SSH keys · API tokens · SAML SSO · Audit trail

Password Manager
for DevOps Teams

DevOps teams manage more credential types than anyone else — SSH keys, cloud tokens, CI/CD secrets, database passwords, TOTP seeds. SealedKeys is built for that reality, not adapted from a consumer password manager.

What DevOps teams actually need to store

SealedKeys supports all of these — not just website logins.

SSH private keys

Server access, bastion hosts, deployment keys, GitHub deploy keys

Cloud API tokens

AWS access keys, GCP service account keys, Azure service principals

CI/CD secrets

Pipeline tokens, registry credentials, signing keys, webhook secrets

Database credentials

Production DB passwords, read replicas, migration users

Third-party API keys

Monitoring, alerting, logging, CDN, DNS providers

TOTP seeds

Shared 2FA for AWS root, domain registrar, DNS console, hosting panels

Built for infrastructure engineers

Not a consumer password manager bolted onto enterprise features.

SSH and API key types

Dedicated field layouts for SSH private keys and API tokens. Not shoehorned into a password field — the right data shape for each secret type.

Audit log for compliance

Every access event logged. Useful for SOC 2, ISO 27001 and internal security reviews — evidence of who accessed production credentials and when.

SAML 2.0 SSO

Integrate with Okta, Azure AD or Google Workspace. Engineers sign in with existing corporate credentials — no separate password to manage.

Zero-knowledge architecture

Credentials encrypted in the browser with AES-256-GCM. The server stores only ciphertext. A breach of SealedKeys does not mean a breach of your infrastructure.

Role-based access

Senior engineers manage credentials; junior engineers get read-only access to what they need. Contractors get scoped read-only access and instant revocation.

Open-source encryption

The encryption implementation is published on GitHub. Your security team can verify the cryptographic implementation without taking our word for it.

Frequently asked questions

Is SealedKeys a secrets manager like HashiCorp Vault?+

No — they solve different problems. HashiCorp Vault is for programmatic, application-level secrets injection. SealedKeys is for the humans on your team who need to access, share and manage credentials securely. They complement each other: Vault for apps, SealedKeys for people.

Can I store AWS access keys and secret keys?+

Yes. Use the API key type to store the access key ID and secret access key together, with notes for the associated IAM user, environment and permissions. Tag by environment (production, staging) for quick filtering.

Does SealedKeys support MFA for the vault itself?+

Yes. SealedKeys supports TOTP-based multi-factor authentication for all accounts. We recommend all team members enable MFA, especially for access to production credentials.

How is this different from storing secrets in a CI/CD platform like GitHub Actions?+

GitHub Actions secrets are tied to repositories and accessible to anyone with repo access. SealedKeys gives your team a separate vault with finer-grained access control, an audit trail across all secrets (not just repo-scoped ones), and a UI for managing the full lifecycle of credentials.

Can I share a TOTP seed for a shared account like AWS root?+

Yes. Store the TOTP seed as a secret in the shared team vault. Authorised team members can view the seed and use it in their authenticator app. All access is logged.

Related

A vault built for the way DevOps teams work

25 items free. No credit card. SSH keys, API tokens and more — encrypted in your browser.