Dragon Key

Dragon Key

Hardware Dongle Authentication System

Physical USB dongle management for the DragonSource ecosystem. Dragon Key handles the registration, provisioning, and validation of hardware authentication devices — binding cryptographic identity to physical hardware, not software tokens.

“Authentication tied to the physical device, not just credentials. No key, no access.”

Hardware USBMulti-TierRemote RevokeAudit TrailCross-Platform

// What Keys Do

Key Capabilities

Dragon Keys are used across the entire ecosystem for identity, access, and authorization.

🔐

Authentication

Super Admin authentication and platform deployment authorization

👤

Authorization

Persona access control and license tier enforcement

⚙️

Provisioning

Managed key lifecycle from creation through revocation

Validation

Local and registry-backed verification of key authenticity

// Core Capabilities

Identity Infrastructure

Dragon Key provides the physical identity layer that every DragonSource system relies upon. Hardware authentication, lifecycle management, and audit — unified under one system.

🔑

Hardware USB Dongles

Physical hardware keys for authentication across the DragonSource ecosystem. Cryptographic identity bound to a physical device — no software-only tokens, no cloud-based auth.

🔥

Tiered Access Control

Multi-tier permission model with granular platform access. Each key is provisioned for specific capabilities and platforms — access is scoped, never blanket.

📡

Central Registry

All keys are registered in a central registry with full lifecycle management. Provision, suspend, revoke, and audit keys from a unified admin interface.

🖥️

Cross-Platform

Provisioning and validation tools work on both macOS and Windows. USB drives are detected and provisioned with a single command across operating systems.

🛡️

Remote Revocation

Keys can be remotely suspended or revoked instantly. If a key is lost, stolen, or compromised, access is terminated immediately across all platforms.

📊

Usage Audit Trail

Every key usage is logged for compliance and forensic purposes. Know exactly when, where, and how every key was used across the ecosystem.

// Key Lifecycle

Managed Identity

Every Dragon Key follows a controlled lifecycle — from provisioning through active use to suspension or revocation.

01
ProvisionAssign identity & scope
02
RegisterCentral registry entry
03
ActivateDeploy to hardware
04
MonitorUsage audit trail
05
RevokeInstant access termination

// Security

No key, no access. Physical hardware is the only trust anchor.
Registry
All keys registered with full lifecycle tracking
Revocation
Keys can be remotely suspended or revoked instantly
Audit
Every usage logged with timestamp and context
Scoping
Keys are limited to specific platforms and capabilities