Skip to content

Support

Regular support

The Cloud-IAM support team can be reached by sending a mail to support@cloud-iam.com. This support is available during working hours in Europe.

Cloud-IAM communication

Public communication regarding incidents are published through the Cloud-IAM status page in case of impact on its public API.

Incident regarding a customer deployment are discussed via direct emails with the organization members.

WARNING

In case Cloud-IAM needs to contact the customer in case of incident, maintenance, ... a mail is sent to all the members of the organization. No additional email recipients will be added automatically to the communication initiated by Cloud-IAM.

This is why it is very important that you keep the organization members up-to-date so that you don't miss any information.

On-call team

The on-call team monitors deployments 24 hours a day, 7 days a week.

More information here.

Sensitive data exchange

Some conversation with our support might require the exchange of sensitive data. To avoid letting this information reside in clear in the mailbox, we use GPG to crypt / decrypt this data.

Send sensitive data to the support

Firstly, import our public key:

shell
$ gpg --keyserver keyserver.ubuntu.com --search-key support@cloud-iam.com
...
gpg: key ...: public key "Cloud-IAM Support Team <support@cloud-iam.com>" imported
...

Then, crypt and sign the file with the following command:

shell
$ gpg --output secret-files.txt.gpg --encrypt --recipient support@cloud-iam.com secret-files.txt
$ shasum -a 256 secret-files.txt | awk '{print $1}' > secret-files.txt.sha256sum
$ gpg --output secret-files.txt.sha256sum.sig --sign secret-files.txt.sha256sum

The file secret-files.txt.gpg is now crypted and only Cloud-IAM Support Team will be able to decrypt and read it 👌. If you associate the secret-files.txt.sha256sum.sig file, we will ensure the file has not been compromised.

Receive sensitive data from the support

If you want the support to send you sensitive data (password reset, exports, ...), you'll need to somehow provide your public key.

If you don't have yet a GPG key, please follow the instructions to export the public key.

shell
$ gpg --full-generate-key
...
$ gpg --output public.pgp --armor --export my-email@acme.inc

You can then send us your public key or publish it on a public key server such as keyserver.ubuntu.com and then send us the email associated with your public key.

When you will receive the crypted data, you simply need to run the following command to get them in clear:

shell
$ gpg --decrypt sensitive-data.txt.gpg --output sensitive-data.txt