Admin

License

Every Cryptomator Hub instance requires a license. The license is bound to the instance and cannot be transferred to another instance. Every license has a number of seats and a validity period. As an Hub administrator, you can view license information in the administration area.

Administration area

What is a Seat?

A regular license contains a fixed number of seats. A seat is taken for every user, which is assigned to at least one, not-archived vault. Note that:

  • If a user is not assigned to any vault, it does not occupy a seat.

  • If a user is assigned to multiple vaults, it only occupies one seat.

  • If a user is created or imported to Hub, it does not occupy a seat.

Note

Enterprise licenses can have an unlimited number of seats. Visit cryptomator.org for more information.

Community License

When you deploy Cryptomator Hub by yourself, it comes with a community license with life-long validity and 5 seats.

Updating your License

If the community license is not sufficient for your needs, you can upgrade it to a paid license. You can also upgrade an already existing, paid license. To do so, click on the button in the lower right corner of the administration area. It will redirect you to the Cryptomator Hub license store. After the purchase, you will be automatically redirected back to your Hub instance.

Audit Logs

The Audit Logs provide an overview of security-related events within Cryptomator Hub. These logs allow administrators to track important account and vault-related actions.

Note

Audit Logs are not available with a Community License.

Event Types

The following events are logged:

Device

  • Register Device - A user registered a new device. This can be, e.g., a Cryptomator app (desktop/mobile) to unlock a vault or a web browser to access Cryptomator Hub.

  • Remove Device – A user removed a device.

Web of Trust

Vault

Account

Legacy

  • Claim Vault Ownership – A user claimed vault ownership. This event is logged when a vault created with hub pre 1.3.0 is claimed by the vault creator using the Vault Admin Password.

Audit Log Table View

The logs are displayed in a structured table containing the following columns:

  • Timestamp – The exact time of the event.

  • Event – The type of event that occurred.

  • Details – Additional information about the event.

Audit Logs Table View

Filtering Audit Logs

To refine the displayed logs, a filtering function is available:

Audit Log Filtering Options
  • Date Range Filter: Allows filtering logs between two specific dates.

  • Event Type Filter: A multi-select dropdown enables filtering by event type.

Audit Log Filtering Options

Web of Trust

The Web of Trust (WoT) feature in Cryptomator Hub helps users verify each other’s identity by signing the User Key Pair with their private keys using ECDSA. First, the trusting user needs to verify the trustee by entering the first characters of the trustee’s public key fingerprint. Once signed, the proof is uploaded to Hub, where others can check its authenticity.

WoT also supports transitive trust, meaning if Alice trusts Bob, and Bob trusts Charlie, then Alice implicitly trusts Charlie. This forms a trust chain, allowing users to establish indirect trust relationships.

Audit Log Filtering Options

In the administration area, administrators can configure the following trust settings:

The maximum depth of such chains can be configured using the Maximum WoT Depth property:

  • The default value is 3 (“Great-Grandchild”)

  • The maximum value is 9

  • The minimum value, 0, means no trust chain is allowed, only direct trust relationships are considered.

With the Fingerprint Verification Preciseness property, the minimum length of the entered public key fingerprint can be configured:

  • The default value is 2

  • The minimum value, 0, means the fingerprint of the trustee is fully shown without any input needed.

Note

If a user resets their account, their User Key Pair is regenerated, invalidating all previously established trust relationships regarding this user. Additionally, any existing trust chains that included the user will be broken, requiring re-verification to restore trust.