cryptography notary enterprise defense crypto signing agent provisioning mobile notary hackers and threats agent security identity and access management signing mobile iam notary public encryption identity management