TABLE OF CONTENTS
Sharing is how users can access encrypted files. To share encrypted files, users (i.e., Atakama Profiles) must be part of the same Security Group and have access to the same Secure Folders. The cryptographic access control provided by Atakama sits on top of underlying file-level permissions, which are separately configured.
Unlike traditional access control systems (e.g., Active Directory), sharing in Atakama is decentralized and based on users' cryptographic access, as represented by Security Groups. An Atakama Profile that is a Full Client admin with access to a Security Group can permission other users (i.e., Atakama Profiles) at their discretion.
This decentralized sharing model, on top of existing file-level access control, provides meaningful data protection that protects against common attack vectors.
Secure Folders contain important, hidden files that enable sharing. For example, the .atakamashare.db folder contains:
It's important not to modify or remove any of these hidden files.
**This article pertains to shared file access within Atakama. This is different from Atakama's Secure File Transfer feature.