New user guide

How SecureVault works

Everything you need to know — from first login to team collaboration.

Overview

How your password travels

From what you type to what gets stored — see exactly what happens.

How your password travels

You

Type a password

AES-256

Encrypted instantly

Database

Gibberish stored

Only you

Can decrypt it

Core concept

Three levels. Everything organized.

Every secret lives inside an Organization → Vault → Credential hierarchy. Click each level to explore.

Acme Corp

Company vault

Your isolated workspace. Think of it as your own private island — no other user can see in.

Getting started

Up and running in 4 steps

Follow these steps or click any tab to jump ahead.

1

Create an Organization

After registering, you'll be prompted to create your first organization. This is your private workspace — completely isolated from other users.

Choose a descriptive name like "Personal", "Acme Corp", or "Family".
Each organization is a separate tenant. Data never leaks between orgs.
You can create multiple organizations for different use cases.

New organization

Acme Corp
Personal
Family
Company

What you can store

Any secret. Any format.

Fields are fully flexible — name them anything. Every value is encrypted individually before saving.

🖥

Production Server

Every field encrypted with AES-256-GCM

ENCRYPTED
Usernameadmin@prod.example.com
Password••••••••••••••
SSH Key-----BEGIN RSA PRIVATE KEY-----
Host IP192.168.1.100

Working with secrets

Reveal, copy, or generate

All interactive — try clicking each action below.

Reveal

Password••••••••

Click the eye to reveal temporarily. Masks again after 3 seconds.

Copy

API Keysk-live-••••••••

Copies plaintext to clipboard without showing it on screen.

Generate

Xk9#mP2@qL7!nR4$

Cryptographically random. Click refresh for a new one.

Roles & permissions

Everyone gets exactly what they need

Four roles, precisely scoped. Click each role to compare access.

Delete organization
Manage members
Create / delete vaults
Create / edit credentials
Delete credentials
View / copy secrets

Click a role above to see what it can do.

Audit logs

Every action recorded

An immutable log entry is written for every view, edit, and deletion.

Audit Log
LIVE

Each entry captures: user, org, action, target, timestamp, IP address.

Encryption

What actually happens to your data

Click each layer to understand the encryption pipeline.

Readable in your browser. Never leaves in this form.

Argon2id password hashing

Login passwords hashed with memory-hard Argon2id. OWASP recommended. GPU-resistant.

httpOnly JWT cookies

Session tokens in httpOnly, Secure, SameSite=Strict cookies. JavaScript cannot read them.

AES-256-GCM
Zero plaintext stored
Audit every action

Ready to secure your credentials?

Your vault is waiting. Set up in under two minutes — no credit card required.