How does software escrow work?
Even if you have no previous experience with software escrow, we’ll make it as easy as possible and it takes just a couple of steps.
How to activate your software escrow in a few simple steps
Sign up to Codekeeper
The first step is to set up your account on Codekeeper. From the Codekeeper home page, click “Get Started” or select your plan of choice on our Pricing page. You will be redirected to the signup flow, where you will be asked to enter your information in order to create an account.
Easily manage all of your escrows from a single centralized dashboard. At the top, you’ll find some general metrics that give you insights into the status of your escrows. The dashboard also contains information about all of your escrow agreements and latest activity, as well as links to get help. To get started with a new escrow agreement, simply navigate to the “+ New Escrow” button located on top right of the dashboard.
Manage other party information
In the escrow creation process you will be directed to fill your own and also the other party’s information such as organization details, contact details for different roles. If you are a depositor you can also add more beneficiaries to your escrow agreements. Each of your licensed beneficiaries can only access their own repository information, which ensures source code privacy.
Define release triggers
Specify for each beneficiary which source code repositories they should receive, as well as under which conditions the content of the repositories should be released. Manage complex agreements with confidence and ease.
Review and sign the agreement
Once the basic configurations are finished, an escrow agreement will be generated. You will receive an email notification as well as and alert within the activity section of the Codekeeper application. You can review the agreement and make adjustments to the agreement settings. Finally, you can approve to send to both parties to sign.
Deposit your assets
You can set up automatic source code and data deposits by connecting your SCM platform such as Github, Bitbucket, Gitlab, and others. No coding required! If you still prefer manual upload, our secure upload folder allows you to easily deposit your source code and other data.
Your new source code escrow is now successfully activated! You can edit the details and manage other escrows. As the licensor, you can add suppliers and initiate new escrows in just a few clicks. Confirmations are automated, so you can forget about paperwork.
For more details, let our expert assist you.Book a Demo
How to deposit your critical assets
Fully automated repository connection
Recent versions are always deposited within 24 hours, AES256 encrypted and fully automated. We support most commercially available environments with 50+ Integrations available!
First to activate an Integration, you need to sign in to Codekeeper and go to your dashboard, select Integrations located on left sidebar menu of your screen
Once on the page, you will see all of our built-in apps we integrate with, from here you will select integration platform you want and click on “Activate” button.
Once you click on the “Activate” button you will be asked to connect your Codeekeper account with selected integration account or activate the integration manually following the instructions from the right hand side.
After the integration is active you can now select your repository to your selected escrows.
For non OAuth integrations we provide a simple instruction to follow and configure yourself, if you need more assistance you can contact us.
Do it manually with our Secure upload folder
If you prefer manual upload, our upload folder system also provides you with a secure way to deposit your source code. Just upload your assets and we’ll do the rest!
What can and should be deposited in software escrow?
A general description of the items that are being deposited (e.g., the size of the deposit; function of the software; integrations, utilities or third-party tools used to create the deposit, etc.)
Any applications necessary to compile and build executable code, objects, and libraries (e.g., the names of all required applications, version numbers, vendor names, and contact information)
Encryption information (e.g., required passwords, cryptographic keys, and software applications required to access the deposit)
Source code (common file types include .java, .c, .cpp, etc.)
Build instructions and design documentation (source code architecture, overall design of the source code, and interactions among modules)
Key developers contact information (emails, phone numbers, and any other relevant contact information)
Samples of any data or databases required to run the software
What are the steps in the Codekeeper process?
How do I add my software or source code to Codekeeper?
What kind of settings and access controls can I configure in Codekeeper?
How does Codekeeper integrate with my development process?
How can I monitor and manage my software protection with Codekeeper?
Can I control who has access to my source code with Codekeeper?
Can I use Codekeeper for both open-source and proprietary software?
I can’t find the answer or solution I’m looking for. Is there someone I can speak to directly?
Show more questions + Show less questions -
These companies already secured their software continuity.
Will you start today?
Software escrow secures the source code needed to recover if a supplier is no longer able to provide access or support the software you need for your business operations with an independent 3rd party.Get Started
Best price guaranteed
No hidden costs
Introduction to Software Escrow: A Guide
Learn how software escrow helps you mitigate risks and ensure your mission-critical systems remain unaffected through any circumstance.Download Guide