Skip to main content

Password Managers and Secrets

Credential management systems protect authentication secrets, API keys, certificates, and sensitive organisational data through encrypted vaults with controlled access. This reference provides procurement-grade evaluation criteria and detailed comparison of solutions suitable for mission-driven organisations, from single-person IT functions to enterprise deployments with compliance requirements.

Password managers address a fundamental security challenge: humans cannot remember unique, complex passwords for dozens or hundreds of services, yet password reuse creates catastrophic breach risk. Organisational credential management extends beyond individual password storage to include shared credentials, emergency access procedures, audit logging, and integration with identity providers.

Password Manager
Software that generates, stores, and auto-fills authentication credentials in an encrypted vault, typically protected by a master password or biometric authentication.
Secrets Management
Broader category encompassing passwords, API keys, certificates, SSH keys, and other sensitive data requiring secure storage and controlled access.
Zero-Knowledge Architecture
Design where the service provider cannot access user data; encryption keys are derived locally and never transmitted to servers.
Key Derivation Function (KDF)
Cryptographic algorithm that derives encryption keys from passwords, designed to be computationally expensive to resist brute-force attacks. Common KDFs include PBKDF2, Argon2, and bcrypt.
Vault
Encrypted container storing credentials and secrets, accessible only with correct authentication factors.

Category Definition

Functional Scope

Password managers and secrets management solutions provide:

FunctionDescriptionOrganisational benefit
Credential storageEncrypted vault for passwords, notes, payment cardsEliminates insecure storage (spreadsheets, sticky notes, shared documents)
Password generationCryptographically random password creationEnsures unique, complex passwords across all services
Auto-fillBrowser and application credential injectionReduces phishing risk through domain verification
Secure sharingControlled credential distribution to team membersEnables collaboration without exposing plaintext passwords
Audit loggingRecord of access, modifications, and sharing eventsSupports compliance and incident investigation
Emergency accessDesignated recovery procedures and trusted contactsEnsures business continuity when key personnel unavailable
API and CLI accessProgrammatic credential retrievalEnables automation and DevOps integration

Solution Categories

Password management solutions fall into distinct architectural categories:

+-------------------------------------------------------------------+
| DEPLOYMENT ARCHITECTURE |
+-------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | LOCAL-ONLY | | CLOUD-HOSTED | |
| | | | | |
| | - Database file on disk | | - Vendor infrastructure | |
| | - User manages sync | | - Automatic sync | |
| | - No account required | | - Account required | |
| | - Maximum control | | - Managed availability | |
| | | | | |
| | Example: KeePassXC | | Examples: 1Password, | |
| | | | Dashlane, Keeper | |
| +---------------------------+ +---------------------------+ |
| |
| +---------------------------+ +---------------------------+ |
| | SELF-HOSTED | | HYBRID | |
| | | | | |
| | - Organisation servers | | - Choice of deployment | |
| | - Full data sovereignty | | - Cloud or self-host | |
| | - Operational overhead | | - Feature parity varies | |
| | - Custom integration | | - Migration flexibility | |
| | | | | |
| | Examples: Passbolt, | | Examples: Bitwarden | |
| | Vaultwarden | | | |
| +---------------------------+ +---------------------------+ |
| |
+-------------------------------------------------------------------+

Figure 1: Password manager deployment architecture categories

Adjacent Categories

CategoryRelationshipWhen to use instead
Identity and Access ManagementIAM handles authentication; password managers store credentials for systems not integrated with SSOUse IAM for centralised authentication; password managers for credentials that cannot use SSO
Privileged Access Management (PAM)PAM provides session recording, just-in-time access, and privileged credential rotationUse PAM for administrative access to critical infrastructure; password managers for general credentials
Secrets Management (HashiCorp Vault, etc.)Infrastructure secrets management for applications and servicesUse infrastructure secrets managers for machine-to-machine authentication; password managers for human users
Certificate ManagementPKI and certificate lifecycle managementUse dedicated certificate management for TLS/SSL certificates at scale

Selection Requirements

Requirement Categories

Requirements are organised by priority and applicability:

PriorityDefinitionProcurement implication
CriticalSolution unusable without this capabilityMandatory; no exceptions
HighSignificant operational impact if missingRequired unless documented exception approved
MediumAffects efficiency or user experienceEvaluate against cost and complexity
LowNice to have; marginal benefitConsider only if budget allows

Security Requirements

Encryption and Cryptography

IDRequirementPriorityVerification method
SEC-001AES-256 encryption for vault data at restCriticalSecurity whitepaper review
SEC-002Zero-knowledge architecture (provider cannot access plaintext)CriticalArchitecture documentation; third-party audit
SEC-003Modern key derivation function (Argon2 or PBKDF2 ≥100,000 iterations)CriticalSecurity documentation; source code review for FOSS
SEC-004Encrypted transmission (TLS 1.2+ minimum)CriticalSecurity headers test; SSL Labs scan
SEC-005Client-side encryption before server transmissionCriticalNetwork traffic analysis; architecture documentation
SEC-006Memory protection (secure memory handling, auto-clear clipboard)HighSecurity documentation; desktop application testing
SEC-007Support for hardware security keys (FIDO2/WebAuthn)HighFeature testing; documentation review
SEC-008Configurable vault timeout and auto-lockHighApplication settings review
SEC-009Breach detection integration (compromised password checking)MediumFeature testing; API documentation
SEC-010Cryptographic audit by independent third partyHighAudit report availability

Authentication

IDRequirementPriorityVerification method
AUTH-001Multi-factor authentication supportCriticalFeature testing
AUTH-002TOTP authenticator app supportCriticalConfiguration testing
AUTH-003Hardware security key support (YubiKey, etc.)HighDevice compatibility testing
AUTH-004Biometric unlock (fingerprint, face recognition)MediumMobile/desktop application testing
AUTH-005SSO integration (SAML 2.0 or OIDC)HighIdP integration testing
AUTH-006Directory service integration (LDAP, Active Directory)MediumIntegration testing
AUTH-007Passwordless authentication optionLowFeature documentation
AUTH-008Session management (concurrent session limits, forced logout)MediumAdministrative console testing

Access Control

IDRequirementPriorityVerification method
AC-001Role-based access control (RBAC)HighAdministrative console testing
AC-002Granular sharing permissions (read-only, edit, manage)HighSharing workflow testing
AC-003Group-based credential sharingHighGroup management testing
AC-004Collection/folder-based organisation with permissionsMediumOrganisational structure testing
AC-005Time-limited access grantsMediumSharing options testing
AC-006Geographic access restrictionsLowPolicy configuration testing
AC-007Device trust requirementsMediumDevice management testing
AC-008Custom roles with configurable permissionsMediumRole management testing

Operational Requirements

Administration

IDRequirementPriorityVerification method
ADM-001Centralised administrative consoleHighConsole functionality testing
ADM-002User provisioning and deprovisioningCriticalLifecycle management testing
ADM-003SCIM provisioning supportMediumIdentity provider integration
ADM-004Bulk user import/exportMediumImport/export functionality testing
ADM-005Policy enforcement (password complexity, sharing restrictions)HighPolicy configuration testing
ADM-006Master password reset capability (admin-assisted recovery)HighRecovery workflow testing
ADM-007Account recovery without master password exposureHighRecovery process documentation
ADM-008Offboarding workflow (credential transfer, access revocation)CriticalOffboarding process testing
ADM-009Directory sync (automatic user lifecycle management)MediumDirectory integration testing
ADM-010Custom brandingLowBranding options review

Audit and Compliance

IDRequirementPriorityVerification method
AUD-001Comprehensive audit logging (access, changes, sharing)CriticalLog review and testing
AUD-002Log export capability (SIEM integration)HighExport functionality testing
AUD-003Log retention configurationMediumRetention settings review
AUD-004Compliance reports (SOC 2, ISO 27001 evidence)HighReport generation testing
AUD-005Data residency optionsHighDeployment documentation
AUD-006Event streaming (real-time log forwarding)MediumIntegration testing
AUD-007Access reports (who has access to what)HighReporting functionality
AUD-008Breach/exposure monitoringMediumFeature testing

Business Continuity

IDRequirementPriorityVerification method
BC-001Emergency access proceduresCriticalEmergency access testing
BC-002Trusted contact designationHighRecovery workflow testing
BC-003Vault export capabilityCriticalExport functionality testing
BC-004Offline accessHighOffline mode testing
BC-005Multi-device syncHighSync functionality testing
BC-006Service availability SLAHighContract review
BC-007Data backup and recoveryCriticalBackup documentation; recovery testing
BC-008Account inheritance proceduresLowInheritance workflow documentation

Integration Requirements

Identity Provider Integration

IDRequirementPriorityVerification method
IDP-001SAML 2.0 SSO supportHighSSO configuration testing
IDP-002OpenID Connect supportHighOIDC configuration testing
IDP-003Microsoft Entra ID integrationHighAzure AD testing
IDP-004Google Workspace integrationMediumGoogle IdP testing
IDP-005Okta integrationMediumOkta connector testing
IDP-006Keycloak/open source IdP supportMediumGeneric SAML/OIDC testing
IDP-007Just-in-time provisioningMediumAuto-provisioning testing
IDP-008Multi-IdP supportLowMultiple IdP configuration

Application Integration

IDRequirementPriorityVerification method
APP-001Browser extension (Chrome, Firefox, Edge, Safari)CriticalExtension installation and testing
APP-002Desktop application (Windows, macOS, Linux)HighApplication installation and testing
APP-003Mobile application (iOS, Android)HighMobile app testing
APP-004CLI toolMediumCLI functionality testing
APP-005API access (REST, GraphQL)MediumAPI documentation and testing
APP-006Browser auto-fill accuracyHighAuto-fill testing across sites
APP-007SSH key managementMediumSSH workflow testing
APP-008Passkey support (FIDO2 resident credentials)MediumPasskey creation and use testing

External Integration

IDRequirementPriorityVerification method
EXT-001SIEM integration (event forwarding)HighSplunk/Sentinel/Wazuh testing
EXT-002Webhook supportMediumWebhook configuration testing
EXT-003Microsoft 365 integrationMediumM365 connector testing
EXT-004Slack/Teams notificationsLowNotification testing
EXT-005ServiceNow integrationLowITSM connector testing
EXT-006Terraform providerLowInfrastructure-as-code testing

Usability Requirements

End User Experience

IDRequirementPriorityVerification method
UX-001Intuitive vault interfaceHighUser testing
UX-002Quick credential access (search, favourites)HighWorkflow timing
UX-003Password generator with customisationHighGenerator options testing
UX-004Secure note storageHighNote functionality testing
UX-005Custom fields for credentialsMediumField customisation testing
UX-006File attachment supportMediumAttachment functionality testing
UX-007Credential sharing workflowHighSharing process testing
UX-008Onboarding experienceMediumNew user workflow testing
UX-009Accessibility (WCAG 2.1 AA)MediumAccessibility audit
UX-010Localisation (multiple languages)LowLanguage options review

Import and Migration

IDRequirementPriorityVerification method
MIG-001Import from common formats (CSV, JSON)CriticalImport testing
MIG-002Import from major competitorsHighCompetitor import testing
MIG-003Browser password importHighBrowser import testing
MIG-004Bulk credential importHighLarge dataset import testing
MIG-005Export to standard formatsCriticalExport format verification
MIG-006Migration documentationHighDocumentation review

Deployment Requirements

Self-Hosted Deployment

IDRequirementPriorityVerification method
SH-001Container-based deployment (Docker)HighDocker deployment testing
SH-002Kubernetes supportMediumHelm chart testing
SH-003Database flexibility (PostgreSQL, MySQL, MSSQL)MediumDatabase compatibility testing
SH-004High availability configurationHighHA deployment testing
SH-005Backup and restore proceduresCriticalBackup/restore testing
SH-006Upgrade procedures without data lossCriticalUpgrade testing
SH-007Resource requirements documentationHighDocumentation review
SH-008Air-gapped deployment optionLowOffline deployment testing

Cloud Deployment

IDRequirementPriorityVerification method
CL-001Data residency options (EU, US, etc.)HighData location verification
CL-002Uptime SLA (99.9%+)HighContract review
CL-003Disaster recovery proceduresCriticalDR documentation review
CL-004Data export availabilityCriticalExport capability testing
CL-005SOC 2 Type II certificationHighAudit report review
CL-006GDPR complianceCriticalDPA review
CL-007Data processing agreement availabilityCriticalContract documentation

Comparison Matrix

Solution Overview

AttributeBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
LicenceFOSS (AGPL-3.0)FOSS (AGPL-3.0)FOSS (GPL-3.0)ProprietaryProprietaryProprietary
Current versionServer 2026.1.0API 5.8.02.7.11ContinuousContinuous17.4.1
Release date13 Jan 202622 Dec 202524 Nov 2025ContinuousContinuous3 Nov 2025
DeploymentSelf-host / CloudSelf-host / CloudLocal onlyCloud onlyCloud onlyCloud only
Nonprofit programmeYesYesN/A (free)Yes (50% discount)YesYes
Primary use caseGeneral purposeTeam collaborationPersonal/technicalEnterpriseConsumer/businessEnterprise
HeadquartersUSA (California)LuxembourgCommunity (Germany)CanadaUSA (New York)USA (Illinois)

Encryption Specifications

SpecificationBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
Vault encryptionAES-256-CBCAES-256-CFBAES-256-CBC / ChaCha20 / TwofishAES-256-GCMAES-256-CBCAES-256-GCM
AuthenticationHMAC-SHA256OpenPGP signaturesHMAC-SHA256GCM (integrated)HMACGCM (integrated)
Key derivationPBKDF2 (600k) or Argon2idN/A (OpenPGP)Argon2d/id or AES-KDFPBKDF2 (650k)Argon2dPBKDF2 (1M)
Key exchangeRSA-2048RSA-2048 / Curve25519N/A (local)RSA-2048RSA-2048ECIES / ECC-256
Two-secret modelNoNoNoYes (Secret Key)NoNo
Zero-knowledgeYesYesYes (local)YesYesYes

Security Audit and Compliance

CertificationBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
SOC 2 Type IIYesYesNoYesYesYes
SOC 3NoNoNoNoNoYes (June 2025)
ISO 27001YesNoNoYesNoYes
FedRAMPNoNoNoNoNoHigh (Dec 2025)
FIPS 140-3NoNoNoNoNoYes
ANSSI CSPNNoNoYes (v2.7.9)NoNoNo
GDPR complianceYesYesN/AYesYesYes
HIPAA compatibleYesYesYes (local)YesYesYes
Independent auditCure53Cure53 (2021, 2025)Molotnikov (2023)YesNot publishedYes
Bug bountyHackerOneYesNoHackerOneNoYes

Platform Support

PlatformBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
Chrome extensionYesYesKeePassXC-BrowserYesYesYes
Firefox extensionYesYesKeePassXC-BrowserYesYesYes
Safari extensionYesNoKeePassXC-BrowserYesYesYes
Edge extensionYesYesKeePassXC-BrowserYesYesYes
Windows desktopYesYesYesYesYesYes
macOS desktopYesYesYesYesYesYes
Linux desktopYesYesYesYesNoYes
iOS appYesYesNo (Strongbox/KeePassium)YesYesYes
Android appYesYesNo (Keepass2Android)YesYesYes
CLI toolYesYesYesYesYesYes
Web vaultYesYesNoYesYesYes

Feature Comparison

FeatureBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
Password generatorYesYesYesYesYesYes
Secure notesYesYes (v5.6+)YesYesYesYes
File attachmentsYes (1GB)NoYesYes (1GB/5GB)YesYes
Custom fieldsYesYesYesYesYesYes
TOTP storageYesYesYesYesYesYes
SSH key managementYesNoYesYesNoYes
Passkey supportYesNoLimitedYesYesYes
Credential sharingYesYesNo (database sharing)YesYesYes
Emergency accessYesNoNoYesYesYes
Travel modeNoNoNoYesNoNo
Breach monitoringYesNoYes (HIBP)YesYesYes
Password healthYesNoYesYesYesYes
Dark web monitoringEnterpriseNoNoBusinessYesYes

Administrative Features

FeatureBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
Admin consoleYesYesN/AYesYesYes
User provisioningYesYesN/AYesYesYes
SCIM supportYesBetaN/AYesYesYes
SAML SSOEnterprisePro/EnterpriseN/ABusinessBusinessBusiness
OIDC supportEnterprisePro/EnterpriseN/AYesYesYes
Directory syncYesYesN/AYesYesYes
Policy enforcementYesYesN/AYesYesYes
Audit logsYesYesN/AYesYesYes
SIEM integrationYesYesN/AYesYesYes
Custom rolesEnterprisePro/EnterpriseN/ABusinessBusinessYes
ReportingYesYesN/AYesYesYes

Pricing Comparison

TierBitwardenPassboltKeePassXC1PasswordDashlaneKeeper
Free individualYesCommunity EditionYesNoLimitedNo
Paid individual~$10/yearN/AFree~$36/year~$60/year~$35/year
Team (per user/month)~$4~$4 (Pro)Free~$8~$8~$4
Enterprise~$6/user/month~$6 (Enterprise)Free~$8/user/monthCustom~$5/user/month
Nonprofit discountFree TeamsFree CommunityN/A50%AvailableAvailable
Self-host optionYes (free)Yes (free CE)Yes (only option)NoNoNo

Note: Prices are approximate and subject to change. Contact vendors for current nonprofit pricing.


Tool Assessments

Bitwarden

Classification: FOSS password manager with optional cloud hosting

Version assessed: Server 2026.1.0, Clients 2025.12.1

Repository: github.com/bitwarden/server, github.com/bitwarden/clients

Overview

Bitwarden provides a comprehensive open-source password management solution with both self-hosted and cloud deployment options. The platform uses a zero-knowledge architecture where all encryption and decryption occurs client-side. Bitwarden’s open-source nature allows security auditing of the codebase, while the company maintains cloud infrastructure for organisations preferring managed services.

The solution targets the full spectrum of users, from individuals using the free tier to enterprises requiring SSO integration, directory sync, and advanced policies. Recent development (2025) has added Access Intelligence for credential risk insights, passkey interoperability, and ISO 27001 certification.

Technical Architecture

+------------------------------------------------------------------+
| BITWARDEN ARCHITECTURE |
+------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | CLIENT DEVICES | | BITWARDEN SERVER | |
| | | | | |
| | +-------+ +-------+ | | +-------+ +-------+ | |
| | |Browser| |Desktop| | | | API | | Admin | | |
| | |Ext. | | App | | | | Server| | Portal| | |
| | +---+---+ +---+---+ | | +---+---+ +---+---+ | |
| | | | | | | | | |
| | +---+---+ +---+---+ | | +---+-----------+---+ | |
| | |Mobile | | CLI | | | | Core Service | | |
| | | App | | Tool | | | | | | |
| | +---+---+ +---+---+ | | +--------+----------+ | |
| | | | | | | | |
| +------+-----------+--------+ | +--------v----------+ | |
| | | | | | |
| | Encrypted payloads | | Database | | |
| | (AES-256-CBC + | | (MSSQL) | | |
| | HMAC-SHA256) | | | | |
| | | +-------------------+ | |
| +------------------------>| | |
| +---------------------------+ |
| |
+------------------------------------------------------------------+

Figure 2: Bitwarden client-server architecture showing zero-knowledge design

Encryption Model

Bitwarden implements a layered encryption approach:

LayerAlgorithmPurpose
Master key derivationPBKDF2-SHA256 (600,000 iterations) or Argon2idDerive 256-bit master key from password + email salt
Key stretchingHKDFStretch to 512-bit stretched master key
Symmetric encryptionAES-256-CBCEncrypt vault items
AuthenticationHMAC-SHA256Verify integrity of encrypted data
Asymmetric sharingRSA-2048Encrypt organisation keys for sharing

Key derivation configuration:

# Default PBKDF2 configuration
Algorithm: PBKDF2-SHA256
Iterations: 600,000 (client-side)
Salt: User email address (normalised)
Output: 256-bit master key
# Optional Argon2id configuration (post-account creation)
Algorithm: Argon2id
Memory: 64 MB
Iterations: 3
Parallelism: 4
Output: 256-bit master key

The master password never leaves the client device. Authentication uses a separate hash derived from the master key, not the password directly.

Deployment Options

Cloud (Bitwarden-hosted):

  • Data centres in US (Azure) and EU (Azure)
  • Automatic updates and maintenance
  • Uptime SLA included in enterprise plans
  • CLOUD Act applies (US-headquartered)

Self-hosted requirements:

ComponentMinimumRecommended
CPU1 vCPU2+ vCPU
Memory2 GB RAM4+ GB RAM
Storage10 GB25+ GB
DatabaseMSSQL Express (10 GB limit)MSSQL Standard or PostgreSQL
ContainerDocker with Docker ComposeKubernetes with Helm
OSLinux (Ubuntu 20.04+) or Windows ServerLinux preferred

Self-hosted deployment example:

Terminal window
# Download and configure
curl -Lso bitwarden.sh https://go.btwrdn.co/bw-sh
chmod +x bitwarden.sh
./bitwarden.sh install
# Configure environment
# Edit ./bwdata/env/global.override.env
GLOBAL_SETTINGS__ATTACHMENT_MAX_SIZE=104857600
GLOBAL_SETTINGS__SEND__MAX_FILE_LENGTH=104857600
# Start services
./bitwarden.sh start
# Update procedure
./bitwarden.sh update

Strengths

  • Open source transparency: Full codebase available for audit
  • Deployment flexibility: Self-host for data sovereignty or use managed cloud
  • Feature completeness: Matches commercial competitors on core features
  • Nonprofit support: Free Teams plan for qualifying organisations
  • Active development: Monthly releases with new features
  • Standards compliance: SOC 2 Type II, ISO 27001 certified
  • Cross-platform: Full support across all major platforms

Limitations

  • Self-hosted complexity: Requires Docker knowledge and ongoing maintenance
  • MSSQL dependency: Self-hosted version requires Microsoft SQL Server
  • Enterprise features gated: SSO, directory sync require paid Enterprise tier
  • CLOUD Act exposure: Cloud-hosted data subject to US jurisdiction
  • No travel mode: Cannot hide vaults for border crossing (unlike 1Password)

Suitability Assessment

ContextSuitabilityRationale
Single IT personHighFree Teams tier; minimal self-host complexity acceptable
Small IT teamHighGood balance of features and cost
Established IT functionHighEnterprise features, SSO, directory sync available
Data sovereignty requirementHighSelf-host option with full data control
High-compliance environmentMediumSOC 2/ISO 27001 but no FedRAMP
Technical usersHighCLI, API, self-host options
Non-technical usersHighIntuitive interface; browser extension works well

Documentation Quality

ResourceQualityNotes
Security whitepaperExcellentComprehensive cryptographic documentation
Self-host guideGoodStep-by-step Docker deployment
API documentationGoodOpenAPI specification available
Admin documentationGoodClear console guidance
User documentationExcellentComprehensive help centre

Key documentation links:

  • Security whitepaper: bitwarden.com/help/bitwarden-security-white-paper
  • Architecture: contributing.bitwarden.com/architecture
  • Self-host: bitwarden.com/help/install-on-premise-linux

Passbolt

Classification: FOSS team password manager with OpenPGP encryption

Version assessed: API/Browser 5.8.0, Windows 2.5.0, Android 2.5.0, iOS 2.5.0

Repository: github.com/passbolt/passbolt_api

Overview

Passbolt takes a distinct approach to password management by building on OpenPGP (RFC 4880) rather than symmetric encryption with a master password. Each user has an RSA or ECC key pair; sharing credentials involves encrypting with recipients’ public keys. This model aligns naturally with team collaboration use cases where credentials must be shared securely between specific individuals.

The platform is self-hosted by design, with cloud hosting available as an optional managed service. Passbolt’s focus on collaboration differentiates it from general-purpose password managers—features like individual credential storage are secondary to secure team sharing workflows.

Technical Architecture

+------------------------------------------------------------------+
| PASSBOLT ARCHITECTURE |
+------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | USER DEVICE | | PASSBOLT SERVER | |
| | | | | |
| | +-------------------+ | | +-------------------+ | |
| | | Browser Extension | | | | PHP Application | | |
| | | | | | | | | |
| | | +---------------+ | | | | +---------------+ | | |
| | | | OpenPGP.js | | | | | | OpenPGP.php | | | |
| | | | (client-side) | | | | | | (validation) | | | |
| | | +---------------+ | | | | +---------------+ | | |
| | | | | | | | | |
| | | +---------------+ | | | | +---------------+ | | |
| | | | Private Key | | | | | | Public Keys | | | |
| | | | (never sent) | | | | | | (all users) | | | |
| | | +---------------+ | | | | +---------------+ | | |
| | +--------+----------+ | | +--------+----------+ | |
| | | | | | | |
| +-----------+---------------+ | +--------v----------+ | |
| | | | | | |
| | GpgAuth | | MySQL/ | | |
| | (challenge- | | PostgreSQL | | |
| | response) | | | | |
| | | +-------------------+ | |
| +------------------->| | |
| +---------------------------+ |
| |
+------------------------------------------------------------------+

Figure 3: Passbolt architecture showing OpenPGP-based encryption model

Encryption Model

Passbolt’s cryptographic model differs fundamentally from password-derived encryption:

ComponentImplementationPurpose
User keysRSA-2048 (default) or Curve25519Asymmetric encryption for sharing
Symmetric cipherAES-256-CFBEncrypt credential payloads
Hash functionsSHA-256, SHA-512Integrity verification
AuthenticationGpgAuth challenge-responseNo password hash transmitted
Metadata encryptionAES-256-GCM (SSO) or OpenPGPZero-knowledge mode

Key characteristics:

  • No master password hash stored anywhere
  • Private key protected by passphrase, stored client-side only
  • Sharing = encrypting with recipient’s public key
  • Server validates signatures but cannot decrypt data

GpgAuth authentication flow:

User Server
| |
|----(1) Request-------->|
| |
|<---(2) Server token----| (encrypted with user's public key)
| |
|----(3) Decrypted------>| (proves possession of private key)
| token |
| |
|<---(4) User token------| (for user to verify server identity)
| |
|----(5) Session-------->| (authenticated session established)
| |

Figure 4: GpgAuth challenge-response authentication

Deployment Options

Self-hosted (primary model):

ComponentRequirement
Web serverNginx or Apache
PHP8.1+ with required extensions
DatabaseMySQL 8.0+ or PostgreSQL 13+
SSL certificateRequired (Let’s Encrypt acceptable)
ContainerDocker available

Docker deployment:

Terminal window
# Using official Docker image
docker pull passbolt/passbolt:latest
# Configure with environment variables
docker run -d \
--name passbolt \
-e DATASOURCES_DEFAULT_HOST=db \
-e DATASOURCES_DEFAULT_DATABASE=passbolt \
-e DATASOURCES_DEFAULT_USERNAME=passbolt \
-e DATASOURCES_DEFAULT_PASSWORD=secure_password \
-e APP_FULL_BASE_URL=https://passbolt.example.org \
passbolt/passbolt:latest

Cloud (Passbolt-hosted):

  • Available for Pro and Enterprise tiers
  • EU data centre (Luxembourg)
  • SOC 2 Type II certified
  • GDPR compliant

Feature Highlights (2025)

Recent releases have added significant capabilities:

VersionFeatureDescription
5.8.0Dynamic role managementCustom RBAC roles
5.7.0Secret historyTrack credential changes over time
5.6.0Standalone notesSecure notes without credentials
5.5.0Encrypted metadataZero-knowledge mode for all metadata
5.4.0SCIM provisioningAutomated user lifecycle (beta)

Strengths

  • OpenPGP foundation: Proven cryptographic standard; key portability
  • Collaboration focus: Designed for team credential sharing from the start
  • Self-hosted first: Full data sovereignty with primary deployment model
  • EU jurisdiction: Luxembourg headquarters; GDPR-native
  • Security audits: Regular Cure53 audits (2021 full, 2025 metadata)
  • Active development: Consistent monthly releases
  • API-first: Comprehensive REST API for automation

Limitations

  • No Safari extension: macOS users must use desktop app
  • No file attachments: Cannot store documents in vault
  • Mobile experience: Less mature than desktop/browser
  • Complexity: OpenPGP model requires user understanding of key management
  • No emergency access: Missing trusted contact / dead man’s switch
  • Individual use limited: Team sharing focus means personal features secondary

Suitability Assessment

ContextSuitabilityRationale
Single IT personLowOverhead too high for single user
Small IT teamHighTeam sharing is primary use case
Established IT functionHighEnterprise features, SSO, directory sync
Data sovereignty requirementExcellentSelf-host by default; EU cloud option
High-compliance environmentMediumSOC 2 but no FedRAMP
Technical usersHighOpenPGP model appeals to security-conscious
Non-technical usersMediumKey concepts require explanation

Documentation Quality

ResourceQualityNotes
Security whitepaperExcellentDetailed cryptographic documentation (August 2025, Rev 9)
Installation guideGoodMultiple deployment options covered
API documentationExcellentComprehensive REST API reference
Admin documentationGoodClear role and policy guidance
User documentationGoodCovers browser extension workflow

Key documentation links:

  • Security whitepaper: passbolt.com/docs/hosting/security/security-white-paper
  • Installation: passbolt.com/docs/hosting/install
  • API reference: passbolt.com/docs/api

KeePassXC

Classification: FOSS local password manager with database file storage

Version assessed: 2.7.11 (24 November 2025)

Repository: github.com/keepassxreboot/keepassxc

Overview

KeePassXC is a community-driven fork of KeePass, rewritten in C++ with Qt for cross-platform compatibility. Unlike cloud-based solutions, KeePassXC stores credentials in an encrypted database file (KDBX format) that users manage locally. This local-first approach provides maximum control and privacy but requires users to handle their own synchronisation and backup.

The project achieved significant recognition in November 2025 when version 2.7.9 received French ANSSI First-level Security Certification (CSPN), validating its security model for government use. This certification, combined with a prior independent security audit, makes KeePassXC one of the most scrutinised password managers available.

Technical Architecture

+------------------------------------------------------------------+
| KEEPASSXC ARCHITECTURE |
+------------------------------------------------------------------+
| |
| +---------------------------+ |
| | USER DEVICE | |
| | | |
| | +-------------------+ | +---------------------------+ |
| | | KeePassXC App | | | KDBX Database File | |
| | | | | | | |
| | | +---------------+ | | | +---------------------+ | |
| | | | Crypto Engine | | | | | Outer Header | | |
| | | | AES/ChaCha20/ | |<---+--->| | (cipher, KDF, | | |
| | | | Twofish | | | | | parameters) | | |
| | | +---------------+ | | | +---------------------+ | |
| | | | | | | Inner Header | | |
| | | +---------------+ | | | | (stream cipher, | | |
| | | | KDF Engine | | | | | binary attachments)| | |
| | | | Argon2d/id | | | | +---------------------+ | |
| | | | AES-KDF | | | | | Encrypted Payload | | |
| | | +---------------+ | | | | (XML with entries) | | |
| | | | | | +---------------------+ | |
| | | +---------------+ | | | | HMAC Blocks | | |
| | | | Browser Int. | | | | | (integrity check) | | |
| | | | (native msg) | | | | +---------------------+ | |
| | | +---------------+ | | +---------------------------+ |
| | +-------------------+ | |
| | | | User manages |
| +-----------+---------------------------------+ sync/backup |
| | |
| +-----------v------------------+ |
| | Optional: Cloud Storage | (Dropbox, Google Drive, |
| | (not managed by KeePassXC) | Syncthing, rsync, etc.) |
| +------------------------------+ |
| |
+------------------------------------------------------------------+

Figure 5: KeePassXC local architecture with optional user-managed sync

Encryption Model

KeePassXC supports the KDBX 4 format with configurable encryption:

ComponentOptionsDefault
CipherAES-256-CBC, ChaCha20, Twofish-256AES-256-CBC
KDFArgon2d, Argon2id, AES-KDFArgon2d
Stream cipherChaCha20 (inner), Salsa20 (legacy)ChaCha20
HMACHMAC-SHA256 (block authentication)Required

Argon2 default parameters:

Algorithm: Argon2d (GPU/ASIC resistant)
Memory: 64 MB
Iterations: Calibrated to ~1 second unlock time
Parallelism: CPU core count

Composite key derivation:

Composite Key = SHA256(
SHA256(password) +
keyfile_contents +
hardware_key_response
)
Master Key = KDF(Composite Key, parameters)

Authentication Factors

KeePassXC supports multiple authentication factors:

FactorDescriptionSecurity benefit
Master passwordPrimary knowledge factorRequired or optional with key file
Key fileFile with random bytesSomething you have; can require both password + key
YubiKey / OnlyKeyHMAC-SHA1 challenge-responseHardware factor; physically required to unlock
Windows HelloBiometric quick unlockConvenience (not a replacement for master key)

Multi-factor configuration example:

  • Require password + key file for database open
  • Key file stored on USB drive or secure location
  • YubiKey in challenge-response mode for additional factor

Platform Support

Native applications (official):

PlatformDistributionNotes
WindowsInstaller, portable, Microsoft StoreFull feature parity
macOSDMG, HomebrewFull feature parity
LinuxAppImage, Snap, Flatpak, distro packagesPrimary development platform

Browser integration:

  • KeePassXC-Browser extension connects to desktop application
  • Uses native messaging (not cloud sync)
  • Requires KeePassXC desktop running

Mobile (community, third-party):

PlatformRecommended appNotes
iOSStrongbox, KeePassiumKDBX format compatible; sync via Files app
AndroidKeepass2AndroidKDBX format compatible; direct cloud storage integration

Strengths

  • Local-only control: No account, no cloud dependency, complete data ownership
  • Security certifications: ANSSI CSPN (2025), independent audit (2023)
  • Encryption choice: Select cipher and KDF to match threat model
  • Free forever: No paid tiers, no feature restrictions
  • Cross-platform: Native performance on Windows, macOS, Linux
  • SSH agent: Built-in SSH key management
  • No attack surface: No server to compromise, no account to breach
  • KDBX portability: Database format supported by many applications

Limitations

  • No native mobile app: Relies on third-party apps for iOS/Android
  • Manual sync required: User manages file synchronisation
  • No credential sharing: Database file sharing is all-or-nothing
  • No emergency access: No built-in trusted contact or recovery mechanism
  • No breach monitoring: Cannot check credentials against breach databases (manual only)
  • Browser integration complexity: Requires desktop app running; connection setup
  • No centralised administration: Cannot manage multiple users centrally

Synchronisation Patterns

Since KeePassXC doesn’t provide sync, users must implement their own:

MethodProsCons
Cloud storage (Dropbox, Google Drive)Easy setup; automaticThird-party access to encrypted file
SyncthingPeer-to-peer; no third partySetup complexity; requires always-on device
rsync / SSHFull control; scriptableManual trigger; technical knowledge required
Network shareSimple; works offlineSingle point of failure; LAN only

Conflict resolution:

  • KDBX format doesn’t auto-merge
  • If conflict occurs, choose version and manually reconcile
  • Some third-party apps (Strongbox) support conflict resolution

Suitability Assessment

ContextSuitabilityRationale
Single IT personHighSimple, free, complete control
Small IT teamLowNo sharing mechanism; each user needs own database
Established IT functionLowNo centralised administration
Data sovereignty requirementExcellentNo cloud, no account, pure local storage
High-compliance environmentHighANSSI certified; audited; local control
Technical usersExcellentPower user features; full configurability
Non-technical usersMediumSync setup and browser integration require guidance

Documentation Quality

ResourceQualityNotes
User guideGoodComprehensive feature documentation
Security auditExcellentPublished Molotnikov audit report
FAQGoodCommon questions addressed
Browser extensionGoodSetup instructions clear
Comparison docsLimitedDifferences from KeePass not fully documented

Key documentation links:

  • User guide: keepassxc.org/docs
  • Security audit: keepassxc.org/assets/pdf/KeePassXC-Review-V1-Molotnikov.pdf
  • ANSSI certification: cyber.gouv.fr (search KeePassXC)

1Password

Classification: Commercial password manager with cloud-only deployment

Version assessed: Continuous release (January 2026 updates across platforms)

Website: 1password.com

Overview

1Password pioneered many features now standard in password management, including Travel Mode (hide vaults at borders) and Watchtower (breach monitoring). The platform serves both consumers and enterprises, with a particular strength in user experience and design.

A distinguishing architectural feature is the two-secret model: users have both an account password and a randomly generated Secret Key. Both are required to derive encryption keys, meaning 1Password cannot decrypt vaults even with a court order—they don’t have the Secret Key.

1Password is cloud-only with no self-hosted option, positioning simplicity and security as compatible goals.

Technical Architecture

+------------------------------------------------------------------+
| 1PASSWORD ARCHITECTURE |
+------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | USER DEVICE | | 1PASSWORD SERVICE | |
| | | | (AWS multi-region) | |
| | +-------------------+ | | | |
| | | 1Password Client | | | +-------------------+ | |
| | | | | | | SRP Auth Server | | |
| | | +---------------+ | | | | (no password | | |
| | | | Crypto Engine | | | | | transmitted) | | |
| | | | AES-256-GCM | | | | +-------------------+ | |
| | | +---------------+ | | | | |
| | | | | | +-------------------+ | |
| | | +---------------+ | | | | Encrypted Vault | | |
| | | | Key Derivation| | | | | Storage | | |
| | | | PBKDF2 650k | | | | | (cannot decrypt | | |
| | | | + HKDF | | | | | without Secret | | |
| | | +---------------+ | | | | Key) | | |
| | | | | | | +-------------------+ | |
| | | v | | | | |
| | | +---------------+ | | +---------------------------+ |
| | | | Master Unlock | | | |
| | | | Key (MUK) | | | |
| | | | derived from: | | | |
| | | | - Password | | | |
| | | | - Secret Key | | | |
| | | +---------------+ | | |
| | +-------------------+ | |
| +---------------------------+ |
| |
+------------------------------------------------------------------+

Figure 6: 1Password two-secret architecture

Encryption Model

1Password’s security model centres on the Secret Key:

ComponentSpecification
Vault encryptionAES-256-GCM
Key derivationPBKDF2-HMAC-SHA256 (650,000 iterations) + HKDF
Secret Key128-bit randomly generated (34 characters including dashes)
AuthenticationSRP v6 (Secure Remote Password)
SharingRSA-2048 public key encryption

Two-secret key derivation:

Secret Key: A3-XXXXXX-XXXXXX-XXXXX-XXXXX-XXXXX-XXXXX
|
128 bits of entropy (2^128 possible values)
Master Unlock Key = HKDF(
PBKDF2(
password,
email + secret_key, # Salt includes Secret Key
650000 # Iterations
),
additional_context
)

Security implications:

  • Server breach: Attacker gets encrypted vaults but needs Secret Key to attempt password brute-force
  • Phishing: Password alone is insufficient
  • Court order: 1Password cannot comply; they don’t have Secret Key
  • User burden: Must store Secret Key securely (Emergency Kit)

Platform Coverage

PlatformApplicationAuto-fill support
ChromeExtensionYes
FirefoxExtensionYes
SafariExtensionYes
EdgeExtensionYes
WindowsDesktop appYes (system-wide)
macOSDesktop app + Safari extensionYes (system-wide)
LinuxDesktop appYes (limited)
iOSNative appYes (system autofill)
AndroidNative appYes (Autofill Framework)
CLI1Password CLIScriptable access

Enterprise Features

FeatureCapability
SSO integrationSAML 2.0, OIDC with major IdPs
SCIM provisioningAutomatic user lifecycle
Custom groupsFlexible team structures
Vault policiesPassword requirements, sharing rules
Audit loggingComprehensive activity logs
SIEM integrationEvent streaming available
ReportsAccess reports, security scores
Admin consoleCentralised management

Unique Features

FeatureDescriptionBenefit
Travel ModeHide designated vaultsBorder crossing protection
WatchtowerBreach monitoring, weak password detectionProactive security
Secret KeyTwo-factor encryption (not just auth)Defence in depth
SSH AgentNative SSH key managementDeveloper workflow
Passkey supportStore and use passkeysFuture-proof authentication

Strengths

  • User experience: Widely praised interface design
  • Two-secret model: Unique defence against server compromise
  • Feature completeness: Full enterprise feature set
  • Cross-platform excellence: Consistent experience across all platforms
  • Travel Mode: Unique capability for border crossing
  • Active development: Continuous feature releases
  • Security investment: Regular audits, bug bounty, dedicated security team
  • Nonprofit discount: 50% off for qualifying organisations

Limitations

  • Cloud-only: No self-hosted option; must trust 1Password
  • Canadian/US jurisdiction: Data subject to Five Eyes intelligence sharing
  • Cost: Premium pricing compared to open-source alternatives
  • No Linux first-class: Desktop experience less polished than macOS/Windows
  • Secret Key UX: Users must securely store Emergency Kit
  • Vendor lock-in: Limited export options (though improving)

Suitability Assessment

ContextSuitabilityRationale
Single IT personMediumCost may be prohibitive for personal/small use
Small IT teamHighTeams plan offers good value
Established IT functionExcellentFull enterprise features, excellent UX reduces support
Data sovereignty requirementLowCloud-only; no self-host
High-compliance environmentMediumSOC 2, ISO 27001 but no FedRAMP
Technical usersHighCLI, SSH agent, passkeys
Non-technical usersExcellentBest-in-class usability

Documentation Quality

ResourceQualityNotes
Security whitepaperExcellentDetailed cryptographic documentation
User guideExcellentComprehensive, well-organised
Admin documentationExcellentClear enterprise guidance
API documentationGoodDeveloper-focused
BlogGoodRegular security and feature updates

Key documentation links:

  • Security whitepaper: 1password.com/files/1password-white-paper.pdf
  • Support: support.1password.com
  • Security: 1password.com/security

Dashlane

Classification: Commercial password manager with consumer and business offerings

Version assessed: Continuous release (H1 2025 release notes)

Website: dashlane.com

Overview

Dashlane targets both consumers and businesses with a polished user experience and strong security foundation. The platform differentiates through features like built-in VPN (Premium plans) and passwordless authentication options. Recent development has focused on enterprise features including secure enclave SSO using AWS Nitro.

Dashlane’s security whitepaper (v2.7.0, January 2025) provides exceptional transparency about their cryptographic implementation, documenting 41 pages of security architecture detail.

Technical Architecture

+-------------------------------------------------------------------+
| DASHLANE ARCHITECTURE |
+-------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | USER DEVICE | | DASHLANE SERVICE | |
| | | | (AWS) | |
| | +-------------------+ | | | |
| | | Dashlane Client | | | +-------------------+ | |
| | | | | | | Auth Service | | |
| | | +---------------+ | | | | (DeviceKey auth) | | |
| | | | Argon2d KDF | | | | +-------------------+ | |
| | | | (3 iter, | | | | | |
| | | | 32 MB mem) | | | | +-------------------+ | |
| | | +---------------+ | | | | Encrypted Vault | | |
| | | | | | | Storage | | |
| | | +---------------+ | | | +-------------------+ | |
| | | | AES-256-CBC | | | | | |
| | | | + HMAC | | | | +-------------------+ | |
| | | +---------------+ | | | | SSO Connector | | |
| | | | | | | (Nitro Enclave | | |
| | | +---------------+ | | | | or self-hosted) | | |
| | | | Passwordless | | | | +-------------------+ | |
| | | | Option: | | | | | |
| | | | 243-bit MGP | | | +---------------------------+ |
| | | +---------------+ | | |
| | +-------------------+ | |
| +---------------------------+ |
| |
+-------------------------------------------------------------------+

Figure 7: Dashlane architecture showing Argon2d and passwordless options

Encryption Model

Dashlane uses Argon2d for key derivation with specific parameters:

ComponentSpecification
Vault encryptionAES-256-CBC with HMAC authentication
Key derivationArgon2d (3 iterations, 32,768 KB memory, 2 parallelism)
Master password validationzxcvbn library (score ≥3 required, 10^8 - 10^10 guesses)
Device authentication40-byte DeviceKey (OpenSSL RAND_byte)
SharingRSA-2048 public/private keys + AES-256 ObjectKeys
Passwordless40-character machine-generated password (~243 bits entropy)

Passwordless authentication:

Dashlane offers true passwordless accounts where:

  • Machine-Generated Password (MGP) replaces master password
  • 40-character string with ~243 bits of entropy
  • Device-bound; recovery requires Account Recovery Key or admin assistance
  • Eliminates master password as attack vector

SSO architecture options:

OptionImplementationKey management
Self-hosted connectorOn-premises connectorXOR of two 64-byte keys (user + connector)
Dashlane-hostedAWS Nitro EnclaveSecure enclave with attestation
Confidential computingNitro encryptionKeys never accessible to Dashlane

Platform Support

PlatformApplicationNotes
ChromeExtensionPrimary platform
FirefoxExtensionFull feature parity
SafariExtensionFull feature parity
EdgeExtensionFull feature parity
WindowsDesktop appFull features
macOSDesktop appFull features
LinuxNo native appWeb vault only
iOSNative appFull features
AndroidNative appFull features
CLIAvailableFor automation
Webvault.dashlane.comFull access

Business Features

FeatureCapability
SSO integrationSAML 2.0, self-hosted or Dashlane-hosted connector
SCIM provisioningAutomatic user lifecycle
Groups and collectionsTeam organisation
PoliciesPassword requirements, sharing restrictions
Audit logsActivity tracking
Admin consoleCentralised management
Account recoveryAdmin-assisted recovery for business
Dark web monitoringCredential exposure alerts

Unique Features

FeatureDescriptionBenefit
VPNBuilt-in VPN serviceAdditional privacy (Premium plans)
PasswordlessMachine-generated passwordsEliminate master password risk
Nitro Enclave SSOAWS confidential computingTrue zero-knowledge SSO
Password ChangerAutomated password rotation (limited sites)Convenience

Strengths

  • Excellent documentation: 41-page security whitepaper with full cryptographic detail
  • Argon2 by default: Modern KDF without user configuration
  • Passwordless option: Innovative approach to eliminate master password
  • Nitro Enclave SSO: True zero-knowledge enterprise SSO
  • Cross-platform: Strong mobile and desktop experience
  • VPN included: Additional value in premium tiers
  • Nonprofit programme: Discounts available

Limitations

  • No Linux desktop: Relies on web vault and browser extension
  • No self-host: Cloud-only deployment
  • US jurisdiction: Subject to US legal processes
  • Higher cost: Premium pricing tier
  • Limited file storage: Attachments limited in size
  • SSO complexity: Connector deployment for self-hosted option

Suitability Assessment

ContextSuitabilityRationale
Single IT personMediumConsumer tier works but cost may be high
Small IT teamHighBusiness tier provides good value
Established IT functionHighEnterprise features, excellent documentation
Data sovereignty requirementLowCloud-only; US jurisdiction
High-compliance environmentMediumSOC 2, PCI-DSS but no FedRAMP
Technical usersMediumNo Linux desktop; good CLI
Non-technical usersExcellentStrong UX, VPN simplifies security

Documentation Quality

ResourceQualityNotes
Security whitepaperExcellentMost detailed of any vendor (41 pages)
User guideGoodComprehensive help centre
Admin documentationGoodBusiness setup covered
API documentationGoodDeveloper documentation available
Open sourcePartialMobile apps, extension on GitHub

Key documentation links:

  • Security whitepaper: dashlane.com/download/whitepaper-en.pdf
  • Support: support.dashlane.com
  • GitHub: github.com/Dashlane

Keeper

Classification: Commercial password manager with enterprise and government focus

Version assessed: Vault 17.4.1, Browser 17.5 (January 2026)

Website: keepersecurity.com

Overview

Keeper positions itself for enterprise and government markets, achieving FedRAMP High authorisation (December 2025) and FIPS 140-3 compliance. The platform extends beyond password management into privileged access management (KeeperPAM), secrets management, and connection management.

Recent development (2025) introduced Keeper Forcefield, an anti-infostealer technology that protects credentials even if a device is compromised by malware.

Technical Architecture

+-------------------------------------------------------------------+
| KEEPER ARCHITECTURE |
+-------------------------------------------------------------------+
| |
| +---------------------------+ +---------------------------+ |
| | USER DEVICE | | KEEPER CLOUD | |
| | | | (AWS multi-region) | |
| | +-------------------+ | | | |
| | | Keeper Client | | | +-------------------+ | |
| | | | | | | Auth Service | | |
| | | +---------------+ | | | | (PBKDF2 auth | | |
| | | | PBKDF2 1M | | | | | token) | | |
| | | | iterations | | | | +-------------------+ | |
| | | +---------------+ | | | | |
| | | | | | +-------------------+ | |
| | | +---------------+ | | | | Encrypted Records | | |
| | | | AES-256-GCM | | | | | (per-record keys) | | |
| | | | per-record | | | | +-------------------+ | |
| | | +---------------+ | | | | |
| | | | | | +-------------------+ | |
| | | +---------------+ | | | | KeeperPAM | | |
| | | | Key Hierarchy:| | | | | (privileged | | |
| | | | Record Key | | | | | access mgmt) | | |
| | | | -> Data Key | | | | +-------------------+ | |
| | | | -> MP Key | | | | | |
| | | +---------------+ | | | +-------------------+ | |
| | | | | | | GovCloud Option | | |
| | | +---------------+ | | | | (FedRAMP High) | | |
| | | | SSO: ECC-256 | | | | +-------------------+ | |
| | | | (passwordless)| | | | | |
| | | +---------------+ | | +---------------------------+ |
| | +-------------------+ | |
| +---------------------------+ |
| |
+-------------------------------------------------------------------+

Figure 8: Keeper architecture showing key hierarchy and GovCloud option

Encryption Model

Keeper uses a hierarchical key structure:

LayerAlgorithmPurpose
Record keysAES-256-GCMEncrypt individual records
Folder keysAES-256-GCMEncrypt folder structure
Data keyAES-256-GCMWrap record and folder keys
Master password keyPBKDF2 (1,000,000 iterations)Derive from password
AuthenticationPBKDF2 (1,000,000) + HMAC-SHA256Separate from encryption
TransmissionAES-256 + TLSAdditional layer during transit
SSOECC-256 (secp256r1)Passwordless device keys

Key derivation detail:

# Encryption key derivation
Salt: 128-bit random
Iterations: 1,000,000
Algorithm: PBKDF2-HMAC-SHA256
Output: 256-bit Master Password Key
# Authentication key (separate)
Iterations: 1,000,000
Algorithm: PBKDF2-HMAC-SHA256
Then: HMAC-SHA256 for auth token

SSO without master password:

When SSO is configured, Keeper uses ECC-256 device keys instead of master password:

  • Eliminates master password attack vector entirely
  • Device key stored in secure hardware where available
  • Key rotation managed by administrator

Compliance Certifications

Keeper has the strongest compliance portfolio among assessed solutions:

CertificationStatusDate
SOC 2 Type IICertifiedCurrent
SOC 3CertifiedJune 2025
FedRAMP HighAuthorisedDecember 2025
GovRAMPAuthorisedCurrent
FIPS 140-3CertifiedCurrent
ISO 27001CertifiedCurrent
ISO 27017CertifiedCurrent
ISO 27018CertifiedCurrent
PCI DSSCompliantCurrent

Platform Support

PlatformApplicationNotes
ChromeExtensionFull features
FirefoxExtensionFull features
SafariExtensionFull features
EdgeExtensionFull features
WindowsDesktop appFull features
macOSDesktop appFull features
LinuxDesktop appFull features
iOSNative appFull features
AndroidNative appFull features
CLICommander CLIScripting and automation
Webkeepersecurity.com/vaultFull access

Enterprise and Government Features

FeatureCapability
SSO integrationSAML 2.0, OIDC, passwordless SSO
SCIM provisioningAutomatic user lifecycle
KeeperPAMPrivileged access management
Secrets ManagerMachine secrets management
Connection ManagerSecure remote access
BreachWatchDark web monitoring
Advanced reportingCompliance and security reports
GovCloudFedRAMP High environment
Event loggingDetailed audit trails
SIEM integrationEvent streaming

Unique Features

FeatureDescriptionBenefit
FedRAMP HighUS government authorisationRequired for federal contracts
Keeper ForcefieldAnti-infostealer technologyMalware protection
KeeperPAMIntegrated PAM solutionSingle platform for passwords and privileged access
Password rotationAutomated credential rotationReduce credential age
Secrets ManagerMachine-to-machine secretsDeveloper workflow

Strengths

  • Compliance leadership: Only solution with FedRAMP High in this assessment
  • Government ready: GovCloud, FIPS 140-3, extensive certifications
  • Enterprise depth: PAM, secrets management, connection management
  • Security features: Forcefield anti-malware, BreachWatch
  • Linux support: Full desktop application
  • High iteration KDF: 1,000,000 PBKDF2 iterations
  • Nonprofit programme: Discounts available

Limitations

  • No self-host: Cloud-only deployment
  • US jurisdiction: Subject to US legal processes (though GovCloud option)
  • Complexity: Many products can be confusing
  • Premium pricing: Enterprise-focused pricing
  • Limited FOSS visibility: Closed source

Suitability Assessment

ContextSuitabilityRationale
Single IT personLowEnterprise pricing and features
Small IT teamMediumMay be overspecified
Established IT functionHighFull enterprise features
Data sovereignty requirementLowCloud-only; US company
High-compliance environmentExcellentFedRAMP High, FIPS 140-3
Government organisationExcellentGovCloud option
Technical usersHighCLI, Secrets Manager, PAM
Non-technical usersHighGood UX despite enterprise focus

Documentation Quality

ResourceQualityNotes
Encryption documentationExcellentDetailed model documentation
Admin documentationExcellentComprehensive enterprise guidance
Compliance documentationExcellentAudit reports and certifications
API documentationGoodREST API reference
User documentationGoodHelp centre coverage

Key documentation links:

  • Encryption model: docs.keeper.io/enterprise-guide/keeper-encryption-model
  • Security and compliance: keepersecurity.com/security
  • Documentation: docs.keeper.io

Implementation Considerations

Deployment Decision Framework

Data sovereignty required?
|
+----------------+----------------+
| |
[Yes] [No]
| |
+-------+-------+ +-------+-------+
| | | |
v v v v
+--------------+ +--------------+ +---------------+ +--------------+
| Local Only | | Self-Hosted | | Enterprise | | SMB / |
| (Air-gapped) | | (On-Prem) | | Compliance | | Cloud |
+------+-------+ +------+-------+ +-------+-------+ +------+-------+
| | | |
v v v v
+--------------+ +--------------+ FedRAMP required? +------------+
| KeePassXC | | Bitwarden | | | Bitwarden |
+--------------+ | or | +----+----+ | (Cloud) |
| Passbolt | | | | or |
+--------------+ [Yes] [No] | 1Password |
| | +------------+
v v
+----------+ +-----------+
| Keeper | | 1Password |
| GovCloud | | Dashlane |
+----------+ | Keeper |
+-----------+

Figure 9: Decision framework for password manager selection

Migration Planning

When transitioning between password managers:

PhaseActivitiesDuration
AssessmentExport current credentials; identify sharing patterns; document custom fields1-2 weeks
PilotDeploy new solution to IT team; validate import; test critical workflows2-4 weeks
Staged rolloutDepartment by department; training; support capacity4-12 weeks
CoexistenceRun both systems; gradual migration of credentials2-4 weeks per department
DecommissionVerify complete migration; revoke old system access; secure disposal1-2 weeks

Import format compatibility:

FromTo BitwardenTo PassboltTo 1PasswordTo DashlaneTo Keeper
BitwardenN/AYes (JSON)YesYesYes
PassboltYes (CSV)N/AYes (CSV)Yes (CSV)Yes (CSV)
KeePassXCYes (KDBX)Yes (CSV)Yes (KDBX)Yes (KDBX)Yes (CSV)
1PasswordYes (1PIF)Yes (CSV)N/AYesYes
DashlaneYesYes (CSV)YesN/AYes
KeeperYesYes (CSV)YesYesN/A
LastPassYesYes (CSV)YesYesYes
ChromeYesYes (CSV)YesYesYes

Organisational Context Recommendations

For organisations with limited IT capacity

Recommended: Bitwarden (cloud) or 1Password

Rationale:

  • Minimal operational overhead
  • Good free/nonprofit tiers
  • Intuitive user experience reduces support burden
  • No infrastructure to manage

Implementation approach:

  1. Start with browser extension deployment
  2. Import from browser password storage
  3. Enable MFA for all users
  4. Implement shared collections for team credentials
  5. Document emergency access procedures

For organisations with data sovereignty requirements

Recommended: KeePassXC (local) or Bitwarden/Passbolt (self-hosted)

Rationale:

  • Complete control over data location
  • No third-party access
  • Audit trail under organisational control

Implementation approach:

  1. KeePassXC: Establish secure sync mechanism (Syncthing recommended)
  2. Self-hosted: Deploy on organisational infrastructure
  3. Document backup and recovery procedures
  4. Consider key file distribution for additional security

For high-compliance environments

Recommended: Keeper (especially for FedRAMP) or 1Password

Rationale:

  • Comprehensive compliance certifications
  • Audit-ready documentation
  • Enterprise policy controls

Implementation approach:

  1. Review compliance requirements against vendor certifications
  2. Configure policies to meet control requirements
  3. Enable comprehensive audit logging
  4. Integrate with SIEM for monitoring
  5. Document evidence collection procedures

For technical teams

Recommended: Bitwarden or KeePassXC

Rationale:

  • Open source transparency
  • CLI tools for automation
  • Self-host option for control
  • SSH key management

Implementation approach:

  1. Deploy CLI alongside GUI applications
  2. Integrate with development workflows
  3. Configure SSH agent (where supported)
  4. Establish secrets management practices for CI/CD

Procurement Checklist

Pre-Procurement

ItemQuestions to answer
RequirementsWhat credentials need management? Who needs access? What sharing patterns exist?
ConstraintsData sovereignty requirements? Compliance mandates? Budget limitations?
ScaleNumber of users? Growth projections?
IntegrationIdentity provider in use? SIEM deployed? Browser standards?
Existing toolsCurrent password storage methods? Migration scope?

Vendor Evaluation

CriterionWeightEvaluation method
Security architectureHighWhitepaper review; third-party audit reports
Feature fitHighRequirements mapping; hands-on trial
Platform coverageMediumTest on required browsers, devices, OS
AdministrationMediumConsole walkthrough; policy configuration
Migration pathHighImport testing with current data
Support modelMediumSupport channel testing; SLA review
Cost structureMediumTotal cost calculation including growth
Exit strategyHighExport testing; contract review

Trial Period Evaluation

WeekFocus areaDeliverables
1Setup and importWorking instance; imported data; basic configuration
2Daily useAuto-fill testing; mobile experience; browser coverage
3AdministrationPolicy configuration; user management; SSO testing
4Advanced featuresSharing workflows; emergency access; reporting

Contract Considerations

TermWhy it matters
Data processing agreementRequired for GDPR compliance
Data export rightsEnsure you can leave
Uptime SLABusiness continuity
Security notificationBreach awareness
Audit rightsCompliance verification
Price protectionBudget predictability
Termination assistanceSmooth exit

See Also