","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"fc69cc6e-dbe0-4aee-87a4-669deb5cfc9e","order":1,"documentationType":1,"children":[],"parentCategoryId":"075544a4-05f1-44fd-b605-2f02f3639bcd","slug":"fortanix-key-insight-user-interface-components-pqc-central","title":"Fortanix Key Insight User Interface Components - PQC Central","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"8c305103-3d37-4d16-bc9e-fa335d87cfe1","slug":"fortanix-key-insight-pqc-central","title":"Fortanix Key Insight - PQC Central","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-key-insight","title":"Fortanix Key Insight","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"77f19afa-0031-4851-9792-3bb13c20b06c","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"a4bf6d1e-cd7a-48b2-9ab9-0de1f4fba133","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"db4b272d-e235-4deb-b3f5-538ded135102","order":1,"documentationType":1,"children":[],"parentCategoryId":"a4bf6d1e-cd7a-48b2-9ab9-0de1f4fba133","slug":"quickstart-guide","title":"Quickstart Guide","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"fortanix-quickstart","title":"Quickstart","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8b2d62b8-68b7-411e-a61c-b2fa85dd6df4","order":1,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"fortanix-overview-and-definitions","title":"Overview and Definitions","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c1f549f-2d58-48a7-8892-3a52b80a1c52","order":2,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-logging-in","title":"User's Guide: Logging in","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"371eaed7-cb93-49e2-8a45-43fa84de67b8","order":3,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-groups-and-third-party-groups-concepts","title":"User's Guide: Groups and Third-Party Groups - Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fd83d4f0-c783-4244-91b7-cc39f0033509","order":4,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-create-groups","title":"User's Guide: Create Groups","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"089f7531-5380-4649-ab12-88c4c5595a09","order":5,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"application-and-compute-node-policy-enforcement","title":"Application and Compute Node Policy Enforcement","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"62def226-c84a-4b56-9ee5-3f9b45c68ebc","order":6,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-aws-nitro-file-persistence","title":"User's Guide: AWS Nitro File Persistence","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"53ae5c32-b9a7-4443-abbf-fd3bb2cecbe7","order":7,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-azure-active-directory-authentication","title":"User's Guide: Azure Active Directory Authentication","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0038b733-c122-48ec-a0d9-3fb5b376a9dc","order":8,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"error-handling-in-fortanix-confidential-computing-manager","title":"Error Handling in Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fccd9091-750b-4118-b3c9-47ab76630968","order":9,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-deploying-the-aci-application-using-azure-portal","title":"User's Guide - Deploying the ACI Application Using Azure Portal","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8c8b1557-5f57-44b4-a3ae-c9f95fa41c3e","order":10,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"users-guide-invite-users","title":"User's Guide: Invite Users","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6e5b4ea2-2394-44a2-b875-e6535c69e72d","order":11,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"fortanix-users-guide-logging","title":"User's Guide: Logging","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"99be8fe1-09f8-4bb6-b0d8-f58820be8eab","order":12,"documentationType":1,"children":[],"parentCategoryId":"aeac05ed-cec1-46e1-bca7-fa02ba26923c","slug":"troubleshooting","title":"Troubleshooting","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"getting-started-with-fortanix-ccm","title":"Getting Started with Fortanix CCM","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"d842c8b1-e453-4600-8579-e055464e891c","order":3,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","order":74,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"7b486683-2e2a-4ef8-8ed8-2a59a4542f9a","order":1,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-provision-nitro-compute-node-using-aws-marketplace","title":"User's Guide: Provision Nitro Compute Node Using AWS Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"947f0439-81ba-413d-86e2-e84e1b04e8b4","order":2,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-using-azure-marketplace","title":"User's Guide: Enroll a Compute Node Using Azure Marketplace","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"88a74500-0b58-4ef0-9d81-a92975bf2669","order":3,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-bare-metal-or-vm-sgx","title":"User's Guide: Enroll a Compute Node (bare metal or VM) - SGX","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1983cc1c-f511-4a27-9799-1128fd333a9c","order":4,"documentationType":1,"children":[],"parentCategoryId":"b9e5efe2-08f0-4d84-8ca2-b55a601c37e9","slug":"users-guide-enroll-a-compute-node-using-aws-nitro-on-amazon-linux","title":"User's Guide: Enroll a Compute Node Using AWS Nitro on Amazon Linux","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"enroll-compute-node","title":"Enroll Compute Node","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"66d26412-2d7d-4372-a75a-6f617b86053d","order":75,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"kernel-version-supported","title":"Kernel Version Supported","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6877db90-a795-4b1a-8997-a312ce69d39f","order":76,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"supported-vms-for-azure-confidential-computing","title":"Supported VMs for Azure Confidential Computing","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"5062afae-0576-4e7a-86e8-c93605b2bc56","order":77,"documentationType":1,"children":[],"parentCategoryId":"5e4336cb-0eba-425c-9375-2e4f84b7f53e","slug":"users-guide-compute-nodes","title":"User's Guide: Compute Nodes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"compute-nodes","title":"Compute Nodes","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a96dca99-c704-4e29-9929-f9af49bfaab8","order":2,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"32701d3a-1ed8-4421-b634-90ed6d77d56d","order":1,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-deploy-the-workflow-manual","title":"User's Guide: Deploy the Workflow - Manual","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e55d4f9f-3287-4cc9-b148-e78fff3556e4","order":2,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-deploy-the-workflow-web-interface","title":"User's Guide: Deploy the Workflow - Web Interface","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"86a85ada-8d4d-45a1-9ca7-37443869fc61","order":3,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-create-update-clone-and-delete-workflows","title":"User's Guide: Create, Update, Clone, and Delete Workflows","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b71f4897-8cf1-4ff1-aff1-583243451539","order":4,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-run-the-workflow-web-interface-aci-applications","title":"User's Guide: Run the Workflow - Web Interface - ACI Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a604cdd6-3c36-4f6a-9070-c4c8b636b1de","order":5,"documentationType":1,"children":[],"parentCategoryId":"a96dca99-c704-4e29-9929-f9af49bfaab8","slug":"users-guide-run-the-workflow-web-interface-aws-nitro-applications","title":"User's Guide: Run the Workflow - Web Interface - AWS Nitro Applications","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"fortanix-workflows","title":"Workflows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"34dc874f-315d-491a-a3c1-3d963320fcc2","order":3,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-update-revoke-third-party-groups","title":"User's Guide: Create, Update, Revoke Third-Party Groups","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3e966992-8656-424d-9a18-2bbc65ab5030","order":4,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-add-and-edit-an-application","title":"User's Guide: Add and Edit an Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8b8b08bd-5c94-4c9b-b3c4-420624cb3df9","order":5,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-image-registry","title":"User's Guide: Image Registry","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f0213796-1975-41e5-9e9d-adc064e42a99","order":6,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-an-image","title":"User's Guide: Create an Image","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a35cf027-e436-44ac-9401-775137f32de8","order":7,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-domain-and-application-image-approval","title":"User's Guide: Domain and Application Image Approval","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"283e458a-753d-4632-9fac-0cfd091168b4","order":8,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"running-an-example-application-using-sgx-platform","title":"Running an Example Application Using SGX Platform","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ecef2782-6cc7-40f8-859c-576e2330ade3","order":9,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"running-an-example-application-using-aws-nitro-platform","title":"Running an Example Application using AWS Nitro Platform","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b0463243-a2e9-40c4-a3d0-b34389adfeb3","order":10,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-convert-applications-deprecated","title":"User's Guide: Convert Applications - (Deprecated)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"469d13c9-e934-497f-ae6a-813076294446","order":11,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-application-configuration","title":"User's Guide: Create Application Configuration","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da4a3b27-c21e-4765-9300-5b70a5e19460","order":12,"documentationType":1,"children":[],"parentCategoryId":"d842c8b1-e453-4600-8579-e055464e891c","slug":"users-guide-create-datasets","title":"User's Guide: Create Datasets","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"users-guide-using-applications-and-datasets","title":"User's Guide: Using Applications and Datasets","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"e40248c2-ab73-4e8e-a435-1c444141cac1","order":4,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8e8ff0d6-de1d-49e9-869c-ab4a86e52861","order":1,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-configuring-third-party-groups-using-data-connectors-and-scripts","title":"User's Guide: Configuring Third-Party Groups Using Data Connectors and Scripts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"05919f8a-eab3-4872-94bc-e77dd8261adf","order":2,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-concepts","title":"User's Guide: Concepts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3571d0b2-2904-4030-96e0-9ebc465eef79","order":3,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-inbound-connector","title":"User's Guide: Inbound Connector","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"131ef499-548d-4cc2-a92e-a19ed1473341","order":4,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-scripts","title":"User's Guide: Scripts","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2baf2f9b-638d-45bc-b3c5-e1edd6c9f420","order":5,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-outbound-connector","title":"User's Guide: Outbound Connector","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3d746905-25e3-4be2-b886-4436a09e97cc","order":6,"documentationType":1,"children":[],"parentCategoryId":"e40248c2-ab73-4e8e-a435-1c444141cac1","slug":"users-guide-configure-and-run-the-workflow","title":"User's Guide: Configure and Run the Workflow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"users-guide-using-data-connectors-and-scripts","title":"User's Guide: Using Data Connectors and Scripts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","order":5,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ceddf3c5-42c2-47f3-a59d-24df35c48595","order":1,"documentationType":1,"children":[],"parentCategoryId":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","slug":"system-administration-account-and-users","title":"System Administration - Account and Users","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"21a221ec-8345-42da-9101-96464e9527e8","order":2,"documentationType":1,"children":[],"parentCategoryId":"fa85af18-c0a7-41cd-b3b1-99a452b9c25c","slug":"system-administration-log-management","title":"System Administration - Log Management","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"system-administration","title":"System Administration","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"29546823-c18e-4615-82d5-ea402bd7eba5","order":6,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"00daf9c7-db50-4c5c-ac01-8a9709cf880f","order":1,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"bringing-edp-rust-apps-to-confidential-computing-manager","title":"Bringing EDP Rust Apps to Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9bab6842-2f19-4a41-bd00-c79d845ec92b","order":2,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"using-ccm-cli-with-fortanix-confidential-computing-manager","title":"Using CCM-CLI with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7668efe6-04bf-483e-a7b3-6a3df328d398","order":3,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"how-to-configure-trusted-ca-to-outside-parties","title":"How to configure trusted CA to outside parties","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"3301c27a-fbdc-4444-9ee0-bb32305a8737","order":5,"documentationType":1,"children":[],"parentCategoryId":"29546823-c18e-4615-82d5-ea402bd7eba5","slug":"tips-and-tricks","title":"Tips and tricks","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"developers-guide","title":"Developer's Guide","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"212119b5-214a-4725-aeab-7d6b97d2da27","order":7,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"460f25e1-1c20-4831-9871-026aadcf6de2","order":1,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"azure-service-principal-with-fortanix-confidential-computing-manager","title":"Azure Service Principal with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7b25a86e-a8d5-4268-b94d-f3a2dd05b5ad","order":2,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"azure-kubernetes-service-with-fortanix-confidential-computing-manager","title":"Azure Kubernetes Service with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2cd59fdb-ae8a-4ab3-94d8-7674001ddafa","order":3,"documentationType":1,"children":[],"parentCategoryId":"212119b5-214a-4725-aeab-7d6b97d2da27","slug":"amazon-elastic-kubernetes-service-with-fortanix-confidential-computing-manager","title":"Amazon Elastic Kubernetes Service with Fortanix Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"fortanix-infrastructure","title":"Infrastructure","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"6ddcae21-359c-434f-ada4-18ae96d81c29","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"9cbf8e2f-f4ed-4bfa-9df9-1bd3bd4fced6","order":1,"documentationType":1,"children":[],"parentCategoryId":"6ddcae21-359c-434f-ada4-18ae96d81c29","slug":"fortanix-confidential-computing-manager-sgx-attestation-process","title":"Fortanix Confidential Computing Manager - SGX Attestation Process (Deprecated)","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0907c6e8-0e26-4f6e-9648-274f5c657104","order":2,"documentationType":1,"children":[],"parentCategoryId":"6ddcae21-359c-434f-ada4-18ae96d81c29","slug":"fortanix-confidential-computing-manager-usage-workflow","title":"Fortanix Confidential Computing Manager Usage Workflow","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"knowledge-base","title":"Knowledge Base","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"589523a5-c96b-4198-a1b5-dc51834cf1b4","order":9,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"059a7a0a-d58c-4cf7-b454-947145c16af4","order":1,"documentationType":1,"children":[],"parentCategoryId":"589523a5-c96b-4198-a1b5-dc51834cf1b4","slug":"confidential-computing-manager-azure-managed-application","title":"Confidential Computing Manager Azure Managed Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"azure-managed-application","title":"Azure Managed Application","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","order":10,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"4c90b467-c76d-48e9-8a74-1bf8171a3f06","order":1,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-fortanix-confidential-computing-manager","title":"What is Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"fc67e2bf-6f4b-46f6-9f57-7e7ee7a785cb","order":2,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-compute-nodes-in-fortanix-confidential-computing-manager","title":"What are Compute Nodes in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"da3d3e50-48b9-4bb5-b203-a0e8fb17374a","order":3,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-fortanix-node-agent","title":"What is Fortanix Node Agent?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d61d8da4-d93f-4610-b012-a63c5a71c031","order":4,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"which-linux-version-does-the-node-agent-support","title":"Which Linux version does the node agent support?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9d9987e1-487a-4476-b6ca-dfd28f045b67","order":5,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-applications-are-supported-in-fortanix-confidential-computing-manager","title":"What Applications are Supported in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"7eec44c7-3acf-4076-a77c-a6f192ac31dd","order":6,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-configure-an-application-in-fortanix-confidential-computing-manager","title":"How to Configure an Application in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"49e871a7-e398-4c25-81f5-e1d36ffc543d","order":7,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-application-whitelisting-in-fortanix-confidential-computing-manager","title":"What is Application Whitelisting in Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9999133e-b9c0-4ae3-a356-d65c6e4a5ffb","order":8,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-a-join-token","title":"What is a Join token?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2f614bc1-fc48-4468-868e-1c88ae520407","order":9,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-the-structure-of-cert-chain","title":"What is the structure of Cert Chain?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"171bba9a-c86b-4204-9442-7aca9292d85a","order":10,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-restrict-access-to-fortanix-confidential-computing-manager","title":"How to restrict access to Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4fa3ca2a-1348-4cc8-abf7-2ec2749d4866","order":11,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-obtain-data-describing-the-remote-enclave-from-the-cert","title":"How to obtain data describing the remote enclave from the cert?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6ccd806d-da0c-4dbc-b387-73308af4b55b","order":12,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-to-verify-the-communication-for-applications-running-on-two-different-nodes","title":"How to verify the communication for applications running on two different nodes","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"92c2fff5-5ee4-4c22-9ebe-5bc8a4af234a","order":13,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-the-fortanix-confidential-computing-manager-node-agent-port-requirement","title":"What is the Fortanix Confidential Computing Manager Node Agent Port Requirement?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a361ef09-27ba-4294-864d-f87834513fb4","order":14,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-can-an-applications-cert-be-issued-when-we-deploy-an-app-from-the-console","title":"How can an application's cert be issued when we deploy an app from the console?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ceafc71d-d1de-4240-9ab0-4798fe66eb17","order":15,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-application-policy-enforcement-and-monitoring","title":"What is Application Policy Enforcement and Monitoring?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4c10ca63-25b5-4620-bc13-c93a2fa4630f","order":16,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-enclave-build-procedure-ensure-that-the-content-of-an-image-cannot-be-altered-between-the-conversion-and-a-future-run","title":"How does the enclave build procedure ensure that the content of an image cannot be altered between the conversion and a future run?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"bc1ffd56-3ee0-489c-9d10-7c56becc4ccd","order":17,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-attestation-process-guarantee-hardware-integrity","title":"How does the attestation process guarantee hardware integrity?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"b12dd997-2eae-4173-a4ae-6e1c33b32694","order":18,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-does-the-attestation-process-guarantee-code-integrity","title":"How does the attestation process guarantee code integrity?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d68cc77a-13a3-40ec-8ad7-dbb4457b9462","order":19,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-validity-periods-in-fortanix-ccm","title":"What are validity periods in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"1421d944-0f0f-4776-8ce4-e0de0668dab5","order":20,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-various-limits-and-quotas-in-fortanix-ccm","title":"What are various limits and quotas in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"08229434-152b-43a0-91cf-c6b018c39e0a","order":21,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"which-container-registries-does-fortanix-ccm-support","title":"Which container registries does Fortanix CCM support?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"efe1146b-3dea-4519-8bb2-e379da12eef1","order":22,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"quick-support-through-slack-channel","title":"Quick support through Slack Channel","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"ab569992-e584-4835-ae3d-f3fc0eacdf43","order":23,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-is-edp","title":"What is EDP?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"d2b3ad04-6243-4387-a4ca-cdc0732f6bfd","order":24,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"how-can-i-bring-my-edp-application-to-fortanix-confidential-computing-manager","title":"How can I bring my EDP application to Fortanix Confidential Computing Manager?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"f8dc5a86-1dbc-4f41-956c-cfe93680c5c6","order":25,"documentationType":1,"children":[],"parentCategoryId":"4a1230c8-0403-4f7e-bc24-1a6938ca3001","slug":"what-are-the-supported-cloud-providers-for-datasets-in-fortanix-ccm","title":"What are the supported cloud providers for Datasets in Fortanix CCM?","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"faq","title":"FAQ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"f46b5e83-cd1d-411e-9093-64b40e4e8235","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","order":11,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"c6cc4e06-72b8-40d0-9078-bcc842f46792","order":1,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-from-scratch","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Application from Scratch","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e520fe98-56ef-4611-b5d5-31d15f197ca8","order":2,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-application-that-talks-over-tls-from-within-an-enclave","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Application that Talks Over TLS from Within an Enclave","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"054b379d-f492-4696-b3a1-f4b917e2ed0a","order":4,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-and-run-hashicorp-vault","title":"Using Fortanix Confidential Computing Manager to Build and Run Hashicorp Vault","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"cb767ff6-9085-4f0a-bf63-ab9cffcea64b","order":5,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-for-easy-deployment-of-elasticsearch-on-aws-nitro","title":"Using Fortanix Confidential Computing Manager for Easy Deployment of Elasticsearch on AWS Nitro","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"35d6c41a-a56a-491e-8a07-f9a82ad7740f","order":6,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-nginx-application","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Nginx Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"e960df9d-82ce-4f29-ab43-3030bc355849","order":7,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-to-build-an-enclave-os-spring-application","title":"Using Fortanix Confidential Computing Manager to Build an Enclave OS Spring Application","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"8dc8a938-85ee-4d7a-bf5f-422739b2e001","order":9,"documentationType":1,"children":[],"parentCategoryId":"aa7e7546-13ed-4629-988a-a19d3c0fa6b8","slug":"using-fortanix-confidential-computing-manager-with-postgresql","title":"Using Fortanix Confidential Computing Manager with PostgreSQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"enclave-os","title":"Enclave OS ","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"a317b966-ddc8-4762-81ba-ee1b4897d666","order":12,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"67b4607d-6b5a-4289-80ac-0556cb83f142","order":1,"documentationType":1,"children":[],"parentCategoryId":"a317b966-ddc8-4762-81ba-ee1b4897d666","slug":"running-edp-applications-on-confidential-computing-manager","title":"Running EDP Applications on Confidential Computing Manager","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"a1ffc23a-d5f8-4b52-bd45-fcadf6805211","order":2,"documentationType":1,"children":[],"parentCategoryId":"a317b966-ddc8-4762-81ba-ee1b4897d666","slug":"build-a-rust-serverclient-edp-application-using-confidential-computing-manager-issued-certificates-and-trusted-ca","title":"Build a RUST Server/Client EDP Application Using Confidential Computing Manager Issued Certificates and Trusted CA","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"edp","title":"EDP","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"44053274-6375-4ba2-8375-937244a0d1c4","order":13,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","order":153,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"ac875539-3266-43a4-9eef-2866d44a46c4","order":1,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-enclave-os-aws-nitro","title":"Workflow Applications Using Fortanix Enclave OS - AWS Nitro","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"6bdd9853-6edc-4dce-8146-8bd8f56e8cd7","order":2,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-edp","title":"Workflow Applications Using Fortanix EDP","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"4357daed-3159-4513-a0d8-ecdc8cdb845e","order":3,"documentationType":1,"children":[],"parentCategoryId":"ce117ed1-48f9-4ade-84cf-f4c975749b2a","slug":"workflow-applications-using-fortanix-aci","title":"Workflow Applications Using Fortanix ACI","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"44053274-6375-4ba2-8375-937244a0d1c4","slug":"using-applications-and-datasets","title":"Using Applications and Datasets","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","order":154,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"8a1b7837-1a21-4987-8265-a8cf802ece99","order":1,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-simple-use-case-python","title":"Fortanix Confidential Computing Manager - Simple Use Case - Python","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2dacf68a-b9f7-43af-93a1-2a5070c7dfbe","order":2,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-simple-use-case-sql","title":"Fortanix Confidential Computing Manager - Simple Use Case - SQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0f58738c-2fcf-49c4-96ee-9fea67e57708","order":3,"documentationType":1,"children":[],"parentCategoryId":"53f070b9-6ffb-4eef-acaf-6ed9efd06595","slug":"fortanix-confidential-computing-manager-complex-use-case-sql","title":"Fortanix Confidential Computing Manager - Complex Use Case - SQL","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"44053274-6375-4ba2-8375-937244a0d1c4","slug":"using-data-connectors-and-scripts","title":"Using Data Connectors and Scripts","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"f46b5e83-cd1d-411e-9093-64b40e4e8235","slug":"workflows","title":"Workflows","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"parentCategoryId":"77f19afa-0031-4851-9792-3bb13c20b06c","slug":"examples","title":"Examples","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"fortanix-confidential-computing-manager","title":"Fortanix Confidential Computing Manager","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"},{"isFollowed":false,"followedByInheritance":false,"id":"58bb2b95-6c39-4e25-9de8-4422a07d10e2","order":8,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","order":1,"documentationType":0,"children":[{"isFollowed":false,"followedByInheritance":false,"id":"3ad31889-ed2b-4a4a-898e-d634818280c4","order":1,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-custodial-warm-wallet-solution","title":"Using Fortanix Custodial Warm Wallet Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"0de60930-3477-4cb4-a384-ff485f4f7fe5","order":2,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-ignite-one-time-signer-solution","title":"Using Fortanix Ignite One-Time Signer Solution","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"9a85b09d-68d3-429b-ba6e-bdbde88006ba","order":3,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-signing-provider-for-tendermint-kms","title":"Using Fortanix Signing Provider for Tendermint KMS","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0},{"isFollowed":false,"followedByInheritance":false,"id":"2dbcdc81-3277-4117-89b8-9db2ce0a7231","order":4,"documentationType":1,"children":[],"parentCategoryId":"2b7c1039-df53-4a7c-b5e6-b434d1d2dc50","slug":"using-fortanix-data-security-manager-with-hyperledger-fabric","title":"Using Fortanix Data Security Manager with Hyperledger Fabric","isPublic":true,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"operationType":"Get","operationTypeShort":"get","articleType":0}],"parentCategoryId":"58bb2b95-6c39-4e25-9de8-4422a07d10e2","slug":"web-30-solutions","title":"Web 3.0 Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"slug":"secure-web-30-infrastructure-solutions","title":"Secure Web 3.0 Infrastructure Solutions","isPublic":false,"isHidden":false,"categoryType":2,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0,"apiSubCategoryType":"default"}],"isPublic":false,"isHidden":false,"categoryType":0,"isDefaultCategoryHidden":false,"isDefaultCategoryPrivate":false,"newCount":0,"updateCount":0,"customCount":0,"deprecatedCount":0},"metaDefinitions":[{"content":"FAQs","property":"title"},{"property":"description"},{"content":"article","property":"og:type"},{"content":"FAQs","property":"og:title"},{"property":"og:description"},{"property":"og:image"},{"content":"FAQs","property":"twitter:title"},{"content":"summary_large_image","property":"twitter:card"},{"property":"twitter:description"},{"property":"twitter:image"}],"canonicalUrl":"https://support.fortanix.com/docs/faqs","isLayoutPreview":false},"success":true,"errors":[],"warnings":[],"responseHeaders":{}},"__nghData__":[{"t":{"1":"t0"},"c":{"1":[]}},{},{"t":{"0":"t3"},"c":{"0":[]}},{"t":{"0":"t5"},"c":{"0":[]}},{"t":{"0":"t7","1":"t11"},"c":{"0":[{"i":"t7","r":2,"e":{"0":1},"t":{"2":"t8","3":"t9","4":"t10"},"c":{"2":[],"3":[],"4":[]}}],"1":[]}},{"t":{"0":"t20","3":"t21","4":"t22","6":"t23","7":"t24"},"c":{"0":[],"3":[{"i":"t21","r":1}],"4":[],"6":[],"7":[]}},{"t":{"0":"t13","1":"t29","2":"t30"},"c":{"0":[{"i":"t13","r":2,"e":{"0":1},"t":{"3":"t14","4":"t28"},"c":{"3":[{"i":"t14","r":5,"e":{"0":4},"t":{"1":"t15","4":"t16","5":"t17","6":"t18","7":"t19","8":"t25","9":"t26","10":"t27"},"c":{"1":[],"4":[],"5":[],"6":[],"7":[{"i":"t19","r":1}],"8":[],"9":[],"10":[]}}],"4":[]}}],"1":[],"2":[]}},{"t":{"12":"t45"},"c":{"12":[]}},{"t":{"0":"t37","1":"t49","2":"t39"},"c":{"0":[{"i":"t37","r":3,"e":{"0":2},"t":{"1":"t38"},"c":{"1":[{"i":"t39","r":1,"t":{"3":"t40","4":"t42","5":"t43","6":"t44","10":"t46","12":"t47","13":"t48"},"c":{"3":[{"i":"t40","r":1,"t":{"8":"t41"},"c":{"8":[{"i":"t41","r":1}]}}],"4":[],"5":[],"6":[],"10":[{"i":"t46","r":1}],"12":[],"13":[{"i":"t48","r":1}]}}]}}],"1":[],"2":[]}},{"t":{"0":"t53","2":"t92","4":"t102","6":"t103"},"c":{"0":[],"2":[],"4":[],"6":[]}},{"t":{"0":"t106","1":"t107","3":"t118","5":"t119"},"c":{"0":[],"1":[{"i":"t118","r":1}],"3":[],"5":[]}},{"c":{"0":[]}},{"t":{"0":"t120","1":"t127","2":"t128","4":"t129"},"c":{"0":[],"1":[],"2":[],"4":[]}},{"t":{"0":"t428"},"c":{"0":[]}},{"t":{"0":"t50","1":"t138"},"c":{"0":[{"i":"t50","r":1,"t":{"2":"t51","3":"t136","5":"t137"},"c":{"2":[{"i":"t51","r":3,"e":{"0":2},"t":{"1":"t52"},"c":{"1":[{"i":"c3932541491","r":1}]}},{"i":"t51","r":4,"e":{"0":3},"t":{"1":"t52"},"c":{"1":[{"i":"c1250404629","r":2}]}},{"i":"t51","r":3,"e":{"0":2},"t":{"1":"t52"},"c":{"1":[{"i":"c1216099204","r":1}]}},{"i":"t51","r":3,"e":{"0":2},"t":{"1":"t52"},"c":{"1":[{"i":"c3660770874","r":1}]}}],"3":[],"5":[{"i":"t137","r":2,"e":{"0":1}}]}}],"1":[]}},{"t":{"2":"t35"},"c":{"2":[{"i":"t35","r":3,"e":{"0":2},"t":{"1":"t36"},"c":{"1":[{"i":"c3972034530","r":1}]}},{"i":"t35","r":3,"e":{"0":2},"t":{"1":"t36"},"c":{"1":[{"i":"c1898557253","r":1}]}}]}},{"t":{"0":"t153"},"c":{"0":[{"i":"t153","r":11,"e":{"0":10},"t":{"1":"t154"},"c":{"1":[{"i":"t154","r":9,"e":{"0":8,"1":7},"t":{"2":"t155","3":"t156"},"c":{"2":[],"3":[{"i":"t156","r":5,"e":{"0":4},"t":{"1":"t157"},"c":{"1":[{"i":"t157","r":3,"e":{"0":2},"t":{"1":"t158"},"c":{"1":[{"i":"t158","r":1}]}}]}}]}}]}}]}},{"t":{"2":"t6","4":"t12","6":"t31","9":"t152"},"c":{"2":[],"4":[{"i":"t12","r":2,"e":{"0":1}}],"6":[{"i":"t31","r":7,"e":{"0":6},"t":{"1":"t32"},"c":{"1":[{"i":"t32","r":5,"e":{"0":4},"t":{"1":"t33"},"c":{"1":[{"i":"t33","r":3,"e":{"0":2},"t":{"1":"t34"},"c":{"1":[{"i":"c862194457","r":1}]}}]}}]}}],"9":[]}},{"t":{"0":"t4"},"c":{"0":[{"i":"t4","r":1}]}},{"t":{"1":"t1","3":"t2","6":"t159"},"c":{"1":[{"i":"t1","r":1}],"3":[{"i":"t2","r":1}],"4":[{"i":"c2937799001","r":1}],"6":[]}}]}