
Hardware Dongle Authentication System
Physical USB dongle management for the DragonSource ecosystem. Dragon Key handles the registration, provisioning, and validation of hardware authentication devices — binding cryptographic identity to physical hardware, not software tokens.
“Authentication tied to the physical device, not just credentials. No key, no access.”
// What Keys Do
Dragon Keys are used across the entire ecosystem for identity, access, and authorization.
Super Admin authentication and platform deployment authorization
Persona access control and license tier enforcement
Managed key lifecycle from creation through revocation
Local and registry-backed verification of key authenticity
// Core Capabilities
Dragon Key provides the physical identity layer that every DragonSource system relies upon. Hardware authentication, lifecycle management, and audit — unified under one system.
Physical hardware keys for authentication across the DragonSource ecosystem. Cryptographic identity bound to a physical device — no software-only tokens, no cloud-based auth.
Multi-tier permission model with granular platform access. Each key is provisioned for specific capabilities and platforms — access is scoped, never blanket.
All keys are registered in a central registry with full lifecycle management. Provision, suspend, revoke, and audit keys from a unified admin interface.
Provisioning and validation tools work on both macOS and Windows. USB drives are detected and provisioned with a single command across operating systems.
Keys can be remotely suspended or revoked instantly. If a key is lost, stolen, or compromised, access is terminated immediately across all platforms.
Every key usage is logged for compliance and forensic purposes. Know exactly when, where, and how every key was used across the ecosystem.
// Key Lifecycle
Every Dragon Key follows a controlled lifecycle — from provisioning through active use to suspension or revocation.
// Security
No key, no access. Physical hardware is the only trust anchor.