Practical guide for technical teams

Secrets Manager
vs Password Manager

These terms get used interchangeably, but they solve different problems. Here's when you need each — and when one tool genuinely does both.

The core difference

Secrets ManagerPassword Manager
Primary use caseMachine-to-machine authentication — API keys, database credentials, service tokens injected into applications at runtimeHuman-to-application authentication — usernames, passwords, TOTP seeds for services people log into
Who (or what) accesses itAutomated systems: CI/CD pipelines, microservices, Lambda functions, Kubernetes podsPeople: developers, engineers, contractors, support staff
Access patternProgrammatic API calls, environment variable injection, sidecar containers, vault agentWeb UI, browser extension, mobile app — human reads and copies
RotationAutomated rotation with zero downtime — the system fetches the new secret without human involvementManual rotation — a person updates the value, notifies the team
ExamplesAWS Secrets Manager, HashiCorp Vault, Doppler, InfisicalBitwarden, 1Password, LastPass, SealedKeys

The overlapping middle — where it gets fuzzy

Some credentials don't fit neatly into either category. Here's how to think about them.

API keys used by humans

Either — an API key used by a developer to call the Stripe API from their laptop fits a password manager

SSH private keys

Either — personal SSH keys fit a password manager; deployment keys injected into servers fit a secrets manager

Database credentials used by applications

Secrets manager — apps need programmatic access with rotation

Client portal logins for your team

Password manager — humans logging into services

Shared team credentials

Password manager — humans sharing access to services

When SealedKeys is the right fit

Your team shares credentials for SaaS tools, client portals and internal services
Engineers need somewhere to store their personal API keys, SSH keys and TOTP seeds
You need an audit trail of who accessed which credential
Contractors need scoped, revocable access to specific credentials
You want a simple, affordable solution without HashiCorp Vault's operational complexity

When you likely need both

Your applications inject secrets at runtime via AWS Secrets Manager — and your engineers also need access to those secrets via a UI
Your CI/CD pipeline fetches credentials programmatically — and your ops team needs to rotate them manually when compromised
You use Doppler for environment variable management — and want SealedKeys for team credential sharing with SSO and audit logs

Frequently asked questions

Is SealedKeys a secrets manager or a password manager?+

SealedKeys is primarily a team password manager — designed for humans sharing credentials, with an encrypted UI, SAML SSO, access control and audit logs. It handles the types of secrets technical teams need day-to-day: website logins, API keys, SSH keys, TOTP seeds and secure notes. It is not a secrets manager in the HashiCorp Vault sense — it does not inject secrets into applications at runtime.

Do I need HashiCorp Vault if I have SealedKeys?+

Possibly both. If your applications need to fetch secrets programmatically at runtime — database credentials, service-to-service tokens — you need a secrets manager like HashiCorp Vault, AWS Secrets Manager or Doppler. If your team also needs to share credentials as humans (portal logins, shared API keys, SSH keys), SealedKeys handles that layer separately. Many teams use both.

Can SealedKeys inject secrets into CI/CD pipelines?+

Not directly — SealedKeys doesn't have a CLI or API for programmatic secret injection. It's a web-based vault for humans. You can use SealedKeys to store and manage the credentials that get configured into your CI/CD tool's secret store, but the injection mechanism is your CI/CD platform (GitHub Actions secrets, GitLab CI/CD variables, etc.).

What is the difference between a secrets manager and a vault?+

Vault is often used generically to mean any secure storage for secrets — both password managers and secrets managers are sometimes called vaults. In the HashiCorp Vault sense, a vault is a secrets management platform for programmatic secret injection with dynamic secrets and automated rotation. SealedKeys is a vault in the password manager sense: a human-accessible encrypted store with a UI, sharing and access control.

When should a small team just use a password manager for everything?+

For early-stage teams and SMEs, a password manager that handles SSH keys, API keys and team credential sharing often covers 90% of the need without the operational complexity of running HashiCorp Vault or paying for AWS Secrets Manager. As you scale and need programmatic injection, automated rotation and dynamic credentials, add a dedicated secrets manager for that layer.

Related

The human layer of your secrets management

SealedKeys handles the credentials your team uses as humans. Free to start — 25 items, no credit card.