/
Partnership or Notary Code Insight

Partnership or Notary Code Insight

Enterprise clients with a valid agreement may gain access to Unique's product code. For governance, legal, or compliance purposes, this product code can also be included in contracts with notary agreements.

Access Mechanism

To facilitate this access, Unique provides a dedicated repository where eligible clients or their authorized notaries/representatives can obtain the product code. Access is granted through GitHub Deploy Keys.

Request Submission Process

  1. Submit a Public Key:

    • Clients must submit an SSL/TLS/SSH public key (in accordance with GitHub Deploy Keys requirements) to their designated Unique point of contact.

  2. Non-Disclosure Agreement (NDA):

    • By submitting a key, the client agrees to maintain the confidentiality of the code as stipulated in the NDA.

  3. Eligibility Verification:

    • Upon submission, Unique will verify the client's eligibility. If eligible, the representative will notify the client that their key has been added and the repository URL. If the client is not eligible or lacks an active NDA, the request will be denied.

Mirroring

  • Clients are responsible for mirroring the repository using their private key.

  • Clients may use any other method, provided the NDA is respected.

Limitations

  • GitHub Collaborators: Unique cannot invite individual GitHub Collaborators or human users at this time.

  • Access Method: Access to the product repository is granted exclusively through SSH keys.

  • Key Submission: Only one key per Unique Enterprise contract is permitted. However, during a 10-day rotation period, a new key can be submitted. The old key will be deprecated 10 business days after the new key's submission without further confirmation.

Important Considerations

  • Security: Ensure that the submitted public key is securely generated and managed.

  • Compliance: Adhere to all terms outlined in the NDA and any other relevant agreements.

  • Communication: Maintain clear communication with your Unique point of contact for any issues or updates regarding access.

By following these guidelines, enterprise clients can securely and efficiently gain access to Unique's product code while ensuring compliance with all legal and contractual obligations.


Author

Unique Engineering and Security

Related content

Co-Development Governance Framework
Co-Development Governance Framework
More like this
Phase 2: Setup and Implementation Guide
Phase 2: Setup and Implementation Guide
More like this

© 2025 Unique AG. All rights reserved. Privacy PolicyTerms of Service