Zero-knowledge · AES-256-GCM · Audit trail

API Key Management
for Technical Teams

Stop storing API keys in .env files, Notion pages and Slack messages. SealedKeys gives your team a zero-knowledge encrypted vault for API keys, access tokens and service credentials — with full audit trail and access control.

The API key problem every team has

API keys committed to Git repositories by accident
Keys shared in Slack, email or Notion — no audit trail
Entire team using the same key with no individual accountability
No process for rotating keys when a developer leaves
Keys scattered across .env files on developer laptops

Any of these sound familiar? SealedKeys fixes all of them.

Secure API key storage that works for teams

Everything you need to manage API keys securely across a team.

Dedicated API key type

Separate field layout for key name, value, service, environment and notes. Keeps API keys organised without shoehorning them into password fields.

AES-256-GCM encryption

Every key encrypted in your browser before it leaves your device. The server receives only ciphertext — the API key value is never visible to us.

Access audit trail

Every time an API key is viewed or copied, it is logged with timestamp, user and IP. Know exactly who accessed which key and when.

Role-based access

Grant read-only access to contractors and junior developers. Restrict write access to senior engineers and team leads.

Environment tagging

Tag keys by environment (production, staging, development) and service. Filter and find the right key instantly without scrolling through a flat list.

Offboarding safety

When a developer leaves, revoke their access immediately. The audit log shows which keys they accessed — so you know exactly what to rotate.

Why not just use a password manager?

Most password managers are designed for website logins — username, password, URL. API keys don't fit that model. They have different fields (service name, environment, expiry), different sharing patterns (often team-level not personal), and different rotation requirements.

SealedKeys is built for both. Personal logins work exactly as you'd expect, and API keys get a dedicated field layout with service tagging, environment labels and notes — without shoehorning them into a URL field.

Frequently asked questions

Can I store API keys for any service?+

Yes. SealedKeys is service-agnostic. You can store API keys for AWS, GitHub, Stripe, Twilio, OpenAI, or any other service. The API key type includes fields for the key name, value, associated service, environment and notes.

How is an API key vault different from using a .env file?+

.env files live on individual developer machines, are often committed to Git by accident, and provide no audit trail or access control. SealedKeys stores keys encrypted in a central vault — accessible to authorised team members, with full logging of every access.

Can the SealedKeys server see my API keys?+

No. API keys are encrypted in your browser using AES-256-GCM before being sent to the server. The server stores only the encrypted ciphertext. The decryption key is derived from your master password and never transmitted.

Can I share API keys with contractors without giving them full vault access?+

Yes. Contractors can be given read-only access scoped to a specific organisation vault. They can view and copy keys but cannot edit or delete them. When their contract ends, remove their access — they retain nothing.

Is there a limit to how many API keys I can store?+

The free plan supports up to 25 vault items across all secret types. The Pro plan at £3.49/user/month supports unlimited items.

Related

Stop storing API keys in the wrong places

25 items free. No credit card. Encrypted in your browser from the first key you save.