TABLE OF CONTENTS
When more than one Atakama-enabled computer has access to the same cloud or network share location, all computers must be verified to gain access to Atakama-encrypted files within the location.
Frequently Asked Questions
Why do I need to verify a contact?
The verification process ensures that you share files with only those Atakama-enabled computers that are authorized to access files in the specific location. Atakama requires direct communication between you and the Contact (i.e., the user of the other Atakama-enabled computer) to confirm you are sharing files only with the intended person.
The Profile ID is a unique identifier assigned to an Atakama-enabled computer. The Profile ID comprises the computer's current set of keys.
An Atakama-enabled computer’s Profile ID is located in the Keys tab of the Atakama Control Center. During the verification process you need to obtain the Profile ID of the computer(s) with which you will be sharing files.
Do not use your own Profile ID.
Do not use the Profile IDs contained within the Atakama Mobile app.