Atakama Installation & Setup Guide

Thanks for your interest in Atakama! Follow these steps to get up-and-running as smoothly as possible.


What you'll need to get started:

  • A computer running Windows 10 or a Windows Server 2016/2019 Remote Desktop
  • At least one mobile device (smartphone or tablet) running iOS (8.0 or newer) or Android (7.0 or newer)
  • Atakama for Windows
  • Atakama Mobile for iOS or Android


Part A: Install Atakama on your computer

  • Download the installer file from the Atakama website proceed through the installation.
    • You will need to have local administrator privileges to install Atakama.
    • The Windows .msi installer file must be run from a local disk (typically C: drive), not a network location.


Part B: First Time Setup

You can think of Atakama as a way to lock files in a way that requires multiple keys to open. The "keys" you'll be using to decrypt your files are the devices that you know and trust. When you set up Atakama for the first time, you'll be guided through:

  • Setting up your primary mobile device to hold your second key
  • Creating a third key as a backup
  • Optionally creating more backup keys

First Key

The first key is by Atakama automatically and securely stored on the workstation.


Second Key

The second key is stored on your primary mobile device, which is securely linked to your Atakama profile during this step. You will need to install Atakama Mobile for iOS or Android, then link it to your computer by scanning a QR code that appears on your computer using the Atakama Mobile app.


Third Key

The third key, while not necessary to decrypt files, becomes necessary in the event your workstation or primary mobile device is ever lost, broken, or replaced with a new device. Your third key can be assigned to another mobile device that you own or it can be assigned to a mobile device that belongs to someone you trust, like a spouse, close family member, boss, or co-worker. 

  • Whoever holds your "third key" can help you regain access to your locked files, but they are not able to directly access or open them themselves.
  • As an alternative to assigning your third key to a smartphone or tablet, you can write down a set of "Offline Recovery Words" and save them in a safe place.


Additional Keys

If you would like to use Atakama with additional devices, you can link them to your computer at this point.


Part C: Configure Storage

At this point the first time setup is complete and your Atakama profile is provisioned with at least three keys. You can begin using the software and encrypting files locally. However, it is advisable to sync your encrypted data to a cloud or network location to ensure that a backup copy exists. To do this, check out the article on remote storage options in Atakama.


Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.