arrow-left

Only this pageAll pages
gitbookPowered by GitBook
triangle-exclamation
Couldn't generate the PDF for 968 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Release Notes

Loading...

Loading...

Keeper Security

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Desktop and Web Vault

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Security Advisories

Notices of recent security advisories and impact on Keeper

As new security advisories are published online for various systems, Keeper Security will post relevant information here.

ETH Zurich Password Manager Research

Response to ETH Zurich Password Manager Research on Feb 16, 2026

hashtag
Overview

A recent security report titled Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers was published on February 16, 2026 and was published by researchers with ETH Zurich and the Università della Svizzera italiana (USI).

This research has raised architectural considerations for cloud-based password managers operating under a malicious server threat model - where the server may behave dishonestly or be fully compromised. Keeper Security was not mentioned or referenced in this study.

Keeper values and appreciates this research study and is analyzing it in reference to our zero-knowledge and zero-trust security model and architecture. These types of studies are instrumental in elevating the technology in our industry and have tremendous value. We use these studies and work closely with industry researchers to practice successive advancements and inventions in our industry. Additionally, our security research team at Keeper are leading experts in cryptography and information security.

hashtag
Contact

If you have any questions, please email us at [email protected].

Newsletter

Here you will find our latest "What's New With Keeper" blog

View all latest updates

hashtag
2026

  • Februaryarrow-up-right

hashtag
2025

hashtag
2024

hashtag
2023

DEF CON 2025

Response to "Clickjacking" report from DEF CON 2025

hashtag
Description

At DEF CON 33, a researcher presented on Clickjacking (UI redressing), where users can be tricked into clicking hidden UI elements. The researcher showed a scenario in which a malicious site could prompt a user to click on a transparent password manager autofill interface.

Keeper already blocks cross-domain autofill but collaborated with the researcher to further strengthen the browser extension as described below. We value the security research community and regularly collaborate with researchers to help protect our customers.

hashtag
Timeline

  • Apr 9, 2025: Researcher reported the issue. Keeper classified it as low severity since autofill from untrusted domains is already blocked.

  • Apr 15, 2025: Engineering delivered a patched test build to the researcher within 8 days. Researcher noted the fast response.

  • May 26, 2025: Fix released in browser extension v17.1.2 (see ).

hashtag
Keeper's Protection

Keeper’s browser extension is designed to autofill credentials and payment information only on websites explicitly saved by the user. This creates a trust relationship between the user and the destination website. Keeper does not allow cross-domain autofill under any circumstances.

Users can optionally enforce stricter matching by requiring a full subdomain match for autofill. This behavior can be enabled via the browser extension’s settings, and it can also be enforced organization-wide by administrators through role-based policies in the Keeper Admin Console.

Autofill of payment cards and address information only occurs if the site matches a saved record in the user's vault, and the user has explicitly saved those details for the site. If a match does not exist, the user must manually confirm the autofill operation through a native popup dialog.

hashtag
Reported Behavior:

The scenario reported by the researcher required:

  1. Explicitly saving a Keeper record for a malicious or compromised website to your vault,

  2. Visiting that site again, and

  3. Interacting (clicking multiple times) on UI elements overlaid with a transparent Keeper autofill interface.

In this context, the user has already trusted the website by saving credentials to their vault with the exact root domain of the website. There is no vector for a different, unrelated root domain to initiate autofill without this precondition.

Because this relies on the user already trusting and saving the same domain, there is no cross-domain attack vector. The issue was therefore rated low severity, but Keeper implemented additional protections as a precaution.

hashtag
Updating

The Keeper Browser Extension v17.2 updates automatically across Chrome, Firefox, Edge, Safari, Brave, and other Chromium-based browsers. No further action is required by users.

hashtag
Contact

If you have any questions, please email us at [email protected].

Deprecation Notices

Important information on your Keeper software

hashtag
Notice of deprecation for legacy versions

Keeper deprecates older versions of application software listed below. This means they’ll no longer be available from our published sources, and the backend will reject any requests coming from those versions.


hashtag
Keeper Secrets Manager Python SDK support for Python version below 3.9

Keeper Secrets Manager Python SDK v 17.2.0 raised the minimum Python version to 3.9.

Python 3.6-3.8 users should stay on v17.1.0


hashtag
Keeper Client Applications below 17.0

Keeper client applications with a client version of less than 17.0 are considered deprecated.

This applies to the following applications:

  • Keeper Desktop

  • Mobile Apps

  • Automator

  • On-prem SSO Connect

  • Enterprise Bridge

Keeper has released major security improvements with platform version 17. The new architecture introduces the ability for all software components and clients to apply more robust and faster cryptographic algorithms.

Browser Extensions and mobile apps typically auto-update, unless the function has been specifically disabled. If you disabled automatic updates for any of our applications, we encourage you to perform the updates immediately. Likewise if those applications are being deployed as part of a company managed process, please include them in your nearest maintenance window or update cycle.

Important: The following enterprise software components require a manual upgrade which typically involves minor service downtime, similar to updates you performed in the past for the applications. The upgrade process is the same as in the past and typically involves downloading and installing the latest version.

  • On-prem SSO Connect

  • Enterprise Bridge

If you need assistance with these components, please open a ticketarrow-up-right with our support team to schedule the upgrade.


hashtag
Keeper Connection Manager on EL7

With CentOS 7 having reached end-of-life in June 2024, and with RHEL 7 having reached end-of-maintenance at the same time, KCM will no longer provide EL7 builds. This means that the previous release (KCM 2.19.3) will be the last release with an EL7 build and KCM 2.20.0 will be the first release without EL7 support.

Users that are maintaining RPM-based installations of KCM but are still using RHEL 7, CentOS 7, or another EL7-derivative should upgrade to EL8 or EL9 when possible so that they can upgrade to KCM 2.20.0. Support EL10 will be coming in a future release.


hashtag
Keeper Desktop 32-bit binary version

The 32-bit Keeper Desktop client application is considered obsolete.

Per Microsoft, starting with the May 2020 Update (Version 2004), new OEM computers are required to use 64-bit builds. A 32-bit application does not benefit from the Windows app-model security since it does not have access to the TPM/Windows Credential Locker for encrypting the device-key and does not support Windows Hello.


hashtag
Keeper Gateway below 1.5

The Keeper Gateway service with a client version of less than 1.5 are considered deprecated.


If you have any questions, please contact the Keeper support teamarrow-up-right.

July 25, 2025: Additional edge-case protections added in v17.2.0 (see release notes).

release notes
Julyarrow-up-right
  • Mayarrow-up-right

  • Aprilarrow-up-right

  • Marcharrow-up-right

  • Januaryarrow-up-right

  • Decemberarrow-up-right
    Augustarrow-up-right
    Aprilarrow-up-right
    Octoberarrow-up-right
    Mayarrow-up-right
    Decemberarrow-up-right
    Septemberarrow-up-right
    Augustarrow-up-right

    Vault

    The Keeper Web Vault and Keeper Desktop App share a common codebase. Desktop app is deployed as an Electron application to Windows, Mac and Linux platforms.

    Vault Release 16.10.5

    Released on Aug 12, 2023

    hashtag
    Bug Fixes

    • Emails with a "-" are unable to login

    Vault Release 16.8.2

    Released on Nov 2, 2022

    hashtag
    Features

    • VAUL-5409: Support for JP and CA regions

    Older

    Releases notes older than last 10 releases

    Older release note content is still available, but anything older than the last 10 updates is placed here.

    Vault Version 16.2.3

    Released on Oct 8, 2021

    • Support for Safari 15 automated password import

    CVE-2023-44487

    HTTP/2 protocol denial of service

    hashtag
    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-44487arrow-up-right

    hashtag
    Description

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

    hashtag
    Impact to Keeper

    Keeper Security's application servers are protected by AWS Shield which defends against DDoS attacks, and Keeper is not vulnerable to this attack. More info is posted on .

    If you have any questions, please email us at [email protected].

    CVE-2023-5217

    Heap buffer overflow in libvpx

    hashtag
    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-5217arrow-up-right

    hashtag
    Description

    Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

    hashtag
    Impact to Keeper

    Keeper Security may have been impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.25 and published .

    If you have any questions, please email us at [email protected].

    Join the Slack Workspace

    Request access to the public Slack Workspace

    Customers can request access to join our Beta and Customer Feedback or Keeper MSP Slack Workspaces to interact with Keeper employees.

    CVE-2023-27706

    Bitwarden vulnerability with biometric key storage

    hashtag
    NIST Link

    hashtag

    CVE-2022-21449

    "Psychic Signatures" vulnerability in the Oracle Java SE, Oracle GraalVM

    hashtag
    NIST Link

    hashtag

    KeeperPAM

    Troubleshooting and support for KeeperPAM

    hashtag
    Keeper Secrets Manager (KSM)

    Please see the Keeper Secrets Manager .


    hashtag

    Vault Release 16.10.9

    Released on Sep 29, 2023

    hashtag
    Security Updates

    • KDE-1425: Heap buffer overflow vulnerability in the libvpx library. Updated Electron framework.

    CVE-2024-35164

    Improper Validation of Array Index in Apache Guacamole

    hashtag
    NIST Link

    hashtag
    Description

    Vault Release 17.3.2

    Released on Aug 1, 2025

    hashtag
    Bug Fixes

    • KDE-1708: Resolved issue with macOS hot key autofill from KeeperFill for Apps due to changes in the Desktop App

    Vault Release 16.10.6

    Released on Aug 20, 2023

    hashtag
    Bug Fixes

    • VAUL-6150: Shared folders are not instantly removed on team removal

    Vault Version 16.4.2

    Released on Feb 2, 2022

    hashtag
    Features & Improvements

    • KDE-1193: Include TOTP fields in LastPass automated import

    Vault Release 16.10.2

    Released on May 22, 2023

    hashtag
    Security Updates

    • VAUL-5868: Upgrade to React 18 library

    Vault Release 16.10.12

    Released on Jan 15, 2024

    hashtag
    Features

    • VAUL-6001: Security Key can be set up as the only 2FA method

    Vault Version 16.4.3

    Released on Feb 3, 2022

    hashtag
    Bug Fixes

    • Resolve data import issues with version 16.4.2 that caused crashes on the Browser Extension and Android app. See resolution page: -->

    Vault Version 15.0.11

    Released December 14, 2020

    hashtag
    Bug Fixes

    • VAUL-4549: Unable to reset Master Password with Browser Extension v15.0.2 installed

    Vault Version 16.3.1

    Released on Nov 17, 2021

    hashtag
    Bug Fixes

    • VAUL-5079: Unable to login with Internet Explorer 11

    Vault Version 15.0.13

    Estimated Release Date: January 8, 2021

    hashtag
    Bug Fixes

    • VAUL-4584: CSP error upon loading Web Vault v15.0.12

    Vault Release 16.8.1

    Released on Oct 25, 2022

    hashtag
    Bug Fixes

    • VAUL-5546: BreachWatch re-scanning records repeatedly

    Vault Release 17.3.1

    Released on July 31, 2025

    hashtag
    Security Updates

    • KDE-1594: Added protection against "synthetic mouse/key events" from 3rd party applications on Windows devices (reported by Bugcrowd researchers).

    Vault Version 16.7.2

    Released on July 29, 2022

    hashtag
    Bug Fixes

    • KDE-1273: Touch ID shows as "enabled" for users after an app reset

    VAUL-6151: Advanced search is not matching records when typing multiple search strings into the search field
    KDE-1178: Include file attachments in LastPass automated import
  • VAUL-5133: Add checkbox to make LastPass shared folder imports optional

  • hashtag
    Bug Fixes

    • VAUL-5143: Error message first time you drag-and-drop a file attachment into a record

    hashtag
    Bug Fixes
    • VAUL-5211: After logout and login, SSO users will no longer be set on the SSO Domain screen.

    • KDE-1371: App crash when registering a security key

    VAUL-4548: Master Password reset hangs when session is resumes via "Stay Logged In" feature
  • VAUL-4556: Shared folder/record invitation is not appearing on login

  • KDE-975: Javascript error appears when opening Desktop Electron from Safari Extension

  • hashtag
    Improvements
    • VAUL-5032: 508 Accessibility updates (checkboxes, menus, contrast and resizing)

    KDE-989: JavaScript runtime error upon launching Keeper Desktop on Mac (Big Sur)
    KDE-1301: TOTP QR code scanning window not working
    hashtag
    Bug Fixes
    • KDE-1708: Resolved issue where exiting the app caused a noticeable delay

    KDS-1277: Custom Record Template showing "Discard Changes?" on save
  • VAUL-4849: Showing content security policy error in console on login

  • VAUL-5362: EU data center BreachWatch errors for users on a free trial

  • hashtag
    Improvements

    • Added support for Password Manager Pro import

    • Added support for generic .xls or .xlsx file import

    Amazon's blog herearrow-up-right
    Keeper Desktop version 16.10.9
    Description

    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries).

    Oracle link:

    https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVAarrow-up-right

    hashtag
    Impact to Keeper

    Keeper Security is not impacted by this vulnerability. Keeper does not use Java runtimes that are affected, as reported by Oracle. Keeper also does not use the ECDSA implementation in the built-in Java library. Keeper uses BouncyCastle for ECDSA implementation, which is not impacted.

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2022-21449arrow-up-right
    Keeper Connection Manager (KCM)

    Please see the Keeper Secrets Manager troubleshooting pagearrow-up-right.


    hashtag
    Contact Us

    If you need help, please open a support ticketarrow-up-right in our ServiceNow system.

    If you need to speak to our support team, simply make the request and we will schedule it during enterprise hours. Please be patient as we coordinate the call.


    hashtag
    Emergency Support

    If you're a enterprise customer having an emergency and need urgent support, use our ServiceNow support portalarrow-up-right. On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".


    hashtag
    Feature Requests

    We love hearing from Enterprise customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    Join our Slack Workspace to post questions, feedback or receive new beta versions.

    troubleshooting pagearrow-up-right
    CVE-2023-5217
    The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

    hashtag
    Impact to Keeper

    Keeper deployed the update containing the fix for this issue as part of Keeper Connection Manager 2.19.2 on December 7, 2024.

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2024-35164arrow-up-right
    version 17.3.1
    View Page

    Vault Release 17.3.3

    Released on Aug 11, 2025

    hashtag
    Bug Fixes

    • VAUL-7701: We now support Dropbox and Google Chrome password CSV exports into the vault.

    • KDE-1722, 1720, 1723, 1727: Hotkeys now work reliably across Windows, Edge/Chrome, and international layouts, with fixes for focus handling, Ctrl+Shift+P, and repeated single-key triggers.

    hashtag
    Security Updates

    • KDE-1724: Resolved library "tmp" package related to CVE-2025-54798

    Vault Version 16.7.1

    Released July 17, 2022

    hashtag
    Bug Fixes

    • Multiple Tickets: Several UI bugs, translations and visual fixes

    • VAUL-5307: SMS support for Trinidad and Tobago

    • VAUL-5260: Payment card phone number saves incorrectly

    • VAUL-5344: Removed Duplicate detection button for now due to inconsistencies

    • KDE-1255: Touch ID setting turns off when signing in with the Laptop lid open

    • KDE-1228: Canceling the Yubikey setup and login flow gives error

    • KDE-1254: Filling from KeeperFill for Apps with German keyboard issues

    • KDS-1244: Filling from KeeperFill for Apps with French keyboard issues

    • KDE-1269: After logout, KeeperFill for Apps not selecting proper region (Govcloud)

    • KDE-1274: KeeperFill for Apps with Privacy Screen not working in Microsoft Edge

    hashtag
    Improvements

    • VAUL-5320: Additional confirmation upon deletion of a Shared Folder

    • KDE-1266: Added ability to delete account for Mac Store consumer version

    Vault Version 15.0.9

    Published on October 22, 2020

    hashtag
    Bug Fixes

    • VAUL-4472: "Salt/Iterations" error message when Master Password user tries to login with the SSO Alternate Master Password login screen.

    • VAUL-4491: Unable to login on Chromium Edge from Extension in Microsoft Store version.

    • VAUL-4494: Occasional failure to process Admin Approval for device approval step.

    • VAUL-4265: Pressing "Enter" key while entering text in Japanese characters had unexpected results.

    • KDE-941: Unexpected Logout occurring even if "Stay Logged In" enabled.

    Vault Release 16.8.9

    Released on Feb 13, 2023

    hashtag
    Improvements

    • VAUL-5653: Force auto-update all users to 1,000,000 PBKDF2 iterations

    • VAUL-5655: Switch transmission key from RSA to EC

    hashtag
    Bug Fixes

    • KDE-1333: LastPass import missed some custom fields such as SSH keys

    Vault Version 15.0.16

    Released on February 15, 2021

    hashtag
    Bug Fixes

    • VAUL-4643: Login hangs when a user converts from Master Password to SSO Cloud login.

    • VAUL-4644: Record "info" screen sometimes does not return the user information in Last Modified date.

    Vault Release 16.8.5

    Released on Dec 20, 2022

    hashtag
    Bug Fixes

    • KDE-1313: LastPass automated import hanging on some accounts

    • KDE-1319: Safari import hanging on macOS Ventura

    Vault Release 16.8.4

    Released on Nov 30, 2022

    hashtag
    Bug Fixes

    • KDE-1317: Debian package compatibility issues

    • KDE-1318: RPM package compatibility with CentOS7

    Vault Version 15.0.8

    Released on October 16, 2020 @ 10PM PST

    hashtag
    Bug Fixes

    • VAUL-4487: Users who created their account prior to several years ago, who are part of an Enterprise without a Master Password policy, with a Master Password that is less than 10 characters, are being prompted to change their Master Password upon logging into the vault. However, the resulting flow is not enforcing the 10-character minimum, so the user may enter into a confusing loop. This issue is being fixed EOB today.

    hashtag
    Improvements

    • KDE-940: Removed legacy PBKDF2 Iteration settings

    • KDE-939: "Stay Logged In" setting now appears on the Keeper Desktop application.

    Vault Version 15.0.3

    Released September 11, 2020

    hashtag
    Benefits & Enhancements

    • Support Email Address Change - Enterprise (SSO) users now have the ability to change their email address from their Vault (if role enforcement policies allow).

    hashtag
    Bug Fixes

    • Fixed: The "record_open" ARAM event sends duplicate requests to the server when users are opening a record.

    • Fixed: Users are prompted for 2FA Keeper Push approval twice.

    • Fixed: First time login to the web vault from the browser extension fails in Firefox browsers.

    Vault Version 15.1.0

    Released on March 8, 2021

    hashtag
    New Features

    • New "Shared Records Report" added to the Export screen: https://docs.keeper.io/user-guides/export-and-reports/shared-records-reportarrow-up-right

    hashtag
    Bug Fixes

    • Operations that required re-authentication (e.g. export, reset master password, etc) were not accepting the password, if the session was resumed from a page reload or "Stay Logged In". This has been resolved.

    Vault Version 15.0.4

    Released September 18, 2020

    hashtag
    Bug Fixes

    • Fixed: The Web Vault logs out ahead of the browser extension and generates error messages

    • Fixed: Shared folder permissions changes do not automatically appear for users in detail view as expected.

    Vault Release 16.8.6

    Released on Jan 3, 2023

    hashtag
    Improvements

    • Set new default PBKDF2 iterations to 1,000,000 rounds

    Description

    Bitwarden Windows desktop application versions prior to v2023.4.0 store biometric keys in Windows Credential Manager, accessible to other local unprivileged processes.

    hashtag
    Impact to Keeper

    Keeper is not impacted by this issue. To ensure that we were not impacted by a similar vulnerability, Keeper contracted a 3rd party penetration tester in July 2023 to validate our protection against this type of attack. The report PDF is posted below:

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2023-27706arrow-up-right
    file-pdf
    819KB
    Keeper protection against CVE-2023-27706.pdf
    PDF
    arrow-up-right-from-squareOpen

    Vault Version 15.0.15

    Estimated Release Date: February 5, 2021

    hashtag
    Bug Fixes

    • REL-3160: Import instructions for Avast are missing

    VAUL-6097: Support for Security Key and PIN enforcement policies
  • VAUL-6129: Users can now control if FIDO2 WebAuthn user verification (PIN) is required

  • hashtag
    Bug Fixes

    • VAUL-6395: KeeperPAM Router/Gateway connection issue in GovCloud environment

    Black Hat EU 2023

    Response to "AutoSpill" report from Black Hat EU 2023

    hashtag
    Description

    A presentation at Black Hat EU 2023 discussed credential stealing on mobile password managers. Keeper was listed as an impacted application. Keeper has safeguards in place to protect against this issue as described below.

    hashtag
    Keeper's Response

    On May 31, 2022, Keeper received a report from the researcher about a potential vulnerability. We requested a video from the researcher to demonstrate the reported issue. Based upon our analysis, we determined the researcher had first installed a malicious application and subsequently, accepted a prompt by Keeper to force the association of the malicious application to a Keeper password record.

    Keeper has safeguards in place to protect users against automatically filling credentials into an untrusted application or a site that was not explicitly authorized by the user. On the Android platform, Keeper prompts the user when attempting to autofill credentials into an Android application or website. The user is asked to confirm the association of the application to the Keeper password record prior to filling any information. On June 29, we informed the researcher of this information and also recommended that he submit his report to Google since it is specifically related to the Android platform.

    Generally, a malicious Android application would first need to be submitted to Google Play Store, reviewed by Google and subsequently, approved for publication to the Google Play Store. The user would then need to install the malicious application from Google Play and transact with the application. Alternatively, the user would need to override important security settings on their device in order to sideload a malicious application.

    Keeper always recommends that individuals be cautious and vigilant about the applications they install and should only install published Android applications from trusted app stores such as the Google Play Store.

    hashtag
    Resources

    A screenshot of Keeper's protection in place is displayed below. A user is prompted to trust the application from retrieving and filling the specified credentials. This security feature has been in place for several years and no additional updates are required.

    This simple Android app demonstration can be viewed on Keeper's public Github repo:

    To learn more about how to keep your smartphone safe, please visit:

    If you have any questions, please email us at [email protected].

    CVE-2023-36266

    Response to CVE-2023-36266

    hashtag
    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-36266arrow-up-right

    hashtag
    Description

    A researcher filed a CVE (CVE-2023-36266) in regards to the scanning of local memory when using Keeper Desktop and browser extension software.

    hashtag
    Impact to Keeper

    We have disputed this CVE. Keeper performs quarterly pen testing with 3rd party experts including , and independent security researchers against all of our products and systems. Keeper has also partnered with to manage its vulnerability disclosure and bug bounty programs. As part of our testing, we explicitly test the storage of secrets in memory while our applications are in use, and when logged out. Keeper removes all decrypted vault data from memory upon logout and provides settings to also wipe memory and restart the app upon vault auto-lock. This functionality has been verified by our pen testers and the test results are available for customer review.

    As with any software product, if an attacker controls the local computer, the attacker can perform any action the user or an application could perform. In the case of a password manager, if an attacker can read arbitrary memory, then an attacker can read decrypted contents of the password manager while the application is in use. This applies to any password management product. Security researchers understand that a fully compromised device scenario has severe implications for the user.

    Keeper has multiple security mechanisms in-place to defend against compromised end-user devices. Keeper client software only decrypts the user's vault upon successful login, and only stores decrypted values during use in volatile memory. When a user is logged out or timed-out, decrypted values are removed from memory. In addition, the Keeper desktop application provides a setting in the "Security" screen which forces a full application restart upon auto-logout, to ensure that data is cleared upon locking. In the case of a web browser such as Chrome, Keeper requests the clearing of memory after logout, however the memory management of the underlying browser is outside of Keeper’s control and can sometimes take time for the memory management system to complete this operation.

    With all end-user software, it's important to ensure that users reduce the risk of a compromised device by following security best practices, keeping all software up-to-date and installing adequate antivirus / malware protection software.

    Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class Zero-Knowledge and Zero-Trust security model and transparent approach to sharing it with the public. For information regarding Keeper's security and encryption model, please visit:

    If you have any questions, please email us at [email protected].

    Admin Console

    Troubleshooting and support for the Keeper Admin Console

    hashtag
    Enterprise Guide

    The full Enterprise Guide is located herearrow-up-right. For information about deploying Keeper to your end-users click herearrow-up-right.


    hashtag
    License Expiration and Renewal

    Visit our checkout page:


    hashtag
    Credit Card Removal

    For security reasons, enterprise credit card changes are handled by our team. Please reach out to your Account Manager or to update your payment method.


    hashtag
    Users Not Receiving Email Invites

    Keeper will automatically suppress email delivery to an email address that has bounced. This typically occurs if you set up someone's Keeper account before their email inbox exists. If you are experiencing this, please and we'll remove the email from our suppression list.


    hashtag
    Transfer Account Error

    To initiate an , the user must have accepted the "Transfer Account" popup within the app. This consent cannot be bypassed or enabled remotely; the user must have accepted the prompt before the transfer process can begin.

    Additionally, you must be assigned to a role with the specific permissions required to transfer users within that individual's current role.

    If encountering an error message during account transfer attempts, consider the following steps:

    • If the User Is Present in the Enterprise: Ensure the user logs in and accepts the transfer account agreement before proceeding with the transfer.

    • SSO-enabled Enterprises: Change the user's password in the identity provider to log in and accept the transfer account feature pop-up or export data.


    hashtag
    Contact Us

    If you need help, please in our ServiceNow system.

    If you need to speak to our support team, simply make the request and we will schedule it during enterprise hours. Please be patient as we coordinate the call.


    hashtag
    Emergency Support

    If you are an enterprise customer having an emergency and need urgent support, use our . On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".


    hashtag
    Feature Requests

    We love hearing from Enterprise customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    to post questions, feedback or receive new beta versions.

    Vault Release 17.1.1

    Released on March 12, 2025

    hashtag
    Enhancements

    • VAUL-6349: Updated the Security Audit tab in Vault to ensure the overall Security Audit score matches the per-user score in the Admin Console, reducing confusion.

    hashtag
    Other Updates

    • KDE-1534: Updated new installs to default to the native browser for SSO authentication instead of the app browser.

    • VAUL-7176: Fixed an issue where setting up a hardware security key required extra steps; the Vault now prioritizes it using the “hints” syntax.

    • VAUL-7262: PAM Updated router calls to use the /api/user path for commands.

    hashtag
    Bug Fixes

    • KDE-1607, 1606, 1608, and 1619: The SSH Agent will scan General typed records for private key file attachments

    • KDE-1611: Fixed an issue where selecting Two-Factor Authentication triggered the Offline Access dialog.

    • VAUL-7094: Fixed an issue preventing master password login when session resumption and 2FA were enabled

    Vault Release 16.11.2

    Released August 06, 2024

    Enhancements:

    • VAUL-6715: Improved KeeperFill Installation Prompt: The installation prompt for KeeperFill has been enhanced to offer a better user experience.

    • VAUL-6716, VAUL-6789: Enhanced Import Functionality: When importing data from Keepass KDBX files, TOTP fields will now be correctly recognized and imported as Keeper TOTP fields, ensuring better accuracy and usability.

    • VAUL-6748: Password Complexity and Generation: Password complexity rules can now be applied independently without generating a new password, offering more flexibility in managing your passwords.

    • VAUL-6792: Better Folder Selection: We've improved the folder location selection in the new shared folder modal for a more intuitive experience.

    • VAUL-4959: Updated Referral Program: Our referral program has been enhanced with updated incentives to encourage more users to invite friends.

    • VAUL-6807: Password Policy Enforcement: The minimum password length is now set to 8 characters, with a maximum of 99 characters. Client applications will enforce this minimum length but allow users to increase it through their settings.

    • VAUL-6798: Feature Promotion: New features such as RBI and KSM are now more visible to users for better awareness.

    Bug Fixes:

    • VAUL-6788: UID Generation: We've updated the UID generation logic to prevent creating UIDs that start with a dash.

    • VAUL-6746: Firefox Compatibility: Fixed an error occurring in Firefox related to unsupported table versions.

    • VAUL-6805: Privacy Screen: Resolved an issue where the privacy screen disabled URL edits for non-enforced URLs in shared records.

    Vault Release 16.10.0

    Released on May 2, 2023

    hashtag
    New Features

    • VAUL-5652: Recovery Phrase. We have upgraded our account recovery process with a new and more secure 24-word “recovery phrase” feature. Read more on the Keeper Blogarrow-up-right.

    • VAUL-5867: Support for TOTP seeds in CSV import method

    • VAUL-5177: Import from Thycotic Secret Server / Delinea

    hashtag
    Bug Fixes

    • KDE-1364: Crash when double-clicking the Touch ID icon

    • KDE-1365: Entering an incorrectly formatted username in SSO Connect on an ASDF Domain causes a crash

    CVE-2023-4863

    Heap buffer overflow vulnerability in the WebP Codec

    hashtag
    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2022-21449arrow-up-right

    hashtag
    Description

    Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical).

    hashtag
    Impact to Keeper

    Keeper Security may be impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.24 and published .

    If you have any questions, please email us at [email protected].

    Vault Version 16.5.0

    Released on March 31, 2022

    hashtag
    Features & Improvements

    • VAUL-5035: Ability to convert "general" to new Record Types

    • VAUL-4879: Role enforcement to activate Stay Logged In

    • VAUL-4893: Role enforcement to enable Self Destruct

    • VAUL-5201: Improved performance of uploads and downloads

    hashtag
    Bug Fixes

    • VAUL-5187: QR Code upload fails for certain formats

    • VAUL-5202: MyKi and 1Password TOTP record imports are not autofilling*

      (*) To resolve existing records, run the verify-records command in .

    Vault Release 17.1.0

    Released on February 13, 2025

    circle-check

    Get started by setting up your KeeperPAM sandbox! Visit to begin.

    KeeperPAM is now available for all customers. Keeper Vault 17.1 and newer is required to access the new privileged access management features.

    For more information on KeeperPAM, visit the following:

    hashtag
    New Features

    • - manage all rotations directly from the Vault UI

    • - instantly and securely access assets within their target infrastructure

    • - use native apps for establishing remote access

    circle-info

    Activating KeeperPAM features requires a license. Contact your Keeper account representative for details.

    hashtag
    Improvements

    • Browser tab now shows username: "Keeper® Vault - [email protected]"

    Vault Version 16.2.6

    Released on Oct 22, 2021

    hashtag
    Improvements

    • KDE-1150: Support for CCH Axcess native app autofill

    • VAUL-4991: Changed Software License Number to a hidden field

    hashtag
    Bug Fixes

    • KDE-1157: Improved support for Azure Conditional Access

    • KDE-1156: Remove use of legacy windows registry key which generates a report in Cybereason

    • VAUL-5036: Restore of Record Type records

    Vault Version 15.0.14

    Estimated Release Date: January 22, 2021

    hashtag
    Improvements

    • VAUL-4589: Support for Avast password import

    hashtag
    Bug Fixes

    • KDE-991: KFFA allows for special characters during hotkeys setup

    • KDE-993: Defined hotkeys are still active when the Vault window is closed

    • KDE-994: Keeper Desktop app fails to install on Windows 10 20H2

    Vault Version 15.2.0

    Released April 3, 2021

    hashtag
    New Features & Improvements

    • Expansion to AU Data Center - Keeper now supports an AU data center. Users have the option to select "AU" from the region selector at login for Keeper Desktop App.

    hashtag
    Bug Fixes

    • KDE-1043: Horizontal scrollbar appears in record details

    Vault Release 16.11.3

    Released September 20, 2024

    hashtag
    Enhancements

    • VAUL-6966: Updated the vault login screen animations to stop after 30 seconds

    Okta Breach

    Okta security breach disclosed in October 2023

    hashtag
    Description

    Keeper Security is aware of the , where cybercriminals accessed client files through its support system. As part of its support process and system, Okta’s customers upload HTTP Archive (HAR) files which contain sensitive information from the user's web browser. This information included session tokens that were used to impersonate several Okta customers.

    Vault Release 17.2

    Released on May 18, 2025

    hashtag
    Security Updates

    Keeper Desktop version 17.2 includes the installation and activation of Keeper Forcefield. Keeper Forcefield is an advanced endpoint security product for Windows that protects sensitive applications and processes from unauthorized access. It is specifically designed to defend against threats such as memory scraping and credential harvesting from malicious software installed via phishing or other attacks.

    More info:

    Vault Release 16.8.3

    Released on Nov 29, 2022

    hashtag
    Bug Fixes

    • VAUL-5551: Extension not auto-logged in if installed while Web Vault currently logged in

    Vault Version 16.1.0

    Released on June 28, 2021

    hashtag
    Accessibility (508 Compliance)

    • Keeper has been making UI changes across all web-applications and browser extensions to comply with Section 508 of the Rehabilitation Act (29 U.S.C. § 794d). The Keeper Web Vault and Desktop App now supports keyboard navigation and they are compatible with popular screen readers and other assistive technology.

    Vault Version 16.2.5

    Release ETA on Oct 18, 2021

    hashtag
    Bug Fixes

    • VAUL-5024: Record Type records not syncing after activating Record Types

    Vault Version 16.3.0

    Released on Nov 5, 2021

    hashtag
    New Features and Improvements

    • VAUL-4710: Secrets Manager user interface is now generally available on the Keeper Web Vault and Desktop App. For more information about Keeper Secrets Manager, see:

    Vault Version 16.0.1

    Released on May 21, 2021

    This is a bug fix release that mainly focuses on the new Record Types feature (still in beta). Therefore most customers are not affected by the bug fixes listed below.

    hashtag
    Bug Fixes

    • KDE-1077: Logout from KeeperFill for Apps generates an error

    Vault Version 15.0.18

    Released on March 4, 2021

    hashtag
    Features

    • KDE-990: Support for logout timer with more than 1440 minutes

    Vault Version 16.6.0

    Released on May 4, 2022

    hashtag
    Features

    • VAUL-5029: Introducing One-Time Share. See the and for more details.

    Vault Version 15.0.6

    Released October 10, 2020

    hashtag
    Enhancements & Benefits

    • VAUL-4459: SSO Cloud users are able to auto-login and logout to the vault and browser extension simultaneously.

    Vault Release 16.10.8

    Released on Sept 14, 2023

    hashtag
    Security Updates

    • KDE-1418: Heap buffer overflow vulnerability in the WebP Codec. Updated Electron framework.

    Vault Version 15.0.5

    Released September 1, 2020

    hashtag
    Features & Enhancements

    • Login V3 General Availability (GA) More information available here:

    VAUL-6787: Fixed an issue where the folder structure in Delete Items did not match the folder structure in Vault.

  • VAUL-6394: Fixed an issue where the Web Vault allowed uploads past the storage limit; users are now blocked when the limit is reached.

  • VAUL-6090: Fixed an issue where shortcut-linked records were not retained in shared folders after CSV export/import, preventing data loss.

  • VAUL-5989: Fixed an issue where the password font displayed incorrectly when Japanese was selected on Windows 10/11.

  • VAUL-6902: Fixed an issue where restoring a file attachment record caused repeated error messages and made attachments inaccessible in the Web Vault.

  • VAUL-7095: Fixed an issue where creating a new record with a file attachment showed an empty record state instead of the record details.

  • VAUL-7104: Fixed an issue where switching to Suomi/Svenska caused a Content Security Policy error in Stack.

  • VAUL-7102: Fixed an issue where importing from Proton Pass did not include login details.

  • VAUL-7109: Fixed an issue where "Share only in SF allowed" displayed the wrong modal in OTS.

  • VAUL-6826: Fixed an issue where V3 records generated an error when viewing or downloading attachments.

  • VAUL-7155: Fixed an issue where sharing a record to an account with an invalid email format failed silently instead of displaying an error message.

  • VAUL-7101: Fixed an issue where expired business admins were not redirected to checkout and received the wrong message.

  • VAUL-7184: Fixed an issue where failed invite attempts incorrectly showed a success message instead of an error.

  • VAUL-7216: Fixed an issue where Firefox always assumed a security key was inserted for 2FA, preventing access to alternative methods; a modal now informs the user.

  • VAUL-7219: PAM: Fixed an issue where the Gateway button was not visible despite the appropriate permissions being enabled.

  • VAUL-7264: Fixed an issue where the Save & Share button remained disabled after validation.

  • VAUL-7268: Fixed an issue where the Add button in the Shared Folder Share tab was enabled before entering an email.

  • VAUL-7300, 7306, 7303, 7310, 7315, 7313, 7314, 7316, 7317, and 7321: Fixed several Security Audit bugs.

  • VAUL-6784: Sharing Screen: Corrected the sorting order of items in the sharing screen for better usability.

  • VAUL-6794: Account Registration: Addressed an issue where credentials were not properly handled when switching between login and account registration screens.

  • VAUL-6819: Banner Display: Updated the banner display and support tool to match rounding requirements for better accuracy (e.g. number of days left in trial).

  • VAUL-6786: Shared Folder Management: Fixed an issue where deleting a V2 record from a shared folder caused the folder to appear incorrectly. The record will now appear correctly.

  • VAUL-6780: GRE Import Error Handling: Improved error handling during GRE import to ensure proper messaging when users are restricted from creating folders.

  • VAUL-6808: App Stability: Fixed an issue where the app could crash if shared folder users were undefined, ensuring better stability.

  • VAUL-5018: Showing "unexpected error" when creating user accounts with a pending transfer acceptance
  • VAUL-5000: Prevent record copy when Record Type is restricted by role enforcement

  • VAUL-4978: When sharing is disabled, the action silently fails when adding a user to a shared folder.

  • VAUL-5014: Edit and Delete actions in the Grid View don't work

  • VAUL-4964: "Unknown sharing error" when the user's email has never been verified.

  • VAUL-4999: Error when trying to edit a custom Record Type when the type is restricted.

  • VAUL-5030: Importing records can generate an app crash

  • VAUL-4869: Import column selections don't persist when there are many fields to map

  • VAUL-5001: During import of CSV, column changes are lost when scrolling horizontally

  • VAUL-4934: Large number of image attachments in a record can generate errors when loading thumbnails.

  • VAUL-4557: Error message intermittently appears upon logout
    VAUL-6606: Updated the remaining router API endpoints to enhance performance and security.
  • VAUL-6785: Adjusted the location of the visibility "eyeball" icon for long passwords, ensuring consistent UI across all record views.

  • VAUL-6821: Introduced a new dialog that users are required to accept when being invited to a managed enterprise. Letting users know the enterprise administrator has the ability to manage their vault in accordance with company policies.

  • VAUL-6866: Updated URL handling to restrict it to standard HTTP/HTTPS protocols, improving security and validation.

  • VAUL-6869: Updated the title and meta description of the settings page to enhance SEO and search engine visibility.

  • hashtag
    Bug Fixes

    • VAUL-5853: Addressed formatting inconsistencies within custom record types for Security Q&A fields.

    • VAUL-5898:Fixed an issue where using the search and location filter together resulted in invalid or unexpected search results.

    • VAUL-6051: Fixed an issue where the UI adjusted incorrectly after closing an error message generated by an invalid value in the native app filler.

    • VAUL-6247: Fixed a bug where the "Success" message was missing after successfully removing users from shared records.

    • VAUL-6312: Resolved a security issue where creating a duplicate record allowed shared users to access the full history, including previous sensitive information.

    • VAUL-6385: Updated privacy screen for Teams / Owners, ensuring compliance with privacy requirements.

    • VAUL-6403: Fixed an issue where users with role-based enforcements preventing record creation in shared folders were not receiving feedback when using "Create Duplicate" on a V2 General record.

    • VAUL-6424: Fixed visual artifacts in the left navigation bar that appeared as unexpected white pixels.

    • VAUL-6598: Fixed an issue where dropdown menus opened via the enter key couldn't be navigated using arrow or tab keys, improving screen reader accessibility.

    • VAUL-6599: Resolved an issue where users needed to press the arrow key twice to focus on both icons and text when navigating the "Create New" menu or filter dropdowns via the Enter key.

    • VAUL-6609: Addressed an issue where attachments in the detail pane of V3 shared records were not being displayed properly after edit or sync.

    • VAUL-6652: Resolved UI issue where the PAM script model was cut off, improving the user experience.

    • VAUL-6806: Fixed an issue where security data updates were not occurring as expected, improving data reliability.

    • VAUL-6827: Resolved an issue where extra white space appeared in custom fields, improving layout consistency.

    • VAUL-6839: Addressed issues related to missing or bad security data being propagated in certain scenarios.

    • VAUL-6865: Removed the deprecated asmcrypto.js dependency, improving app performance and security.

    • VAUL-6882: Fixed a password complexity error that occurred during save, when using the password rotation setting in certain scenarios.

    • VAUL-6912: Resolved overlapping text issues on Mac/Chrome browsers when displaying tabs.

    • VAUL-6964: Fixed an issue where the logout timer enforcement was not working as intended.

    • VAUL-6967: Applied updates to sync timeline, loading vault records and then updating BreachWatch & Security Audit scores.

    Website: https://www.keepersecurity.com/forcefield-endpoint-protection/arrow-up-right

  • Documentation: https://docs.keeper.io/en/enterprise-guide/keeper-forcefieldarrow-up-right

  • Standalone Download: https://www.keepersecurity.com/download.html?p=macarrow-up-right

  • To activate Keeper Forcefield, visit the Settings > Forcefield screen on your Keeper Desktop app for Microsoft Windows.

    hashtag
    Features

    • BreachWatch Update: Enabled non-BreachWatch users to run a free scan, showing a “Records at Risk” count with a CTA to upgrade for details.

    • Secure File Storage: Added contextual product info in the Keeper Vault attachment workflow.

    • UI Enhancements: Updated in-app messaging for improved clarity and a modern look.

    • Security Fixes: Resolved various Security Audit issues, including translations and score parity between Vault & Console.

    • PAM: Support for JIT, Discovery and Endpoint Privilege Manager capabilities.

    hashtag
    Changes

    • VAUL-7342, KDE-1624: Keeper Forcefield

    • VAUL-7273: Renamed "Renewal Date" to "Expiration Date" for clarity in the Vault.

    • VAUL-6358: PLG feature enables non-BreachWatch users to run a free scan, showing a “Records at Risk” count with a CTA to upgrade for details.

    • VAUL-6374: “PLG” Added contextual upsell for Secure File Storage in the Keeper Vault attachment workflow.

    • VAUL-7309: Allowed non-owners to submit security data for shared records.

    • VAUL-6800: Fixed Vault to read security blobs and reuse existing scores.

    • VAUL-6472: Updated in-app pop-ups for clarity and a modern look.

    hashtag
    Bug Fixes

    • VAUL-7310, VAUL-7329, VAUL-7338, VAUL-7339, VAUL-5258, VAUL-7350: We resolved a number of Security Audit issues relating to translations and score parity between Vault & Console.

    • VAUL-6091: Renamed "URL" to "Website Address" for V3, V2, and Custom Fields consistency.

    • VAUL-6036: Fixed issue where the Website Address field was incorrectly added as a custom field

    • VAUL-7347: Updated button shapes, enabled automatic BreachWatch scan on first login, and ensured the red dot appears on the BreachWatch badge for insecure records.

    • VAUL-7349: Fixed an issue where, after record creation or edit record action, KeeperFill displays a gray overlay.

    • VAUL-7352, VAUL-7353, VAUL-7354: Fixed multiple file attachment issues related to PLG.

    • KDE-1618: Fixed a desktop issue that allowed file uploads beyond the storage limit.

    VAUL-5547: Right-click menu is showing different options when in different areas of the vault
  • VAUL-5529: Shared Folder "Add User" search/suggest list includes people already in the folder

  • VAUL-5563: Vault crashes when a user with "Prevent sharing records with file attachments" enforcement deletes a record.

  • hashtag
    Improvements

    • VAUL-5565, VAUL-5327, VAUL-5458, VAUL-5325, VAUL-5404: 508 Compliance items

    • VAUL-4772: Removed all legacy jquery/jquieryui references

    • VAUL-5559: Roboform import issues

    • VAUL-5090: Auto-select custom field title when clicking Edit

    • KDE-1308: Update Electron to latest v20 patch version

    • KDE-1314: Remove legacy Windows installers

    hashtag
    Features and Improvements
    • KDE-1079: Packaged an all new Safari browser extension with the latest features as Chrome, Firefox and Edge extension.

    • KDE-1080: Added support for Windows Hello role enforcement policy

    • KDE-1081: Upgraded the Electron framework to v12.0.9

    • VAUL-4692: Add clarification around the minimum security answer length requirements

    • VAUL-4588: Initial Support for 508 Compliance across Web Vault and Desktop Application

    • VAUL-4694: Unless disabled by role enforcement policies, users will be required to configure Account Recovery instead of indefinitely delaying

    • VAUL-4750: Simplified the new customer experience when purchasing Keeper prior to creating free Vault account.

    • VAUL-4822: Improved the embedded image viewer

    • VAUL-4092: Added Bitwarden to the available import formats

    hashtag
    Bug Fixes

    • KDE-1092: LastPass automated import broken for certain users due to iterations settings.

    • VAUL-4830: 2FA enforcement with SSO user causes extension and vault to be out of sync during login.

    • VAUL-4836: Auto-suggestion drop-down fills the entire screen when there are very long URLs stored in the vault.

    • VAUL-4838: "Ghost" records in vault when deleting a shared folder containing an owned record

    • VAUL-4840: Gracefully handle scenarios where team keys cannot be decrypted

    • KDE-1073: UI issues caused when the vault logs out while push notifications are in front.

    • KDE-1085: Denying the password importer prompts can lead to a frozen Keeper Desktop app.

    VAUL-5018: Showing "unexpected error" when creating account with a pending transfer acceptance
  • VAUL-4578: Account recovery failure on a new device

  • VAUL-5000: Prevent record copy when record type is restricted by role enforcement

  • VAUL-4978: When sharing is restricted, user receives no visible error when sharing and it fails silently

  • VAUL-4906: Unknown Sharing Error when email is not verified

  • VAUL-5023, VAUL-5017: Record type errors with Bank Account and Payment Cards

  • VAUL-5030: Browser Extension causes forced logout after importing records

  • https://docs.keeper.io/secrets-managerarrow-up-right

  • VAUL-4904: Visual improvements and workflow improvements for Record Types template creation.

  • VAUL-5062: Added MyKi password manager to Keeper Import screen

  • hashtag
    Security Updates

    • VAUL-5038: Migrated from webpack4 to webpack5

    • KDE-1163: Additional changes to ensure that logout clears all memory. User-initiated logout performs full restart of the Keeper Desktop application.

    hashtag
    Bug Fixes

    • KDE-1164: KeeperFill for Apps will only process hotkeys when a record has been selected. This prevents conflicts between existing hotkeys and KeeperFill.

    • KDE-1169: Sync errors after deleting a Shared Folder

    • KDE-1168: "Object no longer exists" error when switching between KFFA and Desktop App

    • VAUL-5039: Record Type fields saving the translated label

    • VAUL-5041: Importing CSV with limited columns can throw an error

    • VAUL-5042: Can't view notes when Privacy Screen is ON and Masking is ON

    • VAUL-5049: Can't change the record type (causes crash)

    KDE-1067: Record Type creation not using the generated password

  • VAUL-4811: Australia data center link to Keeper Importer generates 404

  • VAUL-4784: Edit button missing

  • VAUL-4790: Decryption issue with Linked Record Types

  • VAUL-4786: Privacy Screen is hiding notes and custom fields

  • VAUL-4789: Uploading large number of files produces "throttle" errors

  • VAUL-4791: Decryption errors inside Shared Folders with Record Types

  • VAUL-4667: Error message when using Account Recovery flow

  • VAUL-4524: BreachWatch status failure with "status 400"

  • VAUL-4787: Vault grid view now showing new Record Type icons

  • VAUL-4800: Sharing and Emergency Access showing confusing messages

  • VAUL-4805: Deleting shared record not showing in Deleted Items

  • VAUL-4810: Newly attached files not creating record links, produces error with Record Types

  • VAUL-4825: BreachWatch admin reports not getting updated

  • hashtag
    Improvements

    • KDE-1072: Update Electron Framework to 12.0.6

    hashtag
    Bug Fixes
    • KDE-1021: Errors when logging into Azure

    • VAUL-4643: Login hangs when a user converts from Master Password to Cloud SSO

    • VAUL-4644: Record "info" screen is not showing the user who made the change

    • KDE-839: Update Electron framework dependencies

    • KDE-1009: Update Electron framework

    • KDE-1005: Touch ID + Yubikey + using a backup 2FA method fails login

    • KDE-1007: Signing in on KeeperFill for Apps using SSO and Duo not receiving verification email

    • KDE-1013: Clicking to copy a field sometimes didn't copy

    • KDE-1011: Better handling of Logout Timer setting

    • KDE-990: Logout Timer improved handling and support for more than 1440 minutes

    • KDE-1018: Windows Hello activation issue on Microsoft Store version

    VAUL-4400: Implementation of file attachment support for KDBX file format
  • KDE-929: At login, the region automatically defaults to the region the user most recently has used

  • hashtag
    Bug Fixes

    • VAUL-4471: The vault stores a cache for vault_login, overwriting new user Enterprise email invitations

    • VAUL-4463: Excessive update_security_data requests are dispatched

    • VAUL-4427: User unable to connect via Cloud SSO using Edge 44 and Firefox browsers

    • VAUL-4311: Fix to allow the import of empty custom field values

    • KDE-926: DUO push fails in EU accounts

    • KDE-923: Windows Hello login fails in EU accounts

    • KDE-919: "Clipboard Expiration" option missing from Settings menu

    NCC Grouparrow-up-right
    Cybertestarrow-up-right
    Bugcrowdarrow-up-right
    https://docs.keeper.io/enterprise-guide/keeper-encryption-modelarrow-up-right
    Keeper Desktop version 16.10.8
    VAUL-5191: TOTP and custom fields not available in CSV export
  • VAUL-5195: Field validation on custom field Phone Number not working properly

  • KDE-1224: Linux app shows blank screen when using Yubikey

  • KDE-1222: Login on desktop app with Touch ID and Yubikey not working properly

  • KDE-1218: Default password generator in KeeperFill for Apps not including symbols

  • KDE-1223: Desktop App not maintaining disabled logout timer setting

  • Keeper Commanderarrow-up-right
    hashtag
    Impact to Keeper

    Keeper Security does not use any of Okta’s products internally - for Single Sign-On (SSO) or any other purpose. Therefore, Keeper’s internal business operation was not impacted by the security incident at Okta.

    Keeper is a zero-knowledge and zero-trust cybersecurity platform which means that all of the encryption of user data occurs on the user's device, and Keeper does not have the ability to access any customer data. Further, least-privilege, role-based access control and delegated administration permit and restrict access for all users in the system. Keeper's employees utilize the Keeper Enterprise platform for authenticating into websites and applications using strong and unique passwords generated by our software.

    Keeper SSO Connect® is a powerful feature of the Keeper platform which provides customers with the ability to authenticate into their Keeper vaults using their preferred SAML 2.0 identity provider - both on-premises and in the cloud. Keeper SSO Connect, when properly configured with Okta SSO, provides enterprise-wide authentication and end-to-end encryption with zero-knowledge and zero-trust security.

    For those customers who use Okta with Keeper SSO Connect for accessing their Keeper vaults, please implement the following best practices:

    1. Enforce MFA on the Keeper vault in addition to enforcing MFA at Okta for all privileged users. Keeper is the only Enterprise Password Manager that provides an additional layer of MFA to reduce the risk associated with an identity provider takeover attack.

    2. To prevent users from accessing their work vaults outside of approved locations and networks, administrators should activate IP Address Allowlisting. This is a role-based enforcement setting in the Keeper Admin Console which enforces that users can only access their vaults when their device is on an approved network. This should always be enforced for administrative roles.

    3. Reduce administrator privilege for SSO-enabled accounts. If an administrator uses Okta to authenticate into the Keeper platform, reduce the role privilege so that their administrative responsibility is limited in scope to perform their role with the organization.

    4. Ensure that at least one administrator is able to access the Keeper platform using a Master Password authentication method in case the SSO identity provider is unavailable.

    5. Activate Keeper's event reporting and alerting system into your security operations. Keeper integrates into any popular SIEM solution including Splunk and Datadog. In the Keeper Admin Console, alerts can be configured to notify your security team covering over 200 different event types.

    hashtag
    References

    hashtag
    Blog Post Regarding IdP Takeover Attacks

    https://www.keepersecurity.com/blog/2023/10/24/enforcing-least-privilege-mitigates-identity-provider-takeover-attacks/arrow-up-right

    hashtag
    Keeper Enterprise Security Recommendations

    https://docs.keeper.io/enterprise-guide/recommended-security-settingsarrow-up-right

    hashtag
    Keeper SSO Connect

    https://docs.keeper.io/sso-connect-cloud/arrow-up-right

    hashtag
    Keeper's Security and Encryption Model

    https://keepersecurity.com/security.htmlarrow-up-right

    If you have any questions please contact [email protected].

    recent security breach at Oktaarrow-up-right

    KDE-1214: Support for M1-based Macs. Our download page provides install links for the .dmg file and the Mac App Store. The .dmg file contains both Intel and M1 Mac binary builds.

    hashtag
    Improvements

    • VAUL-5021: Additional support for 508 compliance in Secrets Manager and other functional areas.

    hashtag
    Bug Fixes

    • VAUL-5228: Unable to recover account with WebAuthn as the 2FA method

    • VAUL-5233, VAUL-4958, VAUL-5232: Several issues with File Upload failures

    • VAUL-5164: Support for Dashlane import with Argon2D and PBKDF2 200k iterations

    • KDE-1233: Crash on Windows Server 2012 R2 on SSO Login

    • KDE-1237: Tab key not being sent to Citrix client use Native App Fill

    Admin Guidearrow-up-right
    End-User guidearrow-up-right
    CVE-2023-4863
    Support provided for Touch ID and Windows Hello Login at the expired session screen

    hashtag
    Bug Fixes

    • Fixed: Accounts containing imported passwords do not calculate audit scores correctly.

    • Fixed: Various login screen display issues causing various login/logout side effects (Safari).

    • Fixed: When a user attempts to close the quick start module upon first login to the Web Vault, an error is triggered and window closes.

    • Fixed: Logging out while in Offline Mode, generates an "Internal Error" message.

    • Fixed: Canceling a Windows Hello Login, generates an "Error" message.

    • Fixed: KeeperFill for Apps crashes when user attempts to search their records.

    • Fixed: User unable to back out of the login screen once "Touch ID " is selected (Mac OS).

    https://docs.keeper.io/enterprise-guide/login-api-v3arrow-up-right
    https://github.com/Keeper-Security/android_webview_autofillarrow-up-right
    https://www.keepersecurity.com/blog/2022/10/13/how-to-keep-your-smart-phone-safe-and-personal/arrow-up-right
    Keeper Android prompt for Autofill
    https://keepersecurity.com/checkoutarrow-up-right
    Enterprise Supportarrow-up-right
    contact the Keeper B2B support teamarrow-up-right
    account transferarrow-up-right
    open a support ticketarrow-up-right
    ServiceNow support portalarrow-up-right
    Join our Slack Workspace
    Support for Two-Factor Code in CSV import
    Import from Thycotic / Delinea Secret Server

    Vault Version 15.0.7

    Released October 16, 2020

    hashtag
    Bug Fixes

    • KDE-933: Fix for minor UI display issue

    • KDE-932: User unable to proceed past 2FA timeout screen and return to login upon clicking "OK" button when prompted

    • VAULT-4478: Unable to login with SSO Cloud v15 in these scenarios: (1) Existing vault user, adds v15 extension, logging into the vault doesn't also login to the extension. (2) New vault device and new browser extension device, unable to login to the vault. The "push" screen blinks and hangs.

    • VAUL-4482: User receives "You do not have the required privilege to perform this operation." when resetting their Master Password.

    • VAUL-4483: User registration emails to create Vault with a Master Password do not work if the browser extension is pre-loaded on the device prior to receiving the invitation.

    • VAUL-4484: User logging into the Extension is forced to change Master Password when complexity rules change. However, the Web Vault was not forcing prompt.

    • VUL-4479: Account Recovery + Duo Push providing "invalid code" after submitting.

    - protect web-based apps
  • - monitor usage for all privileged sessions

  • - discover and onboard resources and accounts into Keeper

  • - controlling privilege across your fleet of devices.

  • - PAM enforcement policies to enable and configure PAM feature permissions

  • Websitearrow-up-right
    KeeperPAM Documentationarrow-up-right

    iPhone & iPad

    Troubleshooting and support for the Keeper iOS App

    hashtag
    Downloads

    Keeper for iOS is available at the Keeper download pagearrow-up-right.


    hashtag
    User Guides

    The iOS user guide is with additional info about autofill and passkey setup .


    hashtag
    iOS Missing Payment Cards

    If your payment cards are missing, go to Keeper > Account tab > Sync > Sync Now.


    hashtag
    iOS Stuck on Syncing

    If you are seeing syncing stuck on the screen, please check the following:

    • Update to the latest version of Keeper on the App Store

    • Instead of logging in with biometrics, try to login with your Master Password (clicking "Next")

    • After a successful login, visit the settings screen of Keeper and turn OFF/ON the Face ID or Touch ID setting.


    hashtag
    Syncing, Updates and Device Approvals

    If adding a password on your desktop doesn't automatically sync down your mobile device, ensure that push notifications are enabled.

    iOS and Android apps use push notifications for functionality such as:

    • Realtime sync

    • Device approvals

    • Sharing notifications

    Please ensure that push notifications for Keeper are enabled on your device (Settings > Notifications > Keeper and enable "Allow Notifications"). Also, "Do Not Disturb" mode will prevent certain notifications from appearing. Device approvals will not be received if you have iOS in Do Not Disturb mode.


    hashtag
    Verification Codes Missing on Apple Watch After Update (Keeper v17.4.0):

    Following the update to Keeper on iOS version 17.4.0, some users may find that the Verification Code (2FA/OTP) option is no longer visible on their Apple Watch. This happened due to a required update to how the iPhone app and the watch app talk to each other. For those users, this means the link between the two needs to be re-established to get your codes showing again.

    hashtag
    How to Fix It:

    Use a Backup Code to Log In & Reset your 2FA

    1. When logging into your account, choose the option to use a backup code when prompted for your usual verification code.

    2. Once you are logged in, navigate to Settings & then Two-Factor Authentication.

    3. Find and select the option to Turn Off Two-Factor Authentication.

    circle-exclamation

    When you set up 2FA again, you will get a new set of backup codes. Please remember to save these new codes in a safe and secure place!

    Don't Have Your Backup Codes?

    If you can't find your backup codes, please contact our support team . We are ready to help you get this sorted out.


    hashtag
    Other iOS Issues

    Having issues on iOS? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.

    circle-exclamation

    Before resetting your mobile app, make sure you can first access Keeper on the or and ensure that all of your data is appearing.

    • On the front door of the Keeper app, tap on "Need Help?" then tap Reset Keeper.

    • Launch Keeper and Login to your account.

    • You will be asked to approve the device during the login process.


    hashtag
    Upload Limits

    Keeper supports the following upload limits for the iOS mobile application:

    • iOS: Up to 5 GB


    hashtag
    Feature Requests

    We love hearing from iOS customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    to post questions, feedback or receive new beta versions.

    Vault Release 16.9.0

    Released April 6, 2023

    Keeper is proud to announce our release of version 16.9.0 of our Web Vault and Desktop App. This new version includes a new design with a user interface refresh along with some new features and bug fixes.

    See our blog post for additional details:

    hashtag
    New Features

    • Keeper Desktop App now supports Import SSO LastPass vaults from Okta SSO and Azure SSO federated accounts

    • Advanced Search: Recently viewed records, search filters and more

    • Onboarding: New user onboarding has been improved

    • UI Refresh: Look and feel of the vault has been improved

    • MFA: When signing in with 2FA for the first time, there are now additional options. The Web Vault now offers 12-hour and 24-hour in addition to the previous options (every login, every 30 days, and don’t ask again on this device.)

    • Support for Google Authenticator QR code export format

    • Security Scores: "Security Data Sync" in the diagnostics menu will refresh your security scores

    • Lost Records: Shared records that have been removed from your vault, but are owned by you, can be recovered from the Deleted Items screen. The tab will only show if you have relevant records.

    circle-info

    Note: There has been a change on our Privacy Screen feature. If you are the owner of the record, you will now be able to see the password even if there is a privacy screen applied and you couldn’t see the password previously. The privacy screen is still working and in effect for users who do not own the record. This change is being made across all platforms.

    hashtag
    Bug Fixes

    • We truncated the view of super long URLs in the record detail screen

    Vault Version 16.7.0

    Released on June 21, 2022

    hashtag
    Features

    • VAUL-5165: Offline Create/Edit Record capability

    • VAUL-5181: New UI for login screens

    • VAUL-5031: Hundreds of new website logos added

    • VAUL-5208: Additional 508 compliance / accessibility updates

    • KDE-1253: Enterprise enforcements for Desktop App distribution defaults. This allows the Admin to define the default SSO Domain and Data Center location. Detailed instructions available at this link:

    hashtag
    Bug Fixes

    • VAUL-5295: CSV Import GUI fixes

    • VAUL-5095: Unable to ignore BreachWatch record which has edit rights

    • VAUL-5045: BreachWatch can indefinitely alert about a breached record

    hashtag
    Improvements

    • KDE-1246: Upgrade Electron framework

    • KDE-1261: 10x speed improvement on file uploads for large file attachments.

    Android

    Troubleshooting and support for the Keeper Android App

    hashtag
    Downloads

    Keeper for Android is available at the Keeper download pagearrow-up-right.


    hashtag
    User Guides

    The Android user guide is with additional info about autofill and passkey setup .


    hashtag
    Syncing Errors

    If you are receiving an error on your mobile app, please make sure to update to the latest version. After you update, we recommend performing a Full Sync by clicking on Sync > Sync Now. This tends to resolve any searching or record-related issues.


    hashtag
    Syncing, Updates and Device Approvals

    If adding a password on your desktop doesn't automatically sync down your Android device, ensure that push notifications are enabled.

    Android apps use push notifications for functionality such as:

    • Realtime sync

    • Device approvals

    • Sharing notifications

    Please ensure that push notifications are enabled for Keeper from your device's settings menu. Also, "Do Not Disturb" mode will prevent certain notifications from appearing.


    hashtag
    Samsung Autofill Selection Not Showing

    Some customers are unable to select Keeper from the Samsung provider list when activating KeeperFill.

    If Keeper does not show up, please open your device settings and search for "Passwords" then select Keeper under "Passwords, passkeys and autofill".


    hashtag
    Other Android Issues

    Having issues on iOS or Android? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.

    circle-exclamation

    Before resetting your mobile app, make sure you can first access Keeper on the or and ensure that all of your data is appearing.

    • Go to your device Settings icon, and then tap on the Applications menu. Scroll down until you see the Keeper icon and tap on it. Click on the Clear Data button, and then click OK. The next time you load Keeper, it will be reset to its original settings. Another way is to press-and-hold on the Keeper icon, then open the application info and clear the data.

    • Re-install Keeper from Google Play on your device

    • Launch Keeper and Login to your account. You will be asked to approve the device during the login process.


    hashtag
    Upload Limits

    Keeper supports the following upload limits for the Android mobile application:

    • Android: Up to 5 GB


    hashtag
    Feature Requests

    We love hearing from Android customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    to post questions, feedback or receive new beta versions.

    Vault Version 16.2.0

    Released on September 14, 2021

    hashtag
    New Features & Improvements

    • Support for Azure Conditional Access on the Keeper Desktop application for users who login with Single Sign On. Previously, Azure Conditional Access policies could not be added to Keeper.

    • Increased the number of special characters used in the password generator to this set:

      !@#$%()+;<>=?[]{}^.,

    • Support for cookie persistence on the Keeper Desktop application for users who login with Single Sign On. This reduces friction and steps for users who sign in often.

    • Support for additional SAML SSO identity providers and elimination of any browser type recognition issues.

    • Keeper Desktop now allows users to remain logged into their SSO identity provider. If you choose to remove Single Logout (SLO) from the SSO configuration, the user will not be logged out of their identity provider when they logout from Keeper. For more information about Single Logout configuration see the link below:

    • 🇺🇸 Support for the Amazon AWS GovCloud environment. Keeper is currently FedRAMP in-process and public sector entities can now establish their Keeper tenant in the GovCloud environment. Contact the public sector sales team at [email protected] for more information.

    • Support for the upcoming Compliance Reports feature. The Vault will encrypt appropriate compliance data from records and send it to the Admin Console. There is no change to the end user experience in the Vault.

    • Added a Region Selector in login screens and KeeperFill for Apps

    • Users on the Web Vault are encouraged to download the Desktop App for performing automated transfer from LastPass.

    • Import from Bitwarden now supports TOTP seeds for Two-Factor Authentication.

    • Import from Bitwarden now supports multiple URL fields.

    hashtag
    Bug Fixes

    • VAUL-4848: 1Password import not importing secure notes field

    • VAUL-4851: Safari Sierra and High Sierra not importing passwords

    • VAUL-4852: Import token invalid in AU region

    Vault Release 16.11.1

    Released June 17th, 2024

    hashtag
    Improvements

    • VAUL-6523: Added pin code generator to "Pin Code" custom field

    Pin Code Generator
    • VAUL-6595: Improved 508 compliance for "Record Types" default actions

      • Escape key closes "Record Types"

    • VAUL-6596: Enhanced 508 compliance for "More Filters" default actions

      • Escape key closes "More Filters"

    • VAUL-6597: Fixed issues with 508 compliance regarding possible actions. Dropdown lists out of focus are automatically closed

    • VAUL-6648: Updated support information that appears in the vault directing users to:

    hashtag
    Bug Fixes

    • VAUL-6550: Implemented a modal warning for trials expiring within 24 hours

    • VAUL-6747: Removed offensive words from the word list

    • VAUL-6613: Updated strength indicator to prevent it from turning green erroneously

    Troubleshooting

    Here you will find answers to common questions about the various Keeper platforms and solutions

    Vault Version 16.8.0

    Released on Oct 20, 2022

    hashtag
    Features

    • Share Admin Keeper's Share Admin feature is a role-based permission that gives administrators elevated access rights over your organization's shared folders and shared records. Share Admins have full user and record privileges for any shared record that they have access to. See: https://docs.keeper.io/enterprise-guide/share-adminarrow-up-right

    • MSP to Managed Company Team Sharing Directly share folders to Managed Company teams

    • General to Record Type Conversion You can now right-click to change the type of any record, including migration from the legacy "General" record types. Multi-select + right click allows migration of multiple records at once.

    • Default Record Permissions Quickly set permissions during the creation of a Shared Folder

    • Default Folder Settings moved into the "Settings" tab In addition, you can now apply permission changes recursively and retroactively.

    • Shared Folder UI improved visibility Several enhancements to the UI which improve the visibility and management of Shared Folders.

    • Team Visibility There is now a "View Team" function in several locations so that you can see who you're sharing to.

    • Collapsed View of Records When a folder contains subfolders and records within subfolders, you can now collapse the view, in order to apply changes recursively. Select "Show subfolder records" to collapse the list.

    • Retroactively apply permissions When "Show subfolder records" is selected, the Settings tab will display a checkbox called "Apply permissions to all subfolders" which will apply the default folder settings to all existing records within folders and subfolders.

    Vault Release 17.4

    Released on Sep 30, 2025

    hashtag
    Enhancements

    • VAUL-4284: Added numerous updates to KeeperAI threat detection across PAM resources, PAM configuration settings, gateway settings and session history. about KeeperAI for privileged sessions.

    • KDE-1639: Published Keeper Desktop to Snap store for Linux. Snapcraft (and Snaps) are used on numerous Linux distributions, including Ubuntu, Debian, Fedora, RHEL, CentOS, AlmaLinux, Rocky Linux, Linux Mint, Manjaro, and openSUSE. Snap link:

    • KDE-1738: We've rewritten the entire Hotkey system in the desktop application from the ground up.

      • Addressed several reported inconsistencies between macOS and Windows platforms.

      • Hotkeys can now be further customized with any character or symbol.

    • The Password Importer standalone executable for Microsoft Windows has been improved to import passwords stored in Chrome. NOTE: Enterprise customers may need to add an exclusion policy on their EDR platform if Keeper is flagged.

    hashtag
    Bug Fixes and Improvements

    • VAUL-7455: We fixed an issue where PAM features were displayed even when the user didn’t have the required enforcements.

    • VAUL-7612: We fixed an issue where the password generator did not retain the length of the previous password.

    • VAUL-7252: We enhanced the search bar accessibility on smaller screens.

    Vault Version 15.0.12

    Estimated Release Date: December 31, 2020

    hashtag
    Improvements

    • VAUL-4547: Support for Kaspersky password import

    • VAUL-4552: Admins now receive a warning before removing themselves from a shared folder

    • VAUL-4566: Improved performance handling of vaults with large data sets

    • VAUL-4551: Enterprise users to receive notification with explanation for Master Password change and complexity requirements upon login

    hashtag
    Bug Fixes

    • KDE-945: User receives error message after closing Desktop App and relaunching

    • KDE-962: "About Keeper" options menu fails to appear after first launch of Desktop App on Windows

    • KDE-972: KeeperFill for Apps fails to respond to hotkeys when switching between apps

    Vault Release 16.11.0

    Released May 2, 2024

    hashtag
    Features

    The 16.11.0 release contains several new features, including , , and .

    hashtag

    Keeper Commander & Automator

    Troubleshooting and support for Keeper Commander and Keeper Automator

    hashtag
    User Prompted for Device Approval

    Device Approvals are a required component of the SSO Connect Cloud platform. Approvals can be performed by users, admins, or automatically using the .

    • Users can approve their additional devices by using a previously approved device. For example, if you are logged into your web vault on your computer already, and logging into your phone app for the first time, you will get a device approval prompt on your web vault with the mobile device's information which you can approve or deny.

    Preview Release

    Early access Preview (pre-release) Keeper Vault and Desktop app

    When a major release is planned, Keeper publishes a Preview version of the Vault and Desktop app, documented below. The pre-release version is typically published 1 week before public release.

    hashtag
    Web Vault Preview

    circle-info

    Vault Release 16.10.3

    Released on August 10, 2023

    hashtag
    Features

    • VAUL-5688: Support for Passkey record fields. Managing passkeys requires browser extension 16.6.0 which was released on Aug 7, 2023. Learn more about passkeys .

    Vault Version 16.0.0

    Released April 26, 2021

    hashtag
    New Features and Improvements

    • Introducing Record Types for Web Vault & Desktop App (Limited Release) This release introduces a powerful new feature called "Record Types", which gives users the ability to create records of various template types, grouped into categories, each containing a unique collection of field types and functionality fields within the record. Record templates can be created by Admins that are custom to the needs of the business. This feature is only available for Enterprise customers, activated on an individual basis at this time, because the Browser Extension, iOS and Android apps are still under development. If you are interested in being an early adopter of Record Types, please contact your customer success team member at Keeper and we'll activate the feature.

    Vault Version 16.4.0

    Released on Jan 25, 2022

    hashtag
    Features and Improvements

    • KDE-1111: Native App Filler custom field type for Record Types which provides automated filling of native applications with application title matching, keystroke macros and advanced OCR for recognition of window content for automated record selection. More information about this feature can be found here:

    Vault Version 15.0.10

    Published on December 8, 2020

    hashtag
    Special Notes

    • Password Complexity requirements are checked upon every login, not just during Master Password Reset. If you have a user being asked to change your Master Password, they are likely using a password that does not meet the policy requirements.

    KDE-973: Recipient of a shared record is required to login again after the shared record has been edited

  • KDE-903: Hotkey "CMD+TAB" focuses on KeeperFill for Apps when hidden instead of Desktop App (Mac)

  • VAUL-4560: Deleting a record shortcut also deletes the original record

  • VAUL-4468: Importing CSV records with "can edit" permission does not set permission

  • VAUL-4562: Entering an email address with a trailing space at login generates an error message

  • VAUL-4574: Sharing a folder causes login errors for the sharing user

  • https://docs.keeper.io/user-guides/keeperfill-for-apps#native-app-fillerarrow-up-right

  • VAUL-4907: Support for Webauthn with automatic U2F->Webauthn transition

  • VAUL-4945: Import/Export support for Record Types

  • VAUL-5069: Support for Psono password import

  • VAUL-5006: Support for partial email search during Sharing for customers with over 500 users.

  • VAUL-5046: Display changes made on the record history screen

  • VAUL-5063: Allow record owner to change URL on Privacy Screen records.

  • VAUL-5016: Allow users in a shared folder to duplicate records

  • VAUL-4989: Allow users who are shared to a record (non-owner) to duplicate records

  • KDE-999: Automated LastPass import will convert Templates and Custom Fields into Keeper Record Types and Custom Fields

  • hashtag
    Bug Fixes

    • KDE-1185: Conditional access blocking usage of Desktop App in certain environments

    • VAUL-5067, VAUL-5073: Secrets Manager client device bug fixes

    • VAUL-5968: SSO Cloud login hangs when the device has been locked

    • VAUL-5066: Using custom record types when offline generates errors

    • KDE-1145: SSO users who select 2FA setting "remember 30 days" are still being prompted every time.

    • VAUL-5064: Custom record type that requires a file isn't allowing save

    • VAUL-5083: Default folder settings are not viewable in folder view screen

    • VAUL-5054: Custom record type titles are not providing auto-suggestion

    • VAUL-5088: Bitwarden import of TOTP fields

    • KDE-1102: Improved handling of logout timer on desktop application

    • KDE-1097: LastPass imported custom fields truncated

    Finally, select Two-Factor Authentication again and proceed to add your Apple Watch.
    located herearrow-up-right
    herearrow-up-right
    HEREarrow-up-right
    Web Vaultarrow-up-right
    Desktop Apparrow-up-right
    Join our Slack Workspace
    located herearrow-up-right
    herearrow-up-right
    Web Vaultarrow-up-right
    Desktop Apparrow-up-right
    Join our Slack Workspace
    VAUL-4543: User cannot save an address that does not have a title
  • VAUL-4586: Access Delay for Emergency Access displays incorrectly

  • VAUL-4640: Long security answer blocks user from using Account Recovery

  • VAUL-4797: Clicking the dice button on an existing record should not reduce the complexity.

  • VAUL-4911: Kaspersky import fails when the data contains certain reserved words

  • VAUL-4946: Card type not being displayed when typing in the credit card number

  • VAUL-4960: File drag-and-drop into a New record is not being saved on first try

  • VAUL-4941: Hebrew language is showing the TOTP code in reverse order

  • Multiple Record Types bug fixes. Learn Morearrow-up-right about the upcoming record types feature.

  • https://docs.keeper.io/sso-connect-cloud/logout-configurationarrow-up-right
  • Keeper SSO Connect Cloud™ provides Zero-Knowledge encryption while retaining a seamless login experience with any SAML 2.0 identity provider.

  • When a user attempts to login on a device that has never been used prior, an Elliptic Curve private/public key pair is generated on the new device. After the user authenticates successfully from their identity provider, a key exchange must take place in order for the user to decrypt the vault on their new device. We call this "Device Approval".

  • Using Guest, Private or Incognito mode browser modes or clearing the browsers cache will identify itself to Keeper as a new device each time it is launched, and therefore will require a new device approval.

  • To preserve Zero Knowledge and ensure that Keeper's servers do not have access to any encryption keys, we developed a Push-based approval system that can be performed by the user or the designated Administrator. Keeper also allows customers to host a service which performs the device approvals and key exchange automatically, without any user interaction.

    When logging into a new or unrecognized device, the user has two options:

    • Keeper Push (using their own devices)

    • Admin Approval (request administrator approval)

    Or, you can skip this step completely by deploying the Keeper Automatorarrow-up-right service.


    hashtag
    Deploying Automator

    Keeper Automator can be deployed many waysarrow-up-right, depending on your requirements. The most cost effective way of deploying Automator would be using a micro instance of a Linux VM using the Docker Composearrow-up-right method. If you would like to use only cloud services, we recommend the AWS Container Servicearrow-up-right or Azure App Gatewayarrow-up-right method.


    hashtag
    Delays in Login and Device Approval

    If logging into a new device takes 20-30 seconds to complete, this could be caused by your Keeper Automator service being misconfigured or inaccessible by the Keeper servers. Please disable the Keeper Automator in your environment using the "automator disable" command.


    hashtag
    Automator Fails After Instance Reboot (When Using Azure App Gateway)

    After an unexpected reboot of the container instance in Azure the container can sometimes come back up with a new IP address (e.g. x.x.0.5 even when the App Gateway had originally been provisioned with an IP of x.x.0.4 in the backend pool). Updating the IP of the container in the backend pool resolves this issue.

    • In the Azure cloud shell, retrieve the current IP: az container show --name keeperautomatorcontainer --resource-group keeper_automator_rg --query ipAddress.ip --output tsv

    • In Azure portal select Resource groups > $your_resource_group > your Application Gateway > Backend pools > change Target IP to the new one from above.


    hashtag
    Commander Scripting or Coding Questions

    Please see the Keeper Commander troubleshooting pagearrow-up-right.


    hashtag
    Contact Us

    If you need help, please open a support ticketarrow-up-right in our ServiceNow system.

    If you need to speak to our support team, simply make the request and we will schedule it during enterprise hours. Please be patient as we coordinate the call.


    hashtag
    Emergency Support

    If you're a enterprise customer having an emergency and need urgent support, use our ServiceNow support portalarrow-up-right. On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".


    hashtag
    Feature Requests

    We love hearing from Enterprise customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    Join our Slack Workspace to post questions, feedback or receive new beta versions.

    Keeper Automator servicearrow-up-right

    VAUL-5977: Support for RESTRICT_IMPORT_SHARED_FOLDERS enforcement policy which will prevent users from importing shared folders from LastPass. See the Admin Console role enforcement policies to enable this setting.

  • VAUL-5502: Support for new paginated sync system on the backend API

  • VAUL-5999: Support for Swedish and Finnish languages

  • VAUL-5628: Date fields are searchable

  • VAUL-5580: Email addresses are auto-sanitized when pasting into sharing screens

  • hashtag
    Bug Fixes

    • KDE-1376: Desktop app can get stuck when the main app is closed too quickly

    • KDE-1381: Offline records not syncing up properly in Linux

    • KDE-1382: RPM desktop installer not compatible with RHEL9

    • VAUL-5726: Deleted items is missing right-click option

    • VAUL-5761: Remove RSA SecurID from GovCloud environment

    • VAUL-5960: Right Click New Shared Folder - Records are not being added to folder

    • VAUL-5945: After changing master password, user can login offline with old master password

    • VAUL-5981: TOTP URIs with leading white space are not parsed correctly by the vault

    • VAUL-5899: Large vault search speed is causing delays

    • VAUL-5986: Advanced search needs to dismiss results upon hitting <enter> key

    • VAUL-5983: The record owner is restricted from viewing the password on a V2 record that utilizes the enterprise domain enforcement

    • VAUL-5933: 508 compliance items (ensure image tags have alt attributes)

    • VAUL-5957: Drag/Drop file in the vault is adding to the prior record created

    • VAUL-5966: Drop target incorrect when file is dropped into the vault

    • VAUL-5968, VAUL-5969: Additional 508 compliance items

    • VAUL-5994: Select a shared folder and select a record not in the shared folder, right click and delete both. Vault will white screen.

    • VAUL-6053: Vault scrolls unexpectedly when clicking a folder

    • VAUL-6105: Security Audit: "reused" count includes owned records w/ the same password as a non-owned record

    • VAUL-6094: Multiple Share Relationship Invites are being sent after acceptance

    hashtag
    Other Changes

    • VAUL-5899: Improved loading and search speed for large vaults

    • KDE-1343: Remove the deprecated browser extension for Safari users, point users to the new App Store version of the Safari extension

    • VAUL-6110: Removed the manual on/off toggle for logout timer. Users must specify a time (in minutes).

    • VAUL-5947: Account recovery setup is removed during the onboarding for SSO users.

    • VAUL-6143: If onboarding is disabled through role policy, disable any browser extension popup messages that lead to an installation.

    herearrow-up-right

    VAUL-5257: Second login required to send security audit data to the Admin Console.

  • VAUL-5251: Unable to export records with the Login record type restricted by admin.

  • VAUL-5248: Create Duplicate feature appearing for records that have Privacy Screen enabled.

  • VAUL-5270: Processing pending team members can sometimes cause the vault to display no data.

  • KDE-1220: KeeperFill for Apps compatibility issues with Apache Guacamole / Keeper Connection Manager running on a Mac host.

  • Several small UI bug fixes

  • https://docs.keeper.io/enterprise-guide/deploying-keeper-to-end-users/desktop-application#enterprise-configurationarrow-up-right
    New Login UI
    VAUL-6721: Fixed the default passphrase separator issue
  • VAUL-6719: Corrected domain conflict alerts to display the appropriate text

  • VAUL-6519: Fixed issue with Chrome displaying a break in the password generator

  • VAUL-6728: Prevented users from saving passwords with domain conflicts

  • VAUL-6729: Ensured that users with privacy screens cannot view PIN codes

  • VAUL-6732: Introduced new alerts for different domain conflicts

  • VAUL-6737: Added missing strings for various languages

  • VAUL-6741: Improved vault UI responsiveness when saving new passwords

  • VAUL-6736: Resolved issues with the PIN-CODE and PIN Generator not working

  • VAUL-6740: Added missing translation for 'Your password has been saved'

  • VAUL-6754: Implemented in-app popup for expired trial warnings

  • VAUL-6753: Fixed issue with the privacy screen feature

  • VAUL-6759: Fixed the issue preventing saving passphrases with domain conflicts

  • VAUL-6761: Resolved incorrect display of consumer/enterprise settings

  • VAUL-6770: Ensured default configuration is correctly applied when new fields are unchecked

  • VAUL-6776: Fixed GUI issues in the password complexity feature

  • VAUL-6723: Fixed issues with losing ownership of a record in a shared folder

  • VAUL-6693: Corrected tooltip hover text display issues in shared folders

  • VAUL-6653: Fixed time selection issues in the date picker configuration

  • VAUL-6726: Resolved a white screen crash issue

  • VAUL-6688: Resolved UI issues with the new shared folder modal

  • VAUL-6733: Addressed issues with configuration records not being viewable

  • VAUL-6731: Fixed time picker for 24-hour time format in One-Time Share

  • VAUL-6734: Fixed file upload issues

  • VAUL-6738: Corrected viewing link display issues in One-Time Share

  • https://www.keepersecurity.com/support.htmlarrow-up-right

    Read Me First

    Searchable FAQs

    Enterprise Admin

    Browser Extensions

    Web Vault & Desktop App

    iPhone & iPad

    Android

    Keeper SSO Connect & SCIM

    Keeper Commander & Automater

    KeeperPAM

    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Security Key as the Only 2FA Method
    You can allow virtual input from software like Synergy or 3rd party applications to optionally control hotkeys.
  • Hotkeys can be disabled. Visit the Settings > KeeperFill screen in the desktop app to configure hotkeys.

  • VAUL-7633: We fixed an issue where selecting and unselecting options when creating a Gateway did not preserve the previous form state.

  • VAUL-7720: We updated the Record History UI to display the "Current Version" at the top, to match mobile apps.

  • VAUL-7656: We updated the Vault to support the latest protobuf definitions.

  • VAUL-7467: We fixed an issue where enterprise users could see the option to create a Self-Destructing Record during record creation even when the role enforcement was turned off.

  • VAUL-7664 & KDE-1696: We added numerous missing translations to our KeeperPAM user interface screens.

  • KDE-1657: We fixed an issue where changing the focused element with the arrow keys caused the focus highlight to become invisible.

  • VAUL-7542: Fixed an issue where scheduled monthly rotations did not account for daylight saving time.

  • VAUL-7539: Fixed an issue where rapidly clicking Save & Share when creating an SDR could create duplicate records.

  • VAUL-7609: Fixed an issue where BW, “has no scanned” was incorrectly displayed on V2 records without passwords but with attachments.

  • VAUL-7500: Fixed an issue in Japanese where the values for “Bytes Used of Bytes Total” were reversed.

  • VAUL-7698: Fixed an issue where rotation did not work for the initial example MySQL record in the sandbox records.

  • VAUL-7681: Fixed a start_login 406 error by clearing the token in local storage and registering a new device.

  • VAUL-7674: Fixed an issue where BreachWatch displayed an incorrect scan time.

  • KDE-1712: We updated the Windows tray icon on the desktop app.

  • KDE-1715: We fixed an issue where a fresh installation on Windows could not log in to an existing account on the first attempt.

  • KDE-1665: We have fixed an issue that caused an infinite spinner on the login page during a fresh installation.

  • KDE-1781: Updated packages to address CVE-2025-59343

  • On high resolution displays, resizing KeeperPAM sessions to full screen size was not also resizing text properly. This has been improved significantly.

  • https://snapcraft.io/keepersecurityarrow-up-right
    Passphrases

    Passphrases can now be generated and stored in the vault. The Password Generator includes advanced character/symbol policy preferences

    Generate Passphrases for Increased Password Strength

    hashtag
    Time-Limited Access

    Launched Time-Limited Access, which allows temporary sharing of records and folders with other Keeper users.

    Full Documentation Herearrow-up-right

    Set an Access Expiration Period for Shared Documents

    hashtag
    Self -Destructing Records

    Launched Self-Destructing Records, which allows sharing of records with other Keeper users for a time period after which the record is deleted for both parties.

    Full Documentation Herearrow-up-right

    Share Sensitive Information with Self-Destructing Records
    Specify an Expiration Date for the Self-Destructing Record

    hashtag
    Shared Item Recovery

    Recently deleted shared records from within shared folders can now be recovered from the "Deleted Items" section of the Web Vault and Desktop app.

    In the "Deleted Items" section of the vault, you'll see a new tab called "Shared Folder Contents". This tab contains records that were deleted by a user of the shared folder with "Can manage records" permission. Records which appear in this tab are able to be restored from any user who currently has access to the shared folder. This feature was created to make the restore process accessible from any shared folder participant when a record has been removed by any team member.

    For security reasons, if a change was made to the record after it was removed from the shared folder, it cannot be restored and the original owner must re-share it.

    Shared Folder Recovery from Deleted Items

    hashtag
    Bug Fixes

    • VAUL-5271: Fixed an issue that prevented record type changes with some records

    • VAUL-5628: Fixed an issue that prevented some date fields from being searchable

    • VAUL-5842: Fixed various issues with consistently updating fields on language changes

    • VAUL-6163: Fixed an issue that allowed entry of more than the five allowed emergency access contacts

    • VAUL-6168: Fixed a display issue when certain record types are disabled

    • VAUL-6198: Fixed an issue that prevented error message from being shown when attempting to invite a user with an invalid email address

    • VAUL-6242: Fixed an issue that prevented hover text from being displayed on truncated records

    • VAUL-6301: Fixed an issue where some countries would not sort properly in records with a Country field

    • VAUL-6340: Implemented hashing algorithm for account mapping within the vault

    • VAUL-6345: Implemented proper handling of international phone numbers in records

    • VAUL-6353: Fixed a UI issue where a password slider artifact would appear over search results

    • VAUL-6365, VAUL-6373, VAUL-6392: More descriptive errors are now displayed when attempting to create a record, folder or shared folder using an account that does not have appropriate rights

    • VAUL-6370: Fixed an issue syncing teams to the vault on initial sync

    • VAUL-6383: Fixed an issue that prevented a user from creating a shared folder under certain Granular Sharing Enforcement policies

    • VAUL-6393: Granular Sharing Enforcements now apply even in the vault is in offline mode

    • VAUL-6397: Fixed an issue with syncing records after ownership transfer

    • VAUL-6427: Fixed an issue importing from Proton Pass on Windows

    • VAUL-6439: Fixed an issue that prevented the owner of a shared record from deleting records in some scenarios

    Passphrases
    Time-Limited Access
    Self-Destructing Records
    Shared Item Recovery
    If you encounter any issues with this version, please email [email protected].
    • US: https://keepersecurity.com/vault/previewarrow-up-right

    • EU: https://keepersecurity.eu/vault/previewarrow-up-right

    • AU: https://keepersecurity.com.au/vault/previewarrow-up-right

    • CA:

    • JP:

    • US_GOV: (No US Gov preview available for Web Vault)

    hashtag
    Desktop App Preview with Forcefield

    Keeper Desktop is a native application for Windows, macOS and Linux platforms. On Windows devices, this is bundled with the Keeper Forcefieldarrow-up-right service.

    circle-info

    The Desktop App preview does not auto-update. On Windows computers, a new version of the pre-release version requires a full uninstall and re-install of Keeper. This does not affect stored data.

    • Mac (.dmg) - Downloadarrow-up-right

    • Mac (.pkg) - Downloadarrow-up-right

    • Windows (.appx) - Downloadarrow-up-right

    • Windows (.msix) -

    • Windows (.msi) -

    • Linux (.rpm) -

    • Linux (.deb) -

    hashtag
    Standalone Forcefield Preview

    Keeper Forcefield can also be deployed on a standalone basis, without the Keeper Desktop application. The URL and MSI installer for the Forcefield preview is available here:

    https://download.keepersecurity.com/forcefield/preview/keeperforcefield.msiarrow-up-right

    Send feedback to: [email protected]

    • Generate a Password in KeeperFill for Apps Keeper's password generator is now within easy reach in the KeeperFill for Apps toolbar landing screen. Users can generate and copy the secure password or use it to create a new record.

    • Comprehensive Keyboard Command Functionality for KeeperFill for Apps

    • Support for NTLM Authentication for Microsoft Windows Customers

    hashtag
    Bug Fixes

    • KDE-959: The "Session Timed Out" dialogue appears when logging into a different account after a session timeout occurs

    • KDE-1034: When a user attempts to switch from US to EU region at login, an Uncaught TypeError is returned

    • KDE-977: Selecting "Create an Account" in KFFA opens the login page on Keeper Desktop

    • VAUL-4721: The "Admin Console" button in the Vault fails to redirect Enterprise users to the console

    • VAUL-4516: Users are prompted for their 2FA code twice when logging into EU SSO Cloud account

    Keeper prompts for 2FA prior to Master Password entry. This is part of our new Login V3 security model.

    hashtag
    New Features

    • VAUL-4470: Addition of "Stay Logged In" on the Settings > Security screen.

    • VAUL-4539: Automated Safari / iCloud Keychain password import

    hashtag
    Improvements

    • KDE-868: Improved handling of KeeperFill for Apps filling through ConnectWise Control

    • KDE-951: Improved handling of Microsoft 2FA token when scanning into the vault record

    • KDE-870: Implementation of more secure "Copy" feature utilizing Microsoft API (Learn Morearrow-up-right)

    • KDE-948: Allow KeeperFill for Apps widget to be moveable

    • KDE-950: Implement basic keyboard navigation for KeeperFill for Apps menu system

    • VAUL-4499: Increase length of Password Generator maximum length

    • VAUL-4190: Right-click on "My Vault" to provide quick functionality within the vault

    • VAUL-4495: Direct all new users to install of v15 Browser Extension instead of v14

    • VAUL-4470: Improved handling of "Stay Logged In" feature across Vault, Desktop App and Extension

    hashtag
    Bug Fixes

    • VAUL-4502: Very large Keepass imports timing out

    • VAUL-4492: Duo Push not adhering to 2FA duration setting for re-prompt

    • VAUL-4511: PDF Export failing with error

    hashtag
    Stay Logged In

    This feature keeps the user's session active for the amount of time as set by their Logout Timer, even between browser and computer restarts.

    For example if your logout timer is set to 30 minutes, you'll stay logged into Keeper for 30 minutes no matter which browsers you open and close, or if you restart your computer. "Stay Logged In" has been our most highly requested feature from customers.

    hashtag
    Turning Off Stay Logged In

    If you don't want this feature enabled, and you would like to disable this capability for yourself or all your users, there are two ways of controlling it:

    (1) From the Admin Console go into the Role > Enforcement Policies > Account Settings and turn on the "Disable Stay Logged In" option. This will restrict the feature for users in the role and they will be unable to turn this feature on.

    (2) For your own account, open the Keeper Desktop Application and go into Settings > Security and turn off Stay Logged In.

    MSP to MC Sharing
    Change Record Type
    Retroactively apply permissions to existing records

    Vault Version 16.4.6

    Released on March 10, 2022

    hashtag
    Features & Improvements

    • KDE-1090: Upgraded Electron framework to 17.x

    • KDE-1203: Added a new Hot Key for filling TOTP codes (Ctrl/Cmd+Shift+T)

    • KDE-1206: Added {SPACE} keystroke for KeeperFill for Apps typer feature

    • VAUL-5047: Added Passportal Import tool

    • VAUL-4597: Added Record UID to BreachWatch events for Advanced Reporting & Alerts module.

    • VAUL-5140: Improved speed for large vaults

    • VAUL-5160: Improved 1Password import which includes TOTP codes

    • VAUL-5184: Improved MyKi import to support TOTP codes

    hashtag
    Bug Fixes

    • KDE-1200: Crash when running Keeper Desktop on Fedora 35

    • KDE-1207: KeeperFill hotkey filling improvements over VMWare, Datto RMM and other remote desktop tools.

    • KDE-1065: KeeperFill for Apps not working over RDP with french keyboard

    KDE-1117: Touch ID with IP restriction and offline access not working

  • KDE-1087: "Unable to connect" error when using KeeperFill for Apps

  • KDE-1118: KeeperFill for Apps with Touch ID and Webauthn hangs on login

  • KDE-1181: Whichever method signed in last (master password or biometric) is only able to be used offline. So if you last signed in with master password, signing in offline with master password works. But if you last signed in with touch id, signing in with touch id offline works.

  • KDE-1132: KeeperFill for Apps using "Generate password" has issues when loading the main desktop app.

  • KDE-1183: Native App Filler clicking tray changes focus

  • KDE-1099: Offline mode not working with IP restriction is activated

  • KDE-1186: SSO user logging in with Biometric is logged out to the wrong screen

  • KDE-1209, KDE-1210: LastPass import improvements and error handling

  • KDE-1213: Crash when setting up the OnlyKey security key hardware device

  • KDE-1217: Searching for Typed records within Shared Folder paths fails

  • VAUL-5092: Copying UID from Safari 15 user interface fails

  • VAUL-5102: Switching to Keeper DNA push method not showing correct screen

  • VAUL-5113: Secrets Manager app details GUI not showing correct permissions

  • VAUL-5107: Allow viewing and copying of Notes if the masking and privacy settings are activated.

  • VAUL-5098: After deleting a security key, toggle of 2FA doesn't visually show the action

  • VAUL-5114: Enforcement policy of re-authentication when revealing password was not working properly

  • VAUL-5153: Web Vault is saving phone number fields with formatting, which caused other client apps to crash.

  • VAUL-5155: Automatically fixes formatting issues from Android record data

  • VAUL-5156: Re-sharing a shared Record Type record that contains file attachments fails

  • VAUL-5154: UI issues when linking to Emergency Access screens

  • VAUL-5144: Multi-select and bulk edit not working properly in List View

  • VAUL-4933: Repaired Avast import

  • VAUL-5157: Import from legacy records missing TOTP field

  • VAUL-5163: QR codes from Okta Verify are showing empty fields

  • VAUL-4949: Can't type spaces when searching through the country names

  • VAUL-5185: Searching not matching on general record types with custom field values

  • https://keepersecurity.ca/vault/previewarrow-up-right
    https://keepersecurity.jp/vault/previewarrow-up-right
    Downloadarrow-up-right
    Downloadarrow-up-right
    Downloadarrow-up-right
    Downloadarrow-up-right

    Browser Extensions

    Troubleshooting and support for the KeeperFill Browser Extensions

    hashtag
    Downloads

    All KeeperFill browser extensions are available at the Keeper download pagearrow-up-right.


    hashtag
    User Guides

    The browser extension user guides are .


    hashtag
    Firefox Plug-in Changes

    hashtag
    Install Any Pending Browser Updates

    Browser extensions generally stop working properly if an update is pending or the browser is out of date, even by one version. Make sure to update your web browser to the latest version and then fully restart your web browser.


    hashtag
    Ensure Only One Extension is Installed

    Ensure only ONE Keeper browser extension is installed. Having two installed causes many issues. Visit Window > Extensions and check your extensions. Don't use multiple password managers at the same time.


    hashtag
    Firefox Plug-in Changes

    We used to have two versions of the Firefox extension in the Add-on store. We removed one of them and disabled the use of old versions. Please ensure that you are using only one extension, and ensure it's the latest one from our .


    hashtag
    Safari Extension Changes

    A new Safari extension is now available through the Mac App store. Old versions of the Safari extension have been disabled. Please ensure that you are running the latest version from our . Make sure to read the latest for step by step instructions.

    If you are unable to login to the KeeperFill Safari extension, a reset of the extension may be required. To reset your KeeperFill Safari extension, follow the below steps:

    • Open Safari and select Safari > Settings

    • From the Keeper extension, select Settings

    • Click on "Clear All Storage"


    hashtag
    Check for Cache Settings

    Ensure that "clear site data when you quit Chrome" is disabled. This can cause errors and vault decryption issues.


    hashtag
    How can I disable Autofill and/or Auto Submit for a specific website?

    To adjust these settings:

    1. Visit the website

    2. Select the Keeper icon within the website login fields

    3. Open the record within the extension

    4. Scroll down to locate the Autofill and Auto Submit toggles

    From the Admin Console, using the , administrators can enforce these settings at the role level:

    1. Go to the Admin Console

    2. Visit the Enforcement Policies for the role to which the user is assigned

    3. Adjust the enforcement policies as needed


    hashtag
    Experiencing Autofill Issues

    If you are having issues with autofill, please make sure you check for the following:

    • Make sure you only have ONE version of Keeper browser extension installed and active.

    • Do not have multiple password managers installed, such as LastPass and Keeper at the same time. This is known to cause conflicts and bugs when filling sites.

    • Make sure to turn off your browser's password manager.


    hashtag
    How to Disable KeeperFill on Specific Sites

    Enterprise customers can disable KeeperFill on sites across the organization. Please be sure to add the site's website address to the KeeperFill enforcement policy for the role in which you reside.

    Admins can disable Keeper-fill on specific websites. This feature supports wildcard characters for matching domain names or URLs. One use case might be to disable Keeper-fill for internal applications that have a lot of form fields. about this policy.


    hashtag
    Check for Conflicting Antivirus, Popup Blockers, Other Browser Extensions

    This is a very common issue with our users. Keeper's advanced security protection and encryption prevents inspection of traffic, otherwise known as "man-in-the-middle". This can sometimes conflict with antivirus, popup blockers and web filtering apps. Make sure to try turning OFF these 3rd party plugins or applications to see if they are causing any conflict with Keeper.


    hashtag
    Don't Block Cookies

    Many websites (including Keeper's browser tools) won't function correctly if you block cookies, block Javascript, block local storage or have any extreme browser privacy settings that prevent our product from running. Please try to set your browser to default settings and see if that resolves the issue you're experiencing.


    hashtag
    Additional Help

    • See our general Browser Extension

    • If you're having autofill issues, see the

    • If you are a website developer looking to integrate, see our page


    hashtag
    Feature Requests

    We love hearing from customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    to post questions, feedback or receive new beta versions.

    Vault Release 17.4.1

    Released on Nov 3, 2025

    hashtag
    Enhancements

    • VAUL-7458, KDE-1799: Fixed an issue causing slow file uploads in KeeperPAM connections.

    • KDE-1790: Integrated with Windows x64 and ARM64 support.

    • VAUL-6783: We implemented the ability to restrict saving TOTP fields from role policy.

    • VAUL-7662: We added numerous KeeperPAM connection parameters listed below.

    • New SSH Connection Parameters

      • Public Host Key

      • Font Name

    • New RDP Connection Parameters

      • Initial Program Execution

      • Session "client name"

    • New Remote Browser Isolation Connection Parameters:

      • Disable audio

      • Audio capabilities (Stereo/Mono, Bit Depth, Sample Rate)

    • New VNC Connection Parameters:

      • Read-only

      • Swap red/blue components

    • New Database Parameters (MySQL, PostgreSQL, SQL Server):

      • Font Name

      • Font Size


    hashtag
    Bug Fixes and Improvements

    • VAUL-7530: Fixed an issue where devices with long names in KSM caused the UI to break.

    • VAUL-7665: Updated the APIs for the security audit data.

    • VAUL-7907: We modified the GovCloud vault to use the GovCloud krelay servers.

    Vault Release 17.5.1

    Feb 19, 2026

    hashtag
    New Features

    hashtag
    Launch Multiple Connections from the Same Resource

    VAUL-7997: You can now start multiple sessions in parallel from a single PAM resource (or Template). The Connection Dock groups all active sessions under the same parent resource for easier management. Each session is handled independently, and ending one session from the connection dock won’t affect the others.

    Highlights

    • Launch multiple sessions from the same resource

    • Templates can also launch multiple sessions without the need to create duplicate resources

    • Connection Dock groups sessions under the resource/template with unique session details

    hashtag
    Getting Started

    To launch multiple connections, open the resource record you want to use. After you click Launch and the first connection is active, a dropdown caret appears next to the Launch button. Use this menu and select Launch New Connection to start another session from the same resource.

    Each new connection is numbered in the order it was opened

    Open Active Connections lets you search for and jump to an active connection for that resource, making it easy to find and return to a session while you’re working in the Vault.

    hashtag
    One-Time Share (OTS) is now supported on GovCloud

    OST-59: This enables secure, so you can both send and receive signed documents, feedback, and sensitive files or information from clients, contractors, legal teams, and others—without requiring recipients to create a Keeper account.


    hashtag
    Bug Fixes and Improvements

    • VAUL-8077: Added new carousel slides for KEPM and KeeperAI to the Vault login screens, with links to their website landing pages.

    • VAUL-8362: Password Zoom behavior has been updated to only be visible when hovering over a revealed password, and is now positioned to the left of the Copy button.

    • VAUL-8301: Fix Import Summary scrollable area

    hashtag
    Web Vault Update Instructions

    • To ensure you're using the latest Web Vault, simply reload the vault login page (or Shift+Ctrl+R to force refresh)

    hashtag
    Desktop Update Instructions

    • If you installed Keeper Desktop directly from the Keeper website, download from:

    • If you installed Keeper Desktop from the Mac App Store or Microsoft Store, visit the store to perform the update.

    Keeper SSO Connect & SCIM

    Troubleshooting and support for Keeper SSO Connect and SCIM

    hashtag
    Keeper SSO Connect

    hashtag
    SSO Login: Unable to Parse the SAML Response from the IDP

    Keeper Unveils New UI for a More Intuitive Customer ExperienceKeeper Security Blog - Cybersecurity News & Product Updateschevron-right
    Restart Safari
  • Enable or disable them as needed

  • Install any pending browser updates. Pending browser updates cause issues with browser plugins.

  • Ensure that "on all sites" is selected in your browser settings under Window > Extensions > Keeper Details screen under "Site access".

  • Learn how to use our Snapshot Tool to quickly report autofill issues by visiting this helpful guidearrow-up-right. The Snapshot Tool can be accessed from the KeeperFill toolbar Options menu (three vertical dots) and selecting Report an Autofill Issue.

  • If you still need help, this pagearrow-up-right describes how to self-troubleshoot and capture information that our support team needs to help diagnose the problem.

  • Send any site-specific autofill issues to [email protected] and we'll fix it.

  • located herearrow-up-right
    download pagearrow-up-right
    download pagearrow-up-right
    Safari user guidearrow-up-right
    Autofill and Auto Submitarrow-up-right
    Read morearrow-up-right
    troubleshooting pagearrow-up-right
    autofill feedback pagearrow-up-right
    Website Developersarrow-up-right
    Join our Slack Workspace
    Cookie Settings
    From the resource record, you can search for and bring an active connection into focus
  • From the resource record, you can terminate all active sessions associated with that resource

  • VAUL-8260: Reorganized component folders to reduce codebase clutter and improve maintainability.

  • VAUL-8326: SSH sessions now immediately transition to a blocked state after a KeeperAI termination command is detected

  • VAUL-8361: Advanced Search now correctly returns records when filtering by attachment after importing files.

  • KDE-1917: Resolved an issue where Windows Hello stopped functioning following the 17.5.0 update.

  • KDE-1938: Resolved an issue that could cause the app to crash on macOS.

  • KDE-1707: Resolved an issue where Enterprise SSO login in Keeper Desktop could fail after entering the Okta IdP domain, showing “SSO Browser login reply was never sent.”

  • KDE-1878: Resolved an issue where Browser Import could show corrupted records in Firefox when using the standalone importer.

  • KDE-1879: Resolved an issue where importing from Opera could fail to import records.

  • KDE-1896: Resolved an issue where the bottom bar overlay in Notifications wouldn’t close when switching between All Notifications and Requests.

  • KDE-1913: Auto-update now works correctly on macOS for apps downloaded from keepersecurity.com.

  • KDE-1874: Resolved an issue where YubiKey + PIN could stop working after auto-logout on the desktop when Wipe was disabled in user settings.

  • KDE-1747: Added prevention against DLL side-loading of Keeper Desktop binaries.

  • KDE-1880: Reorganized component folders to improve readability and maintainability.

  • KDE-1902: Resolved an issue on macOS consumer accounts where the YubiKey PIN prompt wouldn’t appear during login, making the app seem stuck.

  • KDE-1912: Resolved a login error for users with Touch ID + 2FA after upgrading to 17.5.0.

  • OTS-42: We now display the Record Type Icon in the one-time share link.

  • VAUL-7950: Resolved an issue where frozen Chrome tabs would queue requests and replay them on reactivation, causing excessive calls and potential logout loops.

  • VAUL-7703: Vault search now preserves your position in the list. Clearing a search filter no longer scrolls you back to the top after selecting an item.

  • VAUL-7514: Shared Folder details now display correctly after moving a record into a shared folder.

  • VAUL-7939: Prevented duplicate device creation and throttling when repeatedly clicking Copy during KSM device setup.

  • VAUL-8206: Improved the Import Complete modal with refreshed styling and an updated icon.

  • VAUL-8137: Advanced Search dropdowns now exclude options that don’t match the selected filters.

  • VAUL-8136: Vault no longer crashes when opening an imported record with an invalid TOTP code.

  • VAUL-8223: Updated the Browser Import final step to match the intended design.

  • VAUL-7164: Rotation settings now display correctly for directly shared PAM user records, even when the related resource/config records aren't accessible.

  • VAUL-7961: Users with shared application access can no longer attempt to add a new Gateway in the Vault.

  • VAUL-8083: Updated StickyPassword import instructions to reference the correct .dmg and .txt files (instead of XML).

  • VAUL-8082: StickyPassword imports now support both encrypted .dmg and unencrypted .txt exports, with login records correctly mapped during import.

  • VAUL-8246: Consumer users no longer see Enterprise restriction messages for restricted record types.

  • VAUL-8262: Filter chips with long names now truncate correctly with an ellipsis.

  • VAUL-8263: Rotation Settings no longer display “Not configured” when the user lacks access to the associated resource/PAM configuration.

  • VAUL-8279: On Windows, screen readers now correctly read full Romanian words instead of shortened text.

  • VAUL-8283: In KeeperPAM sessions, restoring a minimized full-screen connection now returns to full-screen mode instead of reopening in a smaller window.

  • VAUL-8167: The Rotate action is now disabled for PAM User records in Lost Access within the Trash, preventing unnecessary errors.

  • VAUL-8297: Removed the native "clear" button from the Advanced Search field in Chrome and Safari.

  • VAUL-8300: System notifications now use the Keeper icon instead of the user avatar.

  • VAUL-8302: Added a fallback to handle trickle ICE streaming errors more reliably.

  • VAUL-8303: Copying from the Password Zoom screen now sends the correct copy_password audit event, matching the main view behavior.

  • OTS-49: We updated a number of error messages

  • OTS-50: Fixed font-family on editable inputs

  • OTS-51: Fixed padding for RTL for editable password field

  • OTS-52: Fixed account and routing number display issue in some record types

  • OTS-53: One-time share app no longer shows a blank screen for records missing the custom field.

  • OTS-69: Reveal button no longer accepts multiple clicks in quick succession.

  • OTS-67: One-Time Share links are now blocked from being indexed by search engines (e.g., Google).

  • OTS-55: One-Time Share (OTS) Now Supports WiFi Record Types

  • bidirectional one-time sharingarrow-up-right
    https://www.keepersecurity.com/download.html?t=darrow-up-right
    Launch Multiple Sessions from Same Resource
    Introducing Share Admin
    KeeperFill for Apps v15.0.10: New Features
    Typically, this means you need to update your SAML signing certificate. Follow the guide below for step by step instructions:

    https://docs.keeper.io/en/sso-connect-cloud/certificate-renewalarrow-up-right

    To maintain your connection, IdP Metadata must be updated directly within the Keeper Admin Console. If your organization requires all administrators to sign in via SSO and the current Metadata has expired, preventing Console access, please contact Keeper Enterprise Supportarrow-up-right. Our team will assist you in manually updating the XML file to restore access.


    hashtag
    Enterprise SSO Users Unable to Login

    For security reasons, Keeper will prevent Enterprise users outside of an SSO node from logging in with a federated identity provider. If you have users unable to login with SSO, please ensure that the user is provisioned to the node within the Keeper Admin Console to the SSO-enabled node. To move a user into an SSO node, edit the user and select the node from the dropdown.


    hashtag
    Enterprise End-User's Email Changed

    If your user's email has changed in your identity provider, you can simply add an alias to the user's identity in Keeper. This can be accomplished using the enterprise-user command. For example:

    This command will only allow aliases to be created with reserved domainsarrow-up-right. To learn more about Keeper Commander, visit the documentationarrow-up-right.


    hashtag
    Enterprise Domain is Changing or Has Changed

    If your company is migrating users to a new email domain, Keeper supports enterprise-wide domain aliases to make the transition seamless. Open a support ticketarrow-up-right to request a domain alias.


    hashtag
    SSO User Asked for Master Password

    If you have an SSO user being asked to enter a Master Password:

    • Ensure that the user has been provisioned to an SSO-enabled node

    • Ensure that the user is logging in from the correct data center (USarrow-up-right, EUarrow-up-right, AUarrow-up-right, JParrow-up-right, CAarrow-up-right, GOVarrow-up-right)


    hashtag
    SSO Cloud SP Cert Update

    circle-info

    The SSO Connect Cloud SP Cert has been renewed. If you have enabled strict SP certificate checking on your Identity Provider, you may need to update the Keeper cert in your IdP.

    • Login to Admin Console > SSO node > Provisioning > SSO Cloud > "Export SP Cert

    • Upload the cert to your IdP "SP Certificate" or "SP Signing Certificate" section.

    Notes:

    • This only affects Identity Providers where strict SP cert validation is enabled.

    • This will not affect environments running the Automator service.

    • Customers using Okta and Single Logout (SLO) may need to update the SP certificate.


    hashtag
    SSO to Master Password Migration

    To migrate SSO users to a native master password login, follow the steps below:

    1. Ensure the user has a recovery method (such as a Recovery Phrase) configured before starting the migration.

    2. Move the user to a "Non-SSO" node within the Admin Console.

    3. Direct the user to the login screen and have them follow the "Forgot Master Password" workflow to set their new password.


    hashtag
    Master Password to SSO Migration

    To migrate native master password users to SSO login, follow the steps below:

    1. Ensure the user is assigned to the Keeper Security Password Manager enterprise application within your Identity Provider (IdP).

    2. Move the user into an SSO-enabled node within the Keeper Admin Console.

    3. Upon their next login, the user will be prompted for their master password one final time to bridge the account. From that point forward, they will authenticate exclusively via SSO.


    hashtag
    SSO Cloud Certificate Update

    Keeper's SSO Certificate expires annually in August. The new cert is available by logging into the Admin Console. If you need to update the Keeper SP Certificate, see the step by step instructions here.


    hashtag
    SSO Connect On-Prem Certificate

    Customers running SSO Connect On-Prem must renew SSL certificates on an annual basis. The date depends on when your SSL certificate is expiring. If you are receiving an SSL certificate error, please renew your cert by following the instructions here.


    hashtag
    SCIM Provisioning (Auotmated Provisioning)

    hashtag
    General SCIM Provisioning Issues With Teams and Users

    • Ensure that you have assigned users or groups to the correct SAML application in your IdP.

    • When you invite a user from the Identity Provider or assign a user into a group that has been provisioned, the IdP will send the request to Keeper to either invite a user to join, or to add a user to a team, or to create a team.

    • If the user does not exist yet in Keeper, they will receive an invite to sign up (or they can use just-in-time provisioning).

    • After the user has created their Keeper account, the user will not yet be assigned into a Keeper team until one of a few things happen: (a) Admin logs into the Admin Console > Click on "Full Sync" from the Admin screen (b) A user from the relevant team logs into the Web Vault or Desktop App (c) Admin runs team-approve from Keeper Commander The reason that teams and users can't be created instantly via SCIM, is due to the encryption model and the need to share a private key between users. Sharing an encryption key (e.g. Team Key) can only be performed by a user who is logged in, and has access to the necessary private keys.

    ]Note: The next version of the Keeper Automator service (v3.0) will support the dynamic approvals of teams and team-user assignments. Read morearrow-up-right about the Keeper Automator service.


    hashtag
    SCIM Team User Assignment Delays

    In Keeper, a team that is provisioned must generate the necessary public/private encryption key pair for that team. Similarly, when a user is assigned to a team, the team private key is encrypted with the public key of the user. This way, a user who is assigned team folders in the Keeper vault is able to decrypt the necessary folder keys and record keys. Since Keeper is a zero knowledge platform, this transaction must occur from one of the authenticated client device applications, such as the Admin Console, Vault, Commander CLI or Automator tools.

    When a team or a team-user assignment is provisioned through SCIM, the team creation and the user team assignment goes into a "pending queue". This queue is then processed by the authenticated client side application that either creates the necessary team keys and shares the private keys with the intended users.

    Currently, team creation and team-user assignment occurs when:

    • The Admin logs in to the Keeper Admin Console UI

    • The Commander CLI "team-approvearrow-up-right" command is run

    • The Keeper Automator servicearrow-up-right is deployed (version 3.2+)

    If you need to quickly clear out your pending Team and Team-User assignments, please run the following steps on a periodic basis:

    • Install the Keeper Commander CLIarrow-up-right

    • Log in to Keeper Commander using keeper shell

    • Run the following commands:


    hashtag
    SCIM Provisioning Errors

    SCIM enforces reserved domains on any provisioning request. If you receive an error like "This domain cannot be used for SCIM provisioning" or "Use a different email domain" from SCIM provisioning, This means that you need to request domain reservation for the email domain that is being provisioned.

    Read more about domain reservationarrow-up-right


    hashtag
    Commander Scripting or Coding questions

    Please see the Keeper Commander troubleshooting pagearrow-up-right.


    hashtag
    Contact Us

    If you need help, please open a support ticketarrow-up-right in our ServiceNow system.

    If you need to speak to our support team, simply make the request and we will schedule it during enterprise hours. Please be patient as we coordinate the call.


    hashtag
    Emergency Support

    If you're a enterprise customer having an emergency and need urgent support, use our ServiceNow support portalarrow-up-right. On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".


    hashtag
    Feature Requests

    We love hearing from Enterprise customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    Join our Slack Workspace to post questions, feedback or receive new beta versions.

    enterprise-user --add-alias [email protected] [email protected]
    enterprise-down
    team-approve --team
    team-approve --email
    Scrollback Size
  • Read-Only

  • Remote Command Execution

  • Language/Locale

  • Time Zone

  • Server "keepalive" Interval

  • Terminal Behavior - Backspace Key Send Option

  • Terminal Type

  • Clipboard usage

  • See

  • Keyboard Layout
  • Timezone

  • Enable multi-touch

  • RDP Administrative Console

  • Display Width/Height/Resolution

  • Color Depth

  • Force lossless compression

  • Read-only

  • Resize Method

  • Clipboard settings

  • Line ending normalization

  • Remote App Execution - Program, Working Directory, Parameters

  • Device Redirection for audio input/output

  • Printing support

  • Enable Wallpaper

  • Enable theming

  • Enable font smoothing

  • Enable full-window drag

  • Enable desktop composition (Aero)

  • Enable menu animations

  • Disable bitmap caching

  • Disable off-screen caching

  • Disable glyph caching

  • Load Balancing cookie

  • Pre-connection PDU (Hyper-V) RDP Source ID and Preconnection Blob

  • SFTP default upload directory

  • SFTP Keepalive interval

  • See

  • Force lossless compression
  • Encoding

  • Cursor local/remote setting

  • Color depth

  • Audio enable

  • Text Encoding

  • VNC Repeater host/port

  • See

  • Maximum Scrollback Size
  • Read-only

  • VAUL-5424: Fixed an issue where legacy usernames did not display the primary username correctly.
  • VAUL-7802: Implemented a sticky footer so that save options remain visible without requiring users to scroll to the bottom of the page.

  • VAUL-7927: Improved reliability when downloading and decrypting PAM session recordings by updating the decryption process to use a new, more secure salt value method.

  • VAUL-7945: Added some RBI Connection Parameters.

  • KDE-1750: Confirmed MacOS Tahoe (Version 26) compatibility.

  • VAUL-7800: Fixed an issue where a shared folder remained visible after team removal if it was assigned to multiple teams and the user did not belong to the remaining team.

  • VAUL-7431: Fixed progress bar when usage exceeds limits for file attachments.

  • VAUL-7496: Enhanced the error message displayed when a Kubernetes connection fails to provide more explicit guidance.

  • VAUL-7780: Made the database "type" a required field when launching a connection with an ephemeral account.

  • VAUL-7821: We fixed a Vault scroll bar issue.

  • VAUL-7856: Fixed an issue where the Session Activity filter did not update correctly when the Risk Score option was unchecked.

  • VAUL-7871, 7876, 7858: We fixed several PAM AI bugs.

  • VAUL-7897: Fixed an issue where “Enable Remote Browser Isolation” was not automatically selected when creating a new RBI connection, causing users to manually enable it after setup.

  • VAUL-7809: Disabled partial selection and click-to-copy functionality for the username and custom fields.

  • VAUL-7919: Fixed a problem where resizing the remote window with the +/- buttons caused parts of the screen to become unclickable.

  • VAUL-7928: Fixed a minor typo in the Gateway’s Docker Compose AppArmor profile name for improved consistency.

  • VAUL-7935: Fixed a bug that caused rotation schedules to run on the wrong day in Monday-first locales (like Europe/UK).

  • VAUL-7942: Fixed an issue where records created via right-click or the Create New button were saved outside the selected folder or shared folder (SF).

  • VAUL-7944: Fixed a problem where the Save button didn’t re-enable after closing an error message.

  • VAUL-7884: Fixed an issue where the Vault did not display more than two queued discovery jobs.

  • KDE-1693: We fixed an issue with \ or / in the download file.

  • KDE-1788: Fixed Snap Store install errors.

  • KDE-1734, 1729: Fixed Hotkey issues

  • KDE-1685: Fixed an issue where passwords imported from Windows appeared empty when using the latest version of Chrome.

  • KDE-1780: Fixed an issue where Keeper Desktop did not start correctly after proxy authentication was completed.

  • KDE-1794: Fixed an issue where filling into a macOS Parallels VM caused a crash when certain characters were entered.

  • KDE-1797: Fixed an issue where new Chrome windows could not be opened on macOS when KFFE was active.

  • KDE-1793: Fixed an issue on macOS where using the hotkey Cmd + Shift + P to fill passwords did not work when targeting a password field, but worked in non-password fields.

  • KDE-1803: Fixed an issue where the TOTP field from BitWarden CSV was not importing.

  • KDE-1804: Fixed a problem where Bitwarden CSV imports with multiple URLs only saved the first URL in Keeper.

  • Keeper Forcefield 1.1.0arrow-up-right

    Read Me First

    Most common troubleshooting issues across all Keeper applications

    hashtag
    System Status

    circle-check

    Monitor the Keeper infrastructure system health here:


    hashtag
    User Guides

    All Keeper end-user and Enterprise documentation can be found at the .


    hashtag
    Syncing or Data Issues

    If information is not sync'd or out of date, you may just need to run a Full Sync.

    • From the web vault or desktop app, click on Full Sync from the lower right.

    • On iOS and Android, go to the Account tab > Sync > Sync Now.

    • On the browser extension (17.2+), click on Full Sync from the main menu.


    hashtag
    Autofill Issues

    Keeper has implemented a "Snapshot Tool" which helps customers solve Autofill issues quickly. This process allows us to deploy autofill fixes within the same day.


    hashtag
    Email Invites Not Sending Custom Template

    For security reasons, custom email invitations cannot be sent to users if the domain has not been reserved by the customer. To learn about Domain Reservation please .


    hashtag
    Upgrade to the Latest Version

    Many issues can be resolved by updating your Keeper app. Install the latest Keeper version from your App Store or the .


    hashtag
    Check Your System Clock

    If you are experiencing an issue where the Two-Factor (TOTP) codes are different between your mobile and desktop devices, this is usually caused by the time difference between your devices. Ensure that your device time and date is set to "Automatic". If the times are different by even a few seconds, this will cause different codes to appear on different devices.


    hashtag
    Face ID or Touch ID Stopped Working

    If biometrics such as Face ID / Touch ID stops working, simply login to Keeper with your Master Password (or SSO), then visit the Settings screen and turn biometric login OFF and ON. This should resolve any biometric login issues.


    hashtag
    Forgot Master Password?

    Consumers: Keeper employees do not have access to your Master Password or Recovery Phrase, and we cannot reset it for you. If you have forgotten your Master Password, please try using our Account Recovery feature by visiting the "Need Help" > "Forgot Master Password" option on the Keeper login screen.

    Without your Master Password or recovery phrase, your records cannot be decrypted. If you don't have recovery setup for the Keeper account at all, unfortunately account recovery will not be possible.

    If you have tried all possible Master Password and Account Recovery options and are still unable to login to Keeper, we can delete your account so that you can start over. Please contact the support team for assistance.

    A very common issue when a user is unable to login, is that people could have multiple Keeper accounts (perhaps from different email addresses), or maybe a typo in your email address. If you think that's a possibility, please contact our support team and we will assist you.

    Enterprise Customers:

    Biometric Reset via Mobile Device

    Check whether the user can log in to the Keeper mobile app using biometrics. If they can, they should reset their Master Password directly in the mobile app using biometric authentication.

    Account Recovery Method

    If the user has an Account Recovery method configured, have them follow the recovery prompts to their Master Password.

    Transfer Account (Blank Vault Method)

    If the user's account is eligible for transfer, use the Transfer Account feature with the blank-vault method to recover the user’s data.

    Blank Vault Method:

    1. Add a new user to your console using an email address that is not currently in use. This will serve as the blank vault. The blank vault will need to be in a role with the transfer account feature enabled within the enforcement policies.

    2. Activate the blank vault and accept the transfer account agreement pop-up.

    3. Transfer the user's credentials into the blank vault. Once the transfer is complete, the user's original account will be automatically deleted.

    Please be aware that when you transfer a user's credentials to another account within your enterprise, the recipient will be able to differentiate their records from the newly transferred ones. However, the recipient cannot transfer the transferred folder to someone else in the organization without transferring their own owned records as well.

    to help you successfully transfer a user's account.

    If none of the above options work contact Keeper Support to determine whether any alternative recovery options are available.

    • Phone: 312.226.4782

    • Email:


    hashtag
    2FA Issues (Lost phone or Authenticator)

    Consumers: If you changed phones or do not have access to your two-factor authentication device, please contact Keeper support and we will assist you in resetting your Two-Factor Authentication settings. For individual and family users, please open a consumer support ticket and we will assist you.

    Enterprise Customers: Please contact the Keeper Administrator at your company. Your Keeper Admin can disable your 2FA. For Keeper Administrators, please open a enterprise support ticket and we will assist you.


    hashtag
    How to Stay Logged In Longer

    Keeper Web Vault, Desktop App and Browser Extensions have been updated with the "Stay Logged In" feature for all customers. To activate this feature open your browser extension > settings > Stay Logged In and turn the setting "ON". If it's already on, you may want to turn the setting OFF and ON. Then, logout and login to the browser extension. Learn more about "Stay Logged In" here:


    hashtag
    Account Recovery Phrase Setup

    Upon initial vault login, new users will be prompted to set up Account Recovery. Click Generate Recovery Phrase to begin.

    Once your recovery phrase has been generated, be sure to store it in a safe place. For added convenience, you will be given the option to copy or download it. Check the box to acknowledge you have stored it in a safe place and click Set Recovery Phrase to complete the setup.

    triangle-exclamation

    Please note that if you forget your master password and lose your recovery phrase, you will not be able to login to your vault and Keeper Support will be unable to help you regain access.


    hashtag
    Forgotten Master Password & Account Recovery

    After their initial login, users are asked if they would like to set up Account Recovery using an account recovery phrase. This is especially important if you forget your Master Password during the account recovery process which is based upon an account recovery phrase, backup verification code (sent via email) and Two-Factor Authentication code (if enabled).

    circle-check

    In addition to enabling an account recovery phrase, we recommend turning on Keeper's Two-Factor Authentication feature from your account's "Settings" menu.

    Users who have signed into Keeper after August 2015, will automatically have Account Recovery enabled. To initiate Account Recovery, simply open Keeper through the Web Vault, iOS, Android or Desktop app and from the login screen, click/tap Forgot Password. Keeper will then walk you through a few steps to change your Master Password and recover your account. These steps will include a series of prompts requesting the following actions:

    • Enter your email address to initiate the account recovery process

    • Enter a backup verification code

    • Enter your account recovery phrase


    hashtag
    How can I contact Enteprise Support?

    Email Reach the Keeper Enterprise Support Team by emailing [email protected].

    Live Chat Keeper Administrators can start a live chat for themselves or on behalf of their users by visiting the Keeper Support and selecting the chat bot option located in the lower-right corner.

    Phone Support USA: +1 312-226-4782 APAC (Business): +353 21 237 5250 EMEA (Business): +353 21 237 5250

    Support Portal Administrators can open a ticket or request access to the ticketing portal by emailing Support or by submitting a ticket directly .

    Support Call Scheduling a support call or a screen-share session is an exclusive benefit for users on the Platinum Support Plan. If you have this plan, simply request a call within your support ticket. For all other plans, support is provided via our ticketing system and chat.


    hashtag
    Enterprise Ticketing Portal Access

    You can view and manage your organization’s Keeper Support tickets through our Enterprise Portal.

    To access the , select “Forgot Password?” on the login page. Your username is your email address.

    If you do not receive the password reset email, please contact Support or open a new ticket to request portal access.

    Email: [email protected]


    hashtag
    Platform-Specific Troubleshooting Guides

    Vault Release 17.0.0

    Released on February 6, 2025

    circle-info

    If you installed Keeper Desktop from the website, this version will not auto-update and you'll need to install it manually from the Keeper website. https://www.keepersecurity.com/download.htmlarrow-up-right If you installed Keeper Desktop from the Apple or Microsoft app stores, it will update automatically.

    hashtag
    Enhancements

    • KDE-1400: RSA to EC Security Updates

    • VAUL-6152: RSA to EC Security Updates

    • VAUL-7031: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid. Backup codes are now copied without spaces.

    • VAUL-7029: The "Add Device" and "Provision Gateway" options are now only visible in View mode, not Edit mode.

    • KDE-1415: We've fixed an issue where incorrect OS keys were displayed in shortcut definitions.

    • KDE-1245: All alert models have been updated to follow the new design guidelines.

    • KDE-1240: We've fixed an issue where an incorrect error message was displayed when moving subfolders between shared folders.

    • KDE-1547: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid.

    hashtag
    Other Updates

    • VAUL-6899: Updated linked personal accounts to indicate the family admin, helping users identify the correct account to log into for managing members.

    • VAUL-6590: We have allowed offline login with all 2FA durations as a separate setting in the app.

    • VAUL-7061: We removed legacy bundle support to improve build efficiency.

    hashtag
    Bug Fixes

    • VAUL-6437: Fixed an issue where custom templates with numeric names (without periods) appeared at the top of the list instead of under the "Custom Template" section.

    • VAUL-6275: Fixed an issue ensuring that Record Type Sorting aligns with the modified list.

    • VAUL-6889: The user gets a clear error message when the share request fails.

    Vault Release 16.10.10

    Released on Nov 16, 2023

    hashtag
    Features

    • VAUL-6175: Added thousands of popular website logos to the Vault user interface.

    Website icons

    The implementation of website logos preserves full zero knowledge encryption and privacy. The entire library of logo files are embedded within the vault application.

    • KDE-1403: Optional SSO login method through default web browser

    If the new "Use Default Browser for SSO" option is enabled from the desktop application menu, the user will be routed to their default web browser on the device in order to login with their configured identity provider.

    The primary reason for implementing this feature is to support SSO identity providers who support FIDO2 security keys or other authentication methods that are not technically supported from the Keeper Desktop embedded browser.

    For Admins who would like to enforce this to all desktops, a new item called UseDefaultBrowserSSO is available.

    • DR-265: Ability to specify time zone and hour of day for scheduled password rotations

    • VAUL-5620: Enhancements for Recently Deleted page

    • VAUL-5686: Security Audit screen now has a "Last Change" column

    • VAUL-6138: New "Advanced" settings menu which contains the following features:

    hashtag
    Bug Fixes

    • VAUL-6135: Currently only owner and share admin can update permissions, add/remove users, set/update expiration timers. User with can_share right should be also able to manage users up to its own level of privilege.

    • VAUL-5659: Multiple Record Selection is not working in Deleted Items

    • KDE-1421: Records created while in offline mode are not syncing properly when going online

    hashtag
    Security Updates

    • VAUL-6170: Security improvements using CryptoKey storage on Firefox browsers for device keys

    • VAUL-6179: Convert ECIES-encrypted Record Keys to Data Key-encrypted Record Keys upon login.

    • KDE-1406: New desktop app installs will now store device private keys in the Apple Keychain or Windows Credential Locker instead of Chrome CryptoKey local storage, for improved security for native app installation. Existing keys will not be transferred until a reset takes place.

    hashtag
    Other Improvements

    • KDE-1417: When filling into a remote desktop session using mstsc.exe, incorrect characters are used with a different keyboard layout than the host machine.

    • VAUL-6219: Improved the automatic team-user approvals upon logging in. This new method handles a large number of pending users.

    • VAUL-6200: When viewing a deleted record, file attachments cannot be downloaded until the record is restored.

    hashtag
    Known Issues

    • Migrating from LastPass using Okta SSO saying "Import Error"

    In the Okta Admin portal under Applications, locate your "LastPass Okta Login" application. Under the "Sign-in redirect URIs" section, add the following URI: http://localhost/ then click "Save".

    VAUL-7064: We updated the grid view icon.

  • KDE-1529: We updated the Windows desktop build to support Visual Studio 2022 and target it in the GitHub Actions workflow.

  • KDE-1532: Upgrade Electron framework to version 32.1.0 31.7.2 33.2.0.

  • KDE-1488: We've enabled context isolation security for the desktop vault/tray renderers.

  • KDE-1546: We've fixed an issue preventing Windows desktop builds from completing in GitHub Actions

  • KDE-1548: We've added a new setting to allow offline logins with all 2FA durations.

  • KDE-1550: We've fixed an issue with upload job caching by adding the Cache-Control: no-cache header.

  • KDE-1558: We've updated the Windows Credential Locker, Windows Hello, and App Model features.

  • KDE-1536: We fixed a recent Keeper outage caused by NGINX overload.

  • VAUL-6908: Prevented users restricted from sharing or receiving from creating shared folders.

  • VAUL-5874: Removed the period from the title on the empty Vault Splash Page.

  • VAUL-5958, VAUL-5959: Implemented functionality improvements for My Vault, Record view, and Security Audit page, addressing customer expectations for dark mode, though some visual inconsistencies and color contrast requirements

  • VAUL-6760: Fixed an issue where the Country field displayed incorrect or empty values when switching between Address records.

  • VAUL-5702: Changing the default field type now updates the label accordingly.

  • VAUL-6438: Standard records now appear in the top section and custom record types in the bottom section, each sorted independently with numerical first, followed by alphabetical.

  • VAUL-6436: Resolved an issue where the letter 'g' was cut off in custom templates.

  • VAUL-6758: Fixed an issue where the default password complexity wasn't saved during the initial rotation setup.

  • VAUL-6972: Fixed an issue where restored records did not update security scores until the user logged out and back in.

  • VAUL-5949: Fixed an issue where the Save button in Secrets Manager remained disabled after deleting a Gateway.

  • VAUL-5862: Fixed an issue preventing users from deleting a Gateway in Secrets Manager if multiple Gateways existed.

  • VAUL-5847: Fixed an issue where the sort header within the Secrets Manager did not reflect the selected sort option.

  • VAUL-6635: Fixed an issue where the tooltip did not describe the cron format, adding an explanation and examples for proper usage.

  • VAUL-6988: Fixed the update with the Login Buttons

  • VAUL-6983: Fixed an issue that restricted Unlimited, FP, and Trial users from accessing offline mode via the login page.

  • VAUL-6941: Fixed an issue where unreferenced records weren't deleted during sync down.

  • VAUL-6911: Fixed an issue where removing a record link deleted the linked record despite other existing references.

  • VAUL-6961: Resolved an issue where removing direct access to an owned record unintentionally removed ownership.

  • VAUL-6990: We've resolved an issue where uploading a file larger than 100MB would block the upload of other selected files.

  • VAUL-6977: We fixed the 'Internal Error' issue during offline logins.

  • VAUL-6995: We fixed the issues where discard changes are generated twice.

  • VAUL-6998: We fixed an issue where gateways were displayed randomly. They are now sorted numerically and alphabetically.

  • VAUL-6947: We've resolved an issue where records were unintentionally removed from shared folders during the sync-down process.

  • VAUL-7012: We fixed an issue with incorrect toast messages when trying to create duplicates without permission.

  • VAUL-6881: We've fixed an issue where breach watch results were only sometimes being returned when expected.

  • VAUL-6534: We've resolved an issue causing "bad request" errors during security data updates specifically for the vault client.

  • VAUL-6962: We've resolved an issue where records created in the BE weren't appearing in the BW.

  • VAUL-7019: We have fixed the issue with the secrets manager not showing up in SF/Records

  • VAUL-6750: Vault now uses the encrypted session token returned by accept_enterprise_invite instead of the previous session token.

  • VAUL-7025: We've fixed an issue where records with the password "hasOwnProperty" were causing various client crashes.

  • VAUL-7018: We fixed an issue where selecting "all" in an empty shared folder incorrectly showed "1 selected." Now, it correctly shows "0 selected" and unselecting the box removes the message.

  • VAUL-7036: We've fixed an issue where the Grid View Record Context Menu button was incorrectly positioned when focused.

  • VAUL-7039: We fixed an issue where the file_attachment_uploaded audit event was incorrectly triggered for file removals.

  • VAUL-7045: We've fixed an issue where vertical dividers were missing from the Security Audit.

  • VAUL-7053: We've fixed an issue where the UI didn't display throttle messages when entering incorrect passwords multiple times in offline mode.

  • VAUL-7059: We've fixed an issue where the cursor focus was incorrect after entering a password in the MP entry modal.

  • VAUL-7060: We've fixed an issue where the Offline Duration Setting required a browser refresh to take effect.

  • VAUL-7050: We've fixed an issue preventing MSPs from logging in offline.

  • VAUL-7058: We've fixed an issue where Free Trial users without a BW subscription encountered a "bad request" error when scanning records with strong passwords.

  • VAUL-7057: We've fixed an issue where the last scan date was incorrectly displayed as "N/A" in BW.

  • VAUL-7065: ​​We've fixed an issue causing incorrect font display on the web vault.

  • VAUL-7068: We resolved an issue where the "Work Offline" button was incorrectly displayed for users without offline access, even after clearing the browser cache or logging out

  • VAUL-7076: We've fixed an issue causing the error "No key for encryption of security data" in Vault.

  • VAUL-7074: Sharing invitations can now be sent without errors.

  • VAUL-7080: We've fixed an issue preventing update_security_data from working on ECC-only enterprises.

  • VAUL-7079: We've fixed an issue causing several missing key warnings.

  • KDE-1346: We've fixed an issue with misaligned edit icons for KFFA hotkeys.

  • KDE-1423: We've fixed an issue where the Topsite list wasn't narrowing correctly as users typed in the title field

  • KDE-1428: We've fixed an issue preventing users from moving owned records into shared folders.

  • KDE-1500: We've fixed an issue where incorrect notifications were displayed for oversized file uploads

  • KDE-1048: We've fixed an issue where the Region Selector was cut off at the bottom in KFFA.

  • KDE-1538: We've fixed an issue where resetting Keeper from the Help Menu didn't clear the desktop app cache

  • KDE-1539: We've fixed an issue with the localization of the access expiration banner.

  • KDE-1544: We've fixed an issue preventing password re-entry in KFFA.

  • KDE-1545: We've fixed an issue where the offline edit indicator persisted after reconnecting to the server and logging.

  • KDE-1540: We've fixed an issue preventing users from downloading large file attachments, which caused the app to stall

  • KDE-1549: We've fixed an issue preventing Direct Import from LastPass due to a JavaScript error.

  • KDE-1551: We've fixed an issue preventing the import of simple phone data from LastPass for non-address records.

  • KDE-1552: We've fixed an issue that prevented new Enterprise Admin accounts from using a fresh install of KDE.

  • KDE-1478: We've fixed an issue where the "Securely Upload to My Vault" option did not clear after a drag-and-drop operation.

  • KDE-1553: We updated the macOS build environment from macOS 12 to macOS 13 in the build-desktop-vault.yml workflow.

  • KDE-1556: We updated the download links for the desktop app to point to the new CloudFront distribution.

  • KDE-1559: Fixed QA download page: now shows versions and directs users to the latest build.

  • KDE-1565: We've fixed an issue preventing KSM device configurations from being generated.

  • Search overlay controls

  • Syncing delay to improve overall performance in high volume enterprise tenants

  • Showing numbering in the record list view

  • KDE-1373: KeeperFill for Apps Window opens in wrong location when tray is not in visible dock

  • KDE-1395: Memory leak on Mac App from repeat launching through cmd+tab, clicking the dock item, etc. This leads to unintended event handlers being enabled.

  • VAUL-5675: User is not able to delete forever a Lost Record shared via Shared folder from Lost Access

  • VAUL-5737: Missing 'Add to My Vault' button for records details panel in Lost Access tab

  • VAUL-6009: If you have a role enforcement set to restrict all record types in the vault, the import option during onboarding is now hidden.

  • VAUL-6083: Filename not being added to title when drag-and-drop attachment in Chrome/Edge

  • VAUL-6204: Import from Thycotic / Delinea Secret Server missing notes field and SecretTemplates section

  • VAUL-6213: Record title auto-suggestion not working when there are multiple words

  • VAUL-6214: Date formatting error when Arabic language selected

  • KDE-1411: On Mac, keyboard layout is cached on first use. When filling a password with KeeperFill for Apps on Mac, a map of key codes to character mappings is generated and cached. This cache is not released when the keyboard layout changed with the app running, resulting in incorrect key codes being sent for some characters.

  • KDE-1422: The "Create Record" hot key is turned on when the app is initially not in focus, preventing that hotkey from being used by other apps.

  • KDE-1385: KeeperFill for Apps is not able to detect secure fields when a record uses the "native app filler" field type.

  • KDE-1426: After importing files, KeeperFill for Apps doesn’t show the records. This leads to assertion failures with BreachWatch data which require record keys to decrypt the data.

  • KDE-1412: Upgraded Electron platform to v26.2.4. This was actually released to production already in version 16.10.9 on a standalone basis.

    DR-348: Hide or gray out "Rotate now" button on modifying rotation settings

  • VAUL-5926: Shared Folder and Direct Share screens will only list those Share Admins who are explicitly shared to the object, to reduce confusion.

  • VAUL-5738: Allow free trial users to view record history

  • VAUL-6128: Show long folder names on-hover

  • KDE-1399: Return focus to previous app/window when KeeperFill for Apps is closed

  • 508 Compliance: Over 20 tickets related to 508 compliance / ergonomics improvements

  • VAUL-5875: Create Duplicate UI changes to support various use cases:

    • If privacy screen is enabled, do not allow duplication

    • If a user duplicates a record that has linked records such as address or payment records, allow duplication of the record, disallow duplication of linked records, and present a notification: “The record you are duplicating contains links to other records. The linked records will not duplicated.”

    • If a user duplicates a record that has attachments, allow duplication of the record, disallow duplication of the attachment, and present a notification: “The record you are duplicating contains attachments. Attachments will not be duplicated. In order to duplicate attachments, download the attachment from the original record and re-upload to the newly created record.”

  • KDE-1414: New font type "Outfit" to replace "Overpass". This is Keeper's new font that is being slow-rolled across all platforms and interfaces.

  • Enterprise Configurationarrow-up-right
    Use Default Browser for SSO
    specify time zone and hour of day
    Advanced Settings
    With the original account deleted, re-add the user's email address to the console. This will allow them to set up a new master password and recovery method.
  • Transfer the credentials from the blank vault back to the user, ensuring they retain their data while keeping all infrastructure intact.

  • Enter your Two-Factor Verification code (if enabled)
  • Enter a new Master Password

  • Android
  • Enterprise Admin

  • https://statuspage.keeper.io/arrow-up-right
    follow this linkarrow-up-right
    Keeper Websitearrow-up-right
    resetarrow-up-right
    [email protected]envelope
    https://docs.keeper.io/user-guides/tips-and-tricks/stay-logged-inarrow-up-right
    pagearrow-up-right
    herearrow-up-right
    B2B ticketing portalarrow-up-right
    Open a ticketarrow-up-right
    KeeperFill Browser Extensions
    Vault & Desktop App
    iPhone & iPad

    Web Vault & Desktop App

    Troubleshooting and support for the Keeper Web Vault and Keeper Desktop App

    hashtag
    Downloads

    All Keeper Desktop apps are available at the .


    Vault Release 17.5.0

    Released on Jan 8, 2026

    hashtag
    Features

    hashtag
    VAUL-7049: Notification Center

    Logo
    hashtag
    User Guides

    Web Vault and Desktop App user guides are located herearrow-up-right.


    hashtag
    Desktop App Login Errors

    If you login to Keeper using a biometric (Windows Hello or Touch ID) and you are receiving an error:

    • Login using a Master Password

    • Visit the Settings > Security screen

    • Disable then re-enable Biometric login (Touch ID or Windows Hello)


    hashtag
    Perform a Full Sync

    From the mobile apps, go to the Account screen > Sync > Sync Now. This performs a "full sync" of all the data and ensures that anything missed in the normal sync process is caught. The latest Web Vault and Desktop App also have a "Sync" feature along the bottom of the screen.

    Quick Sync and Full Sync

    hashtag
    Clear Cache / Reset the Vault

    Clear cache on your web browser or open Incognito Mode to try and login. If this works, you should just reset your Keeper app by visiting the Web Vault on your respective data center:

    • https://keepersecurity.com/vault#resetarrow-up-right (US)

    • https://keepersecurity.eu/vault#resetarrow-up-right (EU)

    • https://keepersecurity.com.au/vault#resetarrow-up-right (AU)

    • (CA)

    • (JP)

    • (GOV)

    By appending #reset on the end will force Keeper to clear local data. Refresh the page a few times and this should clear things out.


    hashtag
    Keeper Import Error

    If you receive an "Unexpected Error" or "Unable to connect" when performing an import using the Keeper Import tool, this is typically due to a conflict with installed Antivirus or Proxy software. If this happens for you, please try importing by installing the Keeper Desktop application instead.

    If you are an Enterprise Admin and you have control over the end-user firewall settings, please make sure that the user's desktop applications can communicate with Keeper Security's endpoints (e.g. keepersecurity.com, keepersecurity.eu, keepersecurity.ca, keepersecurity.jp, keepersecurity.com.au or govcloud.keepersecurity.us depending on the region).


    hashtag
    Web Vault Login Issues

    If you are experiencing issues with logging in, you simply may need to clear the Keeper cache in your browser following the steps below:

    Chrome:

    1. Open the Web Vault

    2. Click on "View" > "Developer" > "Developer Tools"

    3. Click on the "Application" tab > "Clear Storage" > then click on “clear site data”

    Edge:

    • Clear Browsing data (Browsing history, Download History, Cookies and other Site Data, Cached Images and Files, Hosted App Data)

    Firefox:

    • From Privacy & Security page > Clear Data (Cookies and Site data, Cached Web Content)

    Safari:

    1. Go to Preferences > Advanced > select checkbox "Show Develop menu in menu bar"

    2. Then select "Develop" > Empty Caches

    3. Select "Safari" menu then "Clear History" and select All Time


    hashtag
    Restorations

    Enterprise customers that require recovery assistance due to accidentally deleting records, folders, shared folders, or users, Keeper’s Support Team may be able to assist within a 30-day recovery window. Please note that this window represents the maximum timeframe for potential recovery and does not guarantee that a restoration will be possible.

    All restoration requests must first be evaluated by our engineering team to determine feasibility. Requests are reviewed on a case-by-case basis and are not guaranteed until an agreement is made.

    Deleted records and shared folders

    If you notice that data is missing this is either due to the data being deleted or unshared with you, please be sure to check the following for possible restorations back to the vault.

    Deleted Items

    • Any records that you own and may have accidentally deleted will be stored here until they are permanently cleared.

    Lost Access

    • This section contains records that you own and shared with others, but were subsequently deleted by a recipient or removed from a shared location.

    Shared Folder Contents

    • If a record you own was deleted from within a Shared Folder, it can be located and restored from this area.

    The Deleted Items bin only displays records that you personally own. If you still cannot find the missing information, please contact the original owner of the data. They will need to reshare the record or folder with you to restore your access.


    hashtag
    Enterprise Sharing Errors

    To edit or share a record, you must be the record’s owner or creator, or a Keeper administrator with share admin permission. If you don’t have these permissions, contact the record’s owner or a Keeper administrator to request access.

    To identify the record’s owner, follow these steps:

    1. Log in to your Keeper vault.

    2. Select the record within the shared folder.

    3. Select the “Share” button or the Information icon (both are located at the top of the record).

    Please note that having the “Can Manage Records” permission on a shared folder does not allow a user to edit or share individual records. Record-level permissions are separate from folder-level permissions and function independently. To edit or share a record, it must be explicitly set to “Can Edit”, “Can Share”, or “Can Edit & Share.” Also, moving a record is treated as sharing, so records with view-only permissions cannot be moved.

    Shared Folder Settings are configured in order to easily set folder permissions for all users within the folder. These are selected upon the initial creation of the Shared Folder, but you can change them at any time by accessing the shared folder settings. Click the dropdown arrows to set the Record and User Permissions for the folder. Please note that newly created records inherit these permissions when adding users or records to the shared folder.

    "Share Admins" hold user and record privileges for shared folders they have access to. A Share Admin can manage shared folder content, modify default permissions, add/remove records and users, and even delete the shared folder. They can also change record permissions for records owned by users under their management. This includes editing, sharing, and ownership transfer.

    For a deeper understanding of shared folders, teams, and Share Admin roles, consult our detailed documentation:

    https://docs.keeper.io/en/enterprise-guide/sharing/folders#shared-folderarrow-up-right

    https://docs.keeper.io/enterprise-guide/teamsarrow-up-right

    https://docs.keeper.io/enterprise-guide/share-adminarrow-up-right

    If you are a share admin but are unable to share or edit a record, contact the Keeper Enterprise Support Team.


    hashtag
    Exporting

    Please note that you can exportarrow-up-right your data from Keeper in plain text using four formats: PDF, JSON, CSV, and KDBX.

    • PDF: Will need to be converted to a CSV, JSON, or KDBX file in order to be re-imported in the vault.

    • JSON: Retains folder structure and TOTP codes, but excludes files/photos.

    • KDBX: Includes files/photos and TOTP codes, but all folders must be imported as either shared or non-shared folders.

    • CSV: Retains folder structure and TOTP codes, but excludes files/photos.

    To export your data please log into your vault > select the email address in the upper right corner > select settings > select the export option.

    Exporting data within your organization may be restricted by a Keeper Administrator.


    hashtag
    Upload Limits

    Keeper supports the following upload limits for the web vault and desktop app:

    • Web Vault: Up to 100 MB

    • Desktop App: Up to 5 GB


    hashtag
    Installation Error 0x8007000D on Microsoft Store

    If you receive this error when updating or installing the Desktop App on Windows, follow the instructions below:

    1. 1Browse to "C:\Windows\SoftwareDistribution\Download" and delete the contents of the folder.

    2. Press Windows key + X > Click Command Prompt (Admin) then type "wuauclt.exe /updatenow". Hit <enter>.

    3. Open Control Panel > Windows Update and Windows 10 should begin downloading.

    4. Press Windows key + X

    5. Click Command Prompt (Admin)

    6. Enter at the prompt OR Copy and Paste these one at a time (hit enter after each entry): Dism /Online /Cleanup-Image /CheckHealth Dism /Online /Cleanup-Image /ScanHealth Dism /Online /Cleanup-Image /RestoreHealth

    7. Run the Windows update Troubleshooter

    8. Press “Windows + X” and select Control panel.

    9. In the search box, type troubleshooter, and then click Troubleshooting.

    10. Under System and Security, click Fix problems with Windows Updates.


    hashtag
    Getting a 403 Error or Unable to Load Website

    If you are unable to access Keeper's website or Vault from your device with a "403 error", your IP address is being blocked. Keeper automatically blocks IP Addresses that have a "low reputation score". This list of IPs is maintained by a dedicated threat research team at Amazon AWS, and as such we do not have visibility into exact reasons why an IP is placed on this list. To resolve the issue:

    • Open the below URL on a computer which is generating this error: https://checkip.amazonaws.comarrow-up-right

    • Your external IP address will be provided on the screen.

    • Please send the IP to the Keeper support team support team via our support page at keeper.io/freesupportarrow-up-right and we'll check into unblocking it from our WAF.

    • Enterprise customers who need a range of IPs to be unblocked can provide a CIDR.


    hashtag
    I'm being asked for a PIN with my FIDO2 Security Key

    We're constantly improving Keeper's security to keep our users safe. Starting with Backend API Version 16.10.0, if you're using a FIDO2 Yubikey device for two-factor authentication (2FA), you might need to enter a PIN associated with your device when you log into Keeper. This is a FIDO2 feature called "user verification" that our system uses to check if the PIN is set up on your device.

    If you'd rather not use a PIN with your FIDO2 Yubikey device, you can remove it using the Yubico Manager apparrow-up-right. However, keep in mind that if you reset your Yubikey device, you'll have to re-register your key with Keeper and any other application that you use with your key.

    We will add a feature soon to allow consumers to decide whether or not user verification is required. This will be added to Vault version 16.10.4.

    For our enterprise customers, we're planning a role enforcement feature that requires user verification (by setting userVerification response to "required"). Until then, the system will respond based on your device setup.


    hashtag
    Ubuntu Linux GPG Key

    Keeper's signing key for the Ubuntu Linux version of Keeper Desktop has expired, so we extended the expiration and pushed up a new GPG public key. This key is hosted at the below location:

    https://keepersecurity.com/desktop_electron/Linux/signing.pubarrow-up-right

    We've also submitted this latest GPG public key to the keyserver.ubuntu.com keyserver.

    Customers can pull down the latest key by running the below command and then retrying:


    hashtag
    Keychain Password Import

    The Mac Store version of the Keeper application does not support iCloud Keychain password import due to Apple's review process. However, the solution is to install Keeper Desktop directly from our download pagearrow-up-right.


    hashtag
    Feature Requests

    We love hearing from customers. Send your feature requests to: [email protected].


    hashtag
    Join our Slack Workspace

    Join our Slack Workspace to post questions, feedback or receive new beta versions.

    Keeper download pagearrow-up-right
    We’ve introduced a new Notification Center in the Web Vault—a secure, in-app hub for viewing and managing important account and security updates, without relying solely on email. Notifications now appear directly in the Vault and can also be delivered through native OS or browser notifications.

    After logging into the Vault, you’ll see a bell icon in the upper-right corner next to your profile. This is your Notification Center. The bell displays the number of unread notifications at a glance.

    Inside the Notification Center, you can filter notifications and respond to actionable events such as device approvals and sharing requests.

    To learn more about how it works, please visit our .


    hashtag
    VAUL-7401: KeeperPAM Session Metadata

    When you launch a PAM connection, Keeper now displays more session details, making it easier to recognize and track your connections at a glance.

    For each launched session, Keeper now displays key metadata, including:

    • Title – Always shown and taken directly from the PAM resource record title.

    • Host / Address – For standard PAM connections, we display the hostname or IP address. For RBI connections, we display the initial URL used at launch (this will not update if you navigate to other sites during the session).

    • Login / Username – Shown when the session is launched with known credentials from the record.

    • Port – The port used for the connection.

    • Protocol – The connection protocol (e.g., RDP, SSH, etc.).

    • Time Elapsed – How long the session has been active.

    • Gateway – The name of the Gateway as it appears in the Vault; all other Gateway details remain hidden by design.

    • Session Recording Indicator – Session is being recorded (visual and keystroke) as defined by the administrator.

    • KeeperAI Indicator - AI-based session analysis and threat detection is active for the connection.

    This enhancement makes it easier to identify, audit, and manage sessions, especially in environments with many concurrent connections.

    KeeperPAM Session Metadata
    • VAUL-6706: Improved import handling to detect simple CSV files and process them as standard CSVs, regardless of the selected password manager.

    • VAUL-7934: Added native Google Cloud (GCP) support to PAM configurations, including fields for GCP ID, Workspace Admin Email, and Service Account Key.


    hashtag
    KDE-1656: Password Zoom

    Added an improvement to show password character positions in the Password Zoom tray. Click on the "Password Zoom" feature from the password viewer inside the Keeper vault record.


    hashtag
    VAUL-7934: KeeperPAM Support for Google Cloud

    KeeperPAM now natively supports Google Cloud as a PAM Configuration in addition to AWS, Azure, Local Network and Domain Controller.

    about setting up Google Cloud with KeeperPAM

    Managed resource types:

    • GCP Principal User Password

    • Managed Microsoft AD User

    • Google Compute Virtual Machine User

    • Cloud SQL Database User


    hashtag
    New Import UI

    We've created an all new import flow for customers who are transitioning from a different password manager, web browser or a flat file. The new wizard has the following steps:

    • Choose a source

    • Map columns to Keeper fields

    • Preview the import results

    New Import: Select a Source
    New Import: Map Fields
    New Import: Preview Results and Confirm

    hashtag
    Known Issues

    • Errors when logging in with Biometrics: After login, open Settings and disable/re-enable Biometric Login.

    hashtag
    Bug Fixes and Improvements

    • VAUL-7816: Cleaned up and refactored the Vault rotation and rotation-settings code to support upcoming features more reliably.

    • VAUL-7984: Fixed Electron local storage not persisting user data by switching to electron-store and ensuring Web Vault storage remained unaffected.

    • KDE-1807: Fixed a typo in the macOS hotkey settings.

    • KDE-1769: Updated to Electron V37.x.x

    • KDE-1750: Compatibility with the new MacOS Tahoe V26

    • VAUL-7845: Fixed an issue where Unchecking options caused the modal size to be reset.

    • VAUL-7920: Resolved a potential issue where Security Audit might not run if restrict_breach_watch enforcement was enabled.

    • VAUL-7813: Improved backend error handling in the Vault and Desktop App.

    • VAUL-7576: Fixed an issue where users saw unclear or missing error messages when sharing a record or folder with an email that doesn’t have a Keeper account.

    • VAUL-7607: Fixed an issue where multiple URLs were being added to text fields instead of URL fields, likely due to URL fields being introduced later.

    • VAUL-7734: IMPORT: Fixed an issue where header rows from Google Chrome and Dropbox password manager exports were incorrectly imported as Keeper records. These rows are now properly ignored.

    • VAUL-7688: Fixed an issue where “Password Manager Pro” overlapped the close (X) button in the Importer View Instructions modal.

    • VAUL-7686: Fixed an issue where duplicate numbers appeared in the Importer View Instructions.

    • VAUL-6004: Fixed an issue with the Import from Browser install prompt.

    • VAUL-8047: Fixed a misspelling in the import error message.

    • VAUL-8045: Fixed a UI mismatch in the Import tab to align with design.

    • VAUL-8050: Updated the 1Password import instructions to match the latest design.

    • VAUL-8063: Fixed confusing logic for closing the import popup.

    • VAUL-8068: Fixed an issue with stray dots appearing in LastPass and CSV import instructions.

    • VAUL-8088: Fixed an issue where keys were missing when selecting Import.

    • VAUL-8103: Fixed the ordering of items in the import source list.

    • VAUL-8106: Fixed a missing focus state for Review/Edit in the import flow.

    • VAUL-8108: Fixed the Import Completed modal to match the design.

    • VAUL-8111: Fixed an issue where .csv import steps were not translated in any language.

    • VAUL-8095: Fixed missing translations for “Summary” across 11 languages in the import flow.

    • VAUL-8126: Fixed an issue where 2FA codes were being imported.

    • VAUL-8089: Fixed the Source Text File import options to match the design (pending translations).

    • VAUL-8094: Fixed an issue where Dashlane import showed an “undefined” error and updated the design accordingly.

    • VAUL-8064: Fixed an issue where a random “8” appeared in the 1Password import instructions header.

    • VAUL-8066: Fixed an issue where Role Enforcement incorrectly blocked all record types when only Login records were disabled, affecting onboarding.

    • VAUL-8065: Fixed an issue where import restrictions required too many steps before showing the restriction message.

    • VAUL-7991: Fixed an issue where passphrases were missing as a manual password generator option for PAM user records.

    • VAUL-7993: Fixed an issue where Rotation Settings did not respect password lengths under 20.

    • VAUL-7994: Fixed an issue where enabling Use default rotation schedule left the custom schedule visible, causing confusion.

    • VAUL-7998: Fixed an issue where rotation settings validation errors disappeared after changing a setting instead of staying visible.

    • VAUL-7718: Fixed an issue where rotation settings reverted to the previously synced values during editing, causing users to lose their changes.

    • VAUL-7718: Fixed an issue where 2FA duration persisted after 2FA was disabled.

    • VAUL-7877: Fixed placeholder text in the KeeperAI Exceptions dropdown to match updated UI changes.

    • VAUL-7272: Fixed spacing for SSO Cloud Admin Approval and Device Approval.VAUL-6199: Fixed an issue where the card icon didn’t clear when typing a value (e.g., “M”) in the Title field.

    • VAUL-7906: Fixed an issue where long passwords overlapped in the browser import modal.

    • VAUL-5978: Fixed an issue where spaces were not trimmed from the master password during account creation, login, and account recovery.

    • VAUL-6473: Fixed an issue where the file_attachment_deleted client event was not being sent.

    • VAUL-8031: Fixed an issue where Application Gateway status was truncated in Secrets Manager under My Applications.

    • VAUL-8032: Fixed an issue where SSH connections with invalid credentials showed no error and remained stuck in a loading state.

    • VAUL-8036: Fixed an issue where resource and config fields were still required even when hidden under General Rotation Profile with Rotation set to Off.

    • VAUL-7632: Fixed an issue where two-factor duration did not persist between attempts.

    • VAUL-7834: Fixed an issue where the PAM AI Session Activity label wasn’t recognized by screen readers.

    • VAUL-7947: Fixed an issue where Keeper AI session recordings continued running far beyond the expected duration.

    • VAUL-7883: Fixed an issue where the PAM AI “+” icon now appears gray when no exceptions have been created.

    • VAUL-7841: Updated the PAM AI error message to match the latest design.

    • VAUL-7879: Removed the Low Exceptions dropdown option in PAM AI, leaving Monitor as the only available choice.

    • VAUL-8054: Fixed an issue where AI exceptions were not saved on first save for wizard-created records.

    • VAUL-7797: Fixed missing translations for Critical Events, Any, and Duration in PAM AI.

    • VAUL-8055: Fixed an issue where AI exceptions failed to save on the first attempt for newly created Docker-based SSH records.

    • VAUL-7878: Fixed the PAM AI Exceptions modal to be view-only when the associated PAM configuration has Terminate Session disabled.

    • VAUL-7738: Fixed an issue where BreachWatch was not displayed in offline mode.

    • VAUL-6565: Fixed an issue where clearing the 10-record limit modal caused recently viewed records to appear in advanced search.

    • VAUL-8015: Fixed an issue where new Trial accounts saw “Unable to connect. Please check your network connection.” during automation runs.

    • VAUL-8049: Fixed the ordering of options in Create New PAM.

    • VAUL-8041: Fixed an issue where Client Check Error was not generated in the new build.

    • VAUL-8053: Fixed UI overlap issues with the URL pill when Allow navigation via direct URL manipulation is enabled, ensured it can’t move behind the top bar, added missing scroll behavior on zoom, and restored the recording icon display when any Session Recording option is selected.

    • VAUL-6584: Fixed a text-wrapping issue in the Role Password Complexity user message.

    • VAUL-6509: Fixed an issue where passkey records in the web vault didn’t display a username when the record’s username field was empty.

    • VAUL-8104: Fixed an issue where Offline Mode wasn’t disabled for SSO users when Master Password login was turned off.

    • VAUL-8071: Fixed an issue where fields auto-populated during password unmask re-authentication.

    • VAUL-8081: Fixed an issue where the re-authentication prompt didn’t appear before viewing a zoomed password.

    • VAUL-8084: Fixed an issue where the screen reader read the entire zoomed password twice.

    • VAUL-7148: Password Zoom - Show the number of the Password Character positions

    • VAUL-8125: Resolved js-yaml security issue CVE-2025-64718.

    • KDE-1754: Fixed an issue where the Work Offline option disappeared after the offline access period expired, requiring users to toggle offline mode off and on again.

    • KDE-1800: Fixed an issue where new Chrome windows couldn’t be opened on Windows when KeeperFill for Apps was active.

    • KDE-1813: Offline Mode not visible for SSO users when Master Password enforcement is disabled

    • KDE-1595: Fixed a crash in the desktop renderer that occurred when switching between Touch ID and security key prompts during login.

    • KDE-1828: Fixed an issue where ⌘+N couldn’t open a new Chrome window on macOS when KeeperFill for Apps was active.

    • KDE-1829: Fixed an issue where header rows from Chrome and Dropbox exports were incorrectly imported as records.

    • KDE-1771: Improved backend error handling in the Vault and Desktop App.

    • KDE-1623: ​​Fixed an issue where Security Key setup in 2FA failed to enable in the Windows KDE build, despite working in the Web Vault.

    • KDE-1825: Fixed an issue where Reset Keeper showed cache-removal notifications but did not actually clear the local cache.

    • KDE-1840: Fixed an issue causing a Local Reset Required loop that blocked login on Windows (QA 17.5.0 – AppInstaller & x64).

    • KDE-1842: Resolved glob CLI security issue CVE-2025-64756.

    Vault Release 17.3

    Released on July 24, 2025

    hashtag
    New PAM Features & Improvements

    hashtag
    Summary

    Keeper version 17.3 brings several powerful PAM enhancements that empower DevOps, IT Security, and development teams with enhanced visibility, control, and collaboration across IT environments.

    • Updates to Keeper introduce the Domain Controller configuration for Active Directory environments.

    • include Launch Credentials, Personal Credentials, and Ephemeral Accounts within Keeper Connections, offering flexible, secure access options that eliminate standing privilege, and enable Just-in-Time session-based authentication.

    • Secrets Manager now allows and Gateways with other Keeper users, enabling secure and collaborative management of secrets across your organization.


    hashtag
    Discovery

    Keeper Discovery provides DevOps, IT Security, and development teams with centralized visibility into privileged accounts and IT assets across local, AWS, and Azure environments. Integrated through the Keeper Gateway, it helps organizations identify unmanaged accounts, misconfigurations, and security risks. By automating asset discovery and delivering actionable insights, Keeper Discovery strengthens security, streamlines operations, and supports compliance across complex infrastructure setups. Version 17.3 brings additional features to the discovery process for customers.

    hashtag
    Details

    To create a Discovery Job, navigate to the Discovery tab and click Create Discovery Job. Then, select an active Keeper Gateway to perform the scan. The Gateway is linked to a PAM Configuration, which defines the environment type being scanned.

    If the PAM Configuration is missing required details, such as CIDR ranges or cloud credentials, you’ll be prompted to provide that information before the job can proceed.

    Once a Discovery Job reaches the Completed state, clicking on the job allows you to review and process the findings interactively. You can select multiple items or go through them individually, adding findings to a queue before finalizing the results.

    While reviewing discovery results, you can choose the Vault location where each resource will be stored and assign the appropriate Admin Credentials. These credentials serve several key functions:

    • User Account Discovery: Used in future discovery jobs to remotely access the resource and identify local user accounts.

    • Password Rotation: Enables on-demand and scheduled password rotations for discovered accounts.

    Additionally, PAM Users identified during discovery can be configured for automatic password rotation.

    In the Discovery Job panel, you can view all previously run jobs along with their status, such as Completed, Running, or Failed.


    hashtag
    New Ways to Connect with Keeper Connections

    Keeper Connections offer multiple authentication methods to securely access target systems:

    • Launch Credentials: Use credentials configured directly on the PAM Machine, Database, or Directory record. Users can initiate sessions without needing direct access to the credentials themselves.

    • Personal/Private Credentials: Users can authenticate using their own credentials stored securely in their Keeper Vault, providing flexibility and personal control.

    • Ephemeral Accounts: When enabled, a temporary, system-generated privileged account is created specifically for the session. This account is automatically removed after the session ends, supporting Just-in-Time access with zero standing privilege.

    hashtag
    Connection Templates

    PAM Machine, PAM Database, and PAM Directory record types can now be set up as Connection Templates, allowing users to launch sessions to target systems without needing a predefined hostname or credential.

    Each template requires configuration of the Keeper Gateway and the relevant connection protocol settings. Once created, templates can be shared with other users. When launching a session from a template, users are prompted to:

    • Enter the target hostname

    • Select a credential from their own Keeper Vault for authentication

    The Keeper Connections tab enable users to instantly and securely access infrastructure assets, such as servers, databases, web apps, and workloads, directly from the Keeper Vault, without exposing credentials. This ensures a zero-trust, zero-knowledge security model.

    Connections are configured on PAM Machine, PAM Database, PAM Directory, and PAM Remote Browser record types, and can be launched directly from these records.

    Under the Connection tab, you can enable users to select credentials from their own vault and optionally configure the launch credentials to rotate automatically upon session termination.

    Within the PAM settings, we've added a new Rotation tab and a JIT Settings tab for each resource.

    Just-in-Time Access with Ephemeral Accounts and Role Elevation enables secure, one-click privileged sessions to infrastructure assets directly from the Keeper Web Vault. With Just-in-Time (JIT) access, users are granted elevated privileges only for the duration of a session, significantly reducing the risk of standing privileged accounts. Once the session ends, all elevated access is automatically revoked.

    hashtag
    Ephemeral Account Creation

    The Keeper Gateway can automatically create temporary privileged accounts on the target system at the start of a session and delete them at the end. This ensures no persistent accounts exist to be compromised.

    hashtag
    Role and Group Elevation

    Instead of creating temporary accounts, KeeperPAM also supports role or group-based elevation, temporarily assigning elevated privileges (e.g., Windows “Administrators” or AWS IAM roles) to the session user. Elevation is revoked automatically when the session ends.

    This flexible approach to JIT access, via ephemeral accounts or role elevation, supports a zero-trust security model while simplifying privileged access management across your infrastructure.


    hashtag
    Sharing Secrets Manager Applications and Gateways

    Keeper Secrets Manager (KSM) offers DevOps, IT Security, and development teams a fully cloud-based, Zero-Knowledge platform to securely manage infrastructure secrets, such as API keys, database passwords, access tokens, certificates, and other sensitive data.

    Once a KSM Application is created, it can be securely shared with other users in your organization. Shared users gain access to application features, including viewing secrets, managing devices and gateways, and configuring PAM record types via the associated Keeper Gateway.

    This sharing capability enables secure team collaboration while preserving strict access controls through Keeper’s Zero-Knowledge security model.

    hashtag
    Domain Controller Configuration

    KeeperPAM now supports Domain Controller configurations, enabling seamless discovery and management of domain-joined resources. When combined with Keeper Discovery, organizations can automatically identify domain-connected assets across their environment and securely manage access through shared KSM Applications, PAM record types, and the Keeper Gateway, all within Keeper’s Zero-Knowledge architecture.


    hashtag
    One-Time Share (OTS) Bidirectional Update

    Keeper One-Time Share (OTS) enables secure, time-limited sharing of records with anyone, no Keeper account required. Ideal for sharing sensitive information with friends, family, or colleagues, OTS eliminates the risks of sending data via email, text, or messaging apps.

    Each share link:

    • Expires automatically at a time you choose

    • Can only be accessed on a single device (device-locked for added security)

    • Prevents unauthorized access, even if the link is intercepted or your email is compromised

    When the recipient opens the share link, the record will launch in their web browser and become bound to that specific device. Access will automatically expire after the designated time, at which point the link becomes invalid and the record can no longer be viewed, even on the originally authorized device.

    The new bidirectional capabilities of Keeper’s One-Time Share (OTS) feature enable true two-way collaboration between Keeper users and non-Keeper recipients, all within a secure, time-limited session. Once the recipient opens the shared record in their browser, they can not only view the information but also:

    • Edit existing fields within the record (e.g., notes, credentials, custom fields)

    • Upload and attach files, such as documents, images, or certificates

    All changes are made within the same secure, device-bound session. Once the recipient clicks Save, the updates are reflected in the sender’s vault in real time.

    This allows for secure, efficient collaboration, such as collecting sensitive onboarding details, exchanging credentials, or updating records, without requiring the recipient to create a Keeper account or leave the zero-knowledge environment. Once the session expires, all access is revoked, ensuring the shared information remains tightly controlled.

    circle-info

    To learn more about Keeper's One-Time Share feature, click .

    hashtag
    Activating Editable One-Time Sharing

    By default, this permission is disabled for Enterprise environments. To activate the feature, visit the Admin Console > Roles > Enforcement Policies > Creating and Sharing and check the box next to "Can create links with editable fields and file upload capabilities".


    Discover all the , or visit website to start your free trial or request a personalized demo.

    hashtag
    Enhancements

    • VAUL-7283: Admins can now create flexible resource records with separate admin and launch credentials, user-supplied credentials, or templates that support custom host and credential entry.

    • VAUL-7285: Admins can now enable JIT ephemeral access, allowing temporary admin privileges, automatic account cleanup, and post-session credential rotation—all securely managed in PAM settings.

    • VAUL-5995, VAUL-7333, VAUL-7235: KSM applications can now be shared with users, with role-based permissions and enhanced management of folders, devices, gateways, and activity logs for better collaboration and security.

    hashtag
    Other Updates

    • VAUL-7488: We improved the import of Dashlane .dash files into Keeper.

    • VAUL-7138: We added the UID from reporting & alerts to the deleted items.

    • VAUL-7370: Fixed a bug that prevented session recording playback from scaling properly.

    hashtag
    Bug Fixes

    • VAUL-6440: Fixed an issue where 2FA duration settings were not honored for users with SMS-based 2FA, causing repeated prompts on each login.

    • VAUL-7325: Fixed an issue where non-owners could manually enter passwords in the Privacy Screen.

    • VAUL-6069, VAUL-6070: Fixed alignment issues in the advanced search results dropdown.

    sudo gpg --keyring /etc/apt/trusted.gpg.d/keeper.gpg --keyserver 
    hkp://keyserver.ubuntu.com:80 --recv-keys A692259838FF25C92DC863269883A36384BA3F6B
    https://keepersecurity.ca/vault#resetarrow-up-right
    https://keepersecurity.jp/vault#resetarrow-up-right
    https://govcloud.keepersecurity.us/vault#resetarrow-up-right
  • The One-Time Share (OTS) feature now enables secure, temporary, with non-Keeper users—no account required—ensuring secure collaboration without sacrificing control or compliance.

  • Supports bidirectional communication, allowing both parties to securely view, edit, or upload content during the session, while maintaining full control and temporary access

    DR-646: Keeper Discovery enhancements to the vault UI provide teams with complete visibility into privileged accounts and IT assets across different environments, helping to eliminate misconfigurations and security gaps.

  • VAUL-6904, VAUL-6167, VAUL-7499: This update enables bidirectional sharing of files, notes, and record content, with full editing capabilities, for seamless collaboration.

  • VAUL-7432: Now, users can rotate credentials on PAM user records as long as they have the "Can Rotate" policy and the KSM application has edit permissions.
  • VAUL-7480: Updated expired account popups to use the latest UI design.

  • VAUL-7195: Keeper Discovery now supports asset discovery with the Domain Controller configuration in Active Directory environments.

  • VAUL-7217: We implemented new router API’s for the DAG.

  • VAUL-6363: Added a warning pill and banner for users in preview mode to highlight the limitations of using beta features and encourage informed testing.

  • VAUL-6055: Updated role enforcement for password length requirements.

  • VAUL-5979: Updated the login flow so that selecting ‘Master Password’ from the SSO dropdown now defaults the cursor to the email field.

  • VAUL-6123: Fixed an issue so that when you click on a record in the search results, it takes you to the correct record.

  • VAUL-7075: Fixed an issue in PAM where the record rotation setting wasn’t being properly checked when updating the resource configuration.

  • VAUL-7172: Updated the PAM script documentation.

  • VAUL-7121: Fixed an issue in the Create New PAM Record modal where tab focusing removed the visual outline around the selected record type.

  • VAUL-6141: Fixed an issue in BreachWatch where a weak password did not correctly update BreachWatch after a record restore.

  • VAUL-7427: Fixed style bugs on the new Security Audit page.

  • VAUL-7215: Fixed an issue where consumers with expired accounts were logged into an unintended limbo state.

  • VAUL-7462: Fixed an issue where importing a Keeper JSON file displayed an error and failed to import folder permissions correctly.

  • VAUL-7472: Fixed an issue where the ARAM event “Created Re-used Password” (reused_password) was not triggering in specific scenarios from the web vault.

  • VAUL-7244: Fixed an issue where SCIM-provisioned, Automator-approved Teams were not appearing in the Vault as expected.

  • VAUL-7490: Fixed a bug where the credentials record icon should be gray when not selected.

  • VAUL-7491: Updated the PAM user record settings to rename one of the duplicate “Rotation” fields to “Rotation Profile” for clarity.

  • Discovery
    Connection updates
    sharing of applications
    herearrow-up-right
    Keeper PAMarrow-up-right
    bidirectional content exchange

    Latest Updates from Keeper

    Keeper platform updates and release notes

    Jump to Section
    Join our Communities
    Resources
    • to our Slack Channels

    hashtag
    Recent Updates

    Date
    Platform
    Links

    hashtag
    Release History by Platform

    hashtag
    New Content and Guides

    Description
    Links

    hashtag
    Milestones

    hashtag
    Keeper Forcefield

    Protect your machines against infostealers and memory-based attacks.

    hashtag
    FIPS 140-3 Validation

    The Keeper Security Cryptographic Module is certified by the NIST Cryptographic Module Verification Program (CMVP) to meet the FIPS 140 standard under certificate #4976.

    hashtag
    Endpoint Privileged Manager

    Advanced Privileged Elevation and Delegation Management (PEDM) solution that provides secure, just-in-time privileged access across your IT environments.

    hashtag
    KeeperPAM: Privileged Access Manager

    Achieve visibility, security, access control and compliance across your entire organization.

    hashtag
    Risk Management Dashboard

    Comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring.

    hashtag
    Passphrase Generator, Password and Passphrase Policies

    Enhanced policy enforcements for password and passphrase generation.

    hashtag
    Granular Sharing Policies

    Enhanced policy enforcements related to record and folder sharing.

    hashtag
    Time-Limited Access

    Provide time-based access to any resource in Keeper.

    hashtag
    Self-Destructing One-Time Shares

    Simplify employee onboarding and external data management with self-destructing shares.

    hashtag
    Automated Password Rotation

    Securely and automatically rotate credentials across cloud-based and on-premises environments.

    hashtag
    Share Admin

    Provide additional privilege to admins who manage shared data.

    hashtag
    FedRAMP Authorization

    Keeper is the industry's first FedRAMP and StateRAMP Authorized solution.

    hashtag
    One-Time Share

    Share records securely to non-Keeper users

    hashtag
    Keeper Connection Manager

    Instantly access your infrastructure with zero-trust security.

    hashtag
    Compliance Reports

    On-demand visibility to access permissions on records and credentials in your enterprise.

    hashtag
    Keeper Secrets Manager

    Manage and protect your cloud infrastructure with zero-trust and zero-knowledge security.

    hashtag
    Record Types

    Structured template that can contain any type of information such as logins, payment cards, bank accounts, and many more.

    hashtag
    Keeper Automator

    Automated encryption operations and end-user approvals for SSO Cloud deployments.


    hashtag
    Slack Channel

    Please join Keeper's Slack Channel by requesting access from [email protected] or contact your Keeper customer success representative.

    hashtag
    Statuspage

    Realtime system status is available at:

    hashtag
    Reddit

    Post public questions on our Reddit community page

    hashtag
    Need Help?

    If you require assistance, please open a ticket:

    Enterprise customers please select "Business" or "MSP"

    If this is an urgent issue, click on the "This is an emergency..." checkbox

    Feb 25, 2026

    Admin Console 17.7.0

    Feb 23, 2026

    KSM Terraform Provider 1.2.0

    Feb 23, 2026

    Python SDK 17.2.0

    Feb 20, 2026

    Browser Extension Version 17.7.0

    Feb 19, 2026

    Commander 17.2.8

    Feb 19, 2026

    Bridge Version 17.0.1

    Feb 19, 2026

    Web Vault & Desktop App 17.5.1

    Feb 19, 2026

    Importer Version 17.0.2

    Feb 19, 2026

    Automator Version 17.1.0

    Feb 16, 2026

    KSM Rust SDK 17.1.0

    Feb 16, 2026

    KSM .NET SDK 17.1.1

    Feb 16, 2026

    Ansible Plugin 1.3.0

    Jan 29, 2026

    Secrets Manager SDK Updates

    Jan 28, 2026

    Browser Extension 17.6.0

    Jan 27, 2026

    Slack App for Approval Workflow

    Jan 27, 2026

    Keeper Connection Manager 2.23.1

    Jan 26, 2026

    Android 17.4

    Jan 26, 2026

    iOS 17.7

    Jan 15, 2026

    Backend API 17.6.5

    Jan 14, 2026

    Keeper Gateway 1.7.6

    Jan 13, 2026

    Admin Console 17.6.11

    Jan 8, 2026

    Admin Console 17.6.10

    Jan 8, 2026

    Web Vault & Desktop App 17.5

    Jan 6, 2026

    Commander SuperShell TUI

    Jan 3, 2026

    Browser Extension 17.5

    Dec 29, 2025

    Admin Console 17.6.9

    Dec 19, 2025

    FedRAMP High Authorization

    Dec 15, 2025

    Admin Console 17.6.7

    Dec 8, 2025

    Backend API 17.6.3

    Nov 28, 2025

    Credential Provisioning Commands

    Nov 28, 2025

    ServiceNow ITSM Integration

    Nov 25, 2025

    Keeper Connection Manager 2.22.0

    Nov 25, 2025

    SSO Connect On-Prem 17.0.2

    Nov 24, 2025

    Admin Console 17.6.4

    Nov 19, 2025

    Browser Extension 17.4.0

    Nov 17, 2025

    Admin Console 17.6.3

    Nov 15, 2025

    Keeper Gateway 1.7.5

    Nov 14, 2025

    KSM "interpolate" command

    Nov 13, 2025

    Keeper Gateway 1.7.4

    Nov 12, 2025

    The New Commander Python SDK

    Nov 12, 2025

    Backend API 17.6.1

    Nov 10, 2025

    SSO Connect On-Prem 17.0.1

    Nov 6, 2025

    Ruby SDK for Secrets Manager

    Nov 6, 2025

    Cursor Plugin 2.0.0 (Open VSX)

    Nov 6, 2025

    VSCode Extension 2.0.0

    Nov 3, 2025

    Raycast Extension

    Nov 3, 2025

    Web Vault & Desktop App 17.4.1

    Oct 29, 2025

    Admin Console 17.6.2

    Oct 15, 2025

    Browser Extension 17.3

    Oct 12, 2025

    Jetbrains Plugin 1.0.0

    Oct 9, 2025

    Keeper Gateway 1.7.2

    Oct 3, 2025

    Admin Console 17.6

    Oct 3, 2025

    Keeper Gateway 1.7.1

    Sep 30, 2025

    Web Vault & Desktop App 17.4

    Sep 30, 2025

    Password Importer 17.0.1

    Sep 30, 2025

    Backend API 17.6

    Sep 30, 2025

    Forcefield 1.1

    Sep 22, 2025

    Keeper Gateway 1.7

    Sep 22, 2025

    Browser Extension 17.2.4

    Sep 18, 2025

    Terraform Provider for KSM 1.1.7

    Sep 18, 2025

    Visual Studio Plugin 1.0.1

    Sep 18, 2025

    Cursor Plugin 1.0.1 (Open VSX)

    Sep 18, 2025

    Admin Console 17.5

    Sep 15, 2025

    Keeper Connection Manager 2.21.0

    Sep 11, 2025

    Browser Extension 17.2.3

    Sep 5, 2025

    Keeper Security Trust Center

    Sep 3, 2025

    Commander CLI 17.1.8

    Aug 28, 2025

    Commander CLI 17.1.7

    Aug 28, 2025

    Java SDK 17.1.1 for Secrets Manager

    Aug 27, 2025

    Browser Extension 17.2.1

    Aug 26, 2025

    Keeper Connection Manager 2.20.1

    Aug 18, 2025

    Rust SDK for Secrets Manager

    Aug 18, 2025

    Backend API 17.5.9

    Aug 11, 2025

    Web Vault & Desktop App 17.3.3

    Aug 4, 2025

    iOS 17.4

    Aug 1, 2025

    Web Vault & Desktop App 17.3.2

    July 31, 2025

    Commander CLI 17.1.5 with Biometric Login

    July 31, 2025

    Microsoft Sentinel Integration in Azure Marketplace

    July 28, 2025

    Backend API 17.5.8

    July 24, 2025

    Web Vault & Desktop App 17.3

    July 24, 2025

    Keeper Gateway 1.6.1

    July 24, 2025

    Browser Extension 17.2 with Biometric Login and TOTP capture

    July 23, 2025

    Connection Manager 2.20.0

    July 22, 2025

    Backend API 17.5.6

    July 9, 2025

    Commander 17.1.3

    July 7, 2025

    Keeper Gateway 1.6.0

    July 3, 2025

    Keeper Gateway 1.5.6

    July 2, 2025

    Admin Console 17.4

    June 20, 2025

    Commander PAM Resource Import

    June 19, 2025

    Keeper Gateway 1.5.5

    June 16, 2025

    Keeper Gateway 1.5.4

    June 10, 2025

    Backend API 17.5.1

    June 10, 2025

    Admin Console 17.3

    May 26, 2025

    Browser Extension 17.1.2

    May 18, 2025

    Web Vault & Desktop App 17.2

    May 18, 2025

    Backend API 17.5.0

    May 18, 2025

    Keeper Forcefield

    |

    May 15, 2025

    Customer service AI chatbot

    May 14, 2025

    Admin Console 17.2.4

    May 14, 2025

    Commander 17.0.19

    April 18, 2025

    KeeperChat 17.0

    April 10, 2025

    KeeperPAM Gateway 1.5.2

    April 8, 2025

    Backend API 17.4

    April 8, 2025

    Admin Console 17.2.2

    Mar 31, 2025

    Browser Extension 17.1

    Mar 23, 2025

    Commander 17.0.11

    Mar 20, 2025

    KeeperPAM Gateway 1.5.1

    Mar 12, 2025

    Web Vault & Desktop App 17.1.1

    Mar 6, 2025

    Admin Console 17.2

    Mar 1, 2025

    Commander 17.0.8

    Feb 28, 2025

    Connection Manager 2.19.3

    Feb 27, 2025

    FIPS 140-3 Module

    Feb 13, 2025

    Web Vault & Desktop App 17.1

    Feb 13, 2025

    Admin Console 17.1

    Feb 12, 2025

    Automator 17.0

    Feb 9, 2025

    Browser Extension 17.0

    Feb 6, 2025

    KeeperPAM Cloud Launch

    and

    Feb 5, 2025

    Admin Console 17.0

    Bidirectional One-Time Share

    Browser Extension Biometric Login with Passkeys

    Health Checks on the Keeper Gateway

    Example PAM Resource import through Commander

    Browser Extension tool to clear your browser cache

    Keeper MCP Server (node version)

    and

    Keeper MCP Server for AI Agents (docker)

    and

    Commander Service Mode (REST API)

    Keeper Forcefield

    and

    Keeper for Wear OS

    Browser Extension Snapshot Tool for autofill fixes

    Endpoint Privilege Manager

    and

    Guest Mode feature for Connection Manager

    CyberArk cloud import

    PowerShell and

    Automator guide for Google Cloud Run

    Keeper Connection Manager custom extension

    TeamCity integration

    Milestones

    Feb 28, 2026

    Backend API 17.6.7

    Release Notes

    Feb 27, 2026

    Keeper SDK 1.1.4 (Python, .Net and PowerCommander)

    Release Notes

    Feb 26, 2026

    Endpoint Privilege Manager 1.1

    Release Notes

    Feb 26, 2026

    Harness CI Plugin for Keeper Secrets Manager

    • Web Vault & Desktop

    • Admin Console

    • iOS

    • Connection Manager

    • Secrets Manager

    • Keeper Gateway

    • Commander

    • Backend API

    • Automator

    Harness CI Plugin for Keeper Secrets Manager

    Keeper Slack App for Approval Workflow

    Overview Videoarrow-up-right

    New Import UI

    Importing Passwords Documentationarrow-up-right

    KeeperAI video overview

    KeeperAI for Privileged Sessionsarrow-up-right

    KeeperAI for privileged sessions

    Access to our security and compliance resources and reports

    Keeper Security Trust Centerarrow-up-right

    https://www.keepersecurity.com/forcefield-endpoint-protection/arrow-up-right
    https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4976arrow-up-right
    https://docs.keeper.io/en/keeperpam/endpoint-privilege-manager/overviewarrow-up-right
    https://docs.keeper.io/en/privileged-access-managerarrow-up-right
    https://docs.keeper.io/en/enterprise-guide/risk-management-dashboardarrow-up-right
    https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.18.0arrow-up-right
    https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.16.0arrow-up-right
    https://docs.keeper.io/en/v/enterprise-guide/sharing/time-limited-accessarrow-up-right
    https://docs.keeper.io/en/v/enterprise-guide/sharing/self-destructing-recordsarrow-up-right
    https://docs.keeper.io/en/privileged-access-manager/privileged-access-manager/password-rotationarrow-up-right
    https://docs.keeper.io/enterprise-guide/share-adminarrow-up-right
    https://www.keepersecurity.com/industries/public-sector.htmlarrow-up-right
    https://docs.keeper.io/enterprise-guide/one-time-sharearrow-up-right
    https://www.keepersecurity.com/connection-manager.htmlarrow-up-right
    https://docs.keeper.io/enterprise-guide/compliance-reportsarrow-up-right
    https://www.keepersecurity.com/secrets-manager.htmlarrow-up-right
    https://docs.keeper.io/user-guides/record-typesarrow-up-right
    https://keeper.io/automatorarrow-up-right
    https://statuspage.keeper.io/arrow-up-right
    https://www.reddit.com/r/KeeperSecurity/arrow-up-right
    https://www.keepersecurity.com/support.htmlarrow-up-right
    Recent Updates
    Releases by Platform
    New Content and Guides
    Request Accessarrow-up-right
    Register for Update Emailsarrow-up-right
    Reddit Communityarrow-up-right
    Keeper Trust Centerarrow-up-right
    documentation portal
    Browser Extensions
    Android
    SSO Connect On-Prem
    Enterprise Bridge
    KeeperChat
    Typer
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    FedRAMP Marketplace Listingarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Download Linkarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Download Linkarrow-up-right
    Download Linkarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Trust Centerarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Websitearrow-up-right
    AI Chatbotarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notesarrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    View Certificatearrow-up-right
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Web pagearrow-up-right
    Release Notes
    Documentationarrow-up-right
    Documentationarrow-up-right
    Documentationarrow-up-right
    Githubarrow-up-right
    Documentationarrow-up-right
    Githubarrow-up-right
    Documentationarrow-up-right
    Web Pagearrow-up-right
    Documentationarrow-up-right
    Documentationarrow-up-right
    Documentationarrow-up-right
    Web Pagearrow-up-right
    Documentationarrow-up-right
    Docsarrow-up-right
    Commander import methodarrow-up-right
    Docsarrow-up-right
    Docsarrow-up-right
    Documentationarrow-up-right
    Here's a step-by-step guide
    Security and Encryption Model
    Documentation
    Docs
    Documentation
    here
    Optimized Password Rotation
    Connections
    Tunnels
    Remote Browser Isolation
    Session Recordings and Playback
    Discovery
    Endpoint Privilege Manager
    PAM Enforcement Policies (RBAC)
    Learn more
    detailed documentation on SSH parameters
    detailed documentation on RDP parameters
    detailed documentation on VNC parameters
    Documentation
    Documentation
    KeeperAI Documentation
    Documentation
    SuperShell Docs
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Learn More
    PAM features
    Read more about the Autofill Snapshot Tool
    documentation page
    Introducing Keeper's Bidirectional One-Time Share