Patent attributes
Managing distribution of sensitive data is disclosed. In one example, a request is sent to a control platform to add a virtual domain. A domain key associated with the virtual domain is received. A request that the credential be transmitted to the virtual domain is sent, along with the application credential which has been encrypted using the domain key. In another example, a request that one or more application credentials be pushed to a virtual domain is received from a configuration console. The virtual domain is notified that at least one action request associated with the virtual domain is available. A signed request is received from the virtual domain for the action request. The application credentials are transmitted to the virtual domain. In a third example, an application credential of a virtual domain is requested. A signed message including an encrypted application credential is received from the control platform.