Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 932 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Release Notes

Loading...

Loading...

Keeper Security

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Desktop and Web Vault

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Newsletter

Here you will find our "What's New With Keeper" newsletter and blog pages

View all latest updates

2025

  • August

2024

2023

May

  • April

  • March

  • January

  • April
    October
    May
    December
    September
    August
    July

    Security Advisories

    Notices of recent security advisories and impact on Keeper

    As new security advisories are published online for various systems, Keeper Security will post relevant information here.

    Vault Release 17.3.3

    Released on Aug 11, 2025

    Bug Fixes

    • VAUL-7701: We now support Dropbox and Google Chrome password CSV exports into the vault.

    • KDE-1722, 1720, 1723, 1727: Hotkeys now work reliably across Windows, Edge/Chrome, and international layouts, with fixes for focus handling, Ctrl+Shift+P, and repeated single-key triggers.

    Security Updates

    • KDE-1724: Resolved library "tmp" package related to CVE-2025-54798

    Vault Release 17.3.2

    Released on Aug 1, 2025

    Bug Fixes

    • KDE-1708: Resolved issue with macOS hot key autofill from KeeperFill for Apps due to changes in the Desktop App version 17.3.1

    Vault Release 17.3.1

    Released on July 31, 2025

    Security Updates

    • KDE-1594: Added protection against "synthetic mouse/key events" from 3rd party applications on Windows devices (reported by Bugcrowd researchers).

    Bug Fixes

    • KDE-1708: Resolved issue where exiting the app caused a noticeable delay

    Vault Release 16.10.8

    Released on Sept 14, 2023

    Security Updates

    • KDE-1418: CVE-2023-4863 Heap buffer overflow vulnerability in the WebP Codec. Updated Electron framework.

    Vault Release 16.10.2

    Released on May 22, 2023

    Security Updates

    • VAUL-5868: Upgrade to React 18 library

    Bug Fixes

    • VAUL-5211: After logout and login, SSO users will no longer be set on the SSO Domain screen.

    • KDE-1371: App crash when registering a security key

    Vault Release 16.8.6

    Released on Jan 3, 2023

    Improvements

    • Set new default PBKDF2 iterations to 1,000,000 rounds

    Vault Release 16.8.5

    Released on Dec 20, 2022

    Bug Fixes

    • KDE-1313: LastPass automated import hanging on some accounts

    • KDE-1319: Safari import hanging on macOS Ventura

    Older

    Releases notes older than last 10 releases

    Older release note content is still available, but anything older than the last 10 updates is placed here.

    Vault Release 16.8.4

    Released on Nov 30, 2022

    Bug Fixes

    • KDE-1317: Debian package compatibility issues

    • KDE-1318: RPM package compatibility with CentOS7

    Vault Release 16.8.1

    Released on Oct 25, 2022

    Bug Fixes

    • VAUL-5546: BreachWatch re-scanning records repeatedly

    • KDE-1301: TOTP QR code scanning window not working

    Vault Version 16.7.2

    Released on July 29, 2022

    Bug Fixes

    • KDE-1273: Touch ID shows as "enabled" for users after an app reset

    • KDS-1277: Custom Record Template showing "Discard Changes?" on save

    • VAUL-4849: Showing content security policy error in console on login

    • VAUL-5362: EU data center BreachWatch errors for users on a free trial

    Improvements

    • Added support for Password Manager Pro import

    • Added support for generic .xls or .xlsx file import

    Vault Release 16.10.5

    Released on Aug 12, 2023

    Bug Fixes

    • Emails with a "-" are unable to login

    Vault Release 16.8.2

    Released on Nov 2, 2022

    Features

    • VAUL-5409: Support for JP and CA regions

    Vault Version 16.2.3

    Released on Oct 8, 2021

    • Support for Safari 15 automated password import

    Vault Version 15.0.15

    Estimated Release Date: February 5, 2021

    Bug Fixes

    • REL-3160: Import instructions for Avast are missing

    Vault Version 15.0.13

    Estimated Release Date: January 8, 2021

    Bug Fixes

    • VAUL-4584: CSP error upon loading Web Vault v15.0.12

    • KDE-989: JavaScript runtime error upon launching Keeper Desktop on Mac (Big Sur)

    Deprecation Notices

    Important information on your Keeper software

    Notice of deprecation for legacy versions

    Keeper deprecates older versions of application software listed below. This means they’ll no longer be available from our published sources, and the backend will reject any requests coming from those versions.


    Keeper Client Applications below 17.0

    Keeper client applications with a client version of less than 17.0 are considered deprecated.

    This applies to the following applications:

    • Keeper Desktop

    • Mobile Apps

    • Automator

    • On-prem SSO Connect

    Keeper has released major security improvements with platform version 17. The new architecture introduces the ability for all software components and clients to apply more robust and faster cryptographic algorithms.

    Browser Extensions and mobile apps typically auto-update, unless the function has been specifically disabled. If you disabled automatic updates for any of our applications, we encourage you to perform the updates immediately. Likewise if those applications are being deployed as part of a company managed process, please include them in your nearest maintenance window or update cycle.

    Important: The following enterprise software components require a manual upgrade which typically involves minor service downtime, similar to updates you performed in the past for the applications. The upgrade process is the same as in the past and typically involves downloading and installing the latest version.

    • On-prem SSO Connect

    • Enterprise Bridge

    If you need assistance with these components, please with our support team to schedule the upgrade.


    Keeper Connection Manager on EL7

    With CentOS 7 having reached end-of-life in June 2024, and with RHEL 7 having reached end-of-maintenance at the same time, KCM will no longer provide EL7 builds. This means that the previous release (KCM 2.19.3) will be the last release with an EL7 build and KCM 2.20.0 will be the first release without EL7 support.

    Users that are maintaining RPM-based installations of KCM but are still using RHEL 7, CentOS 7, or another EL7-derivative should upgrade to EL8 or EL9 when possible so that they can upgrade to KCM 2.20.0. Support EL10 will be coming in a future release.


    Keeper Desktop 32-bit binary version

    The 32-bit Keeper Desktop client application is considered obsolete.

    Per Microsoft, starting with the May 2020 Update (Version 2004), new OEM computers are required to use 64-bit builds. A 32-bit application does not benefit from the Windows app-model security since it does not have access to the TPM/Windows Credential Locker for encrypting the device-key and does not support Windows Hello.


    Keeper Gateway below 1.5

    The Keeper Gateway service with a client version of less than 1.5 are considered deprecated.


    If you have any questions, please .

    CVE-2023-44487

    HTTP/2 protocol denial of service

    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-44487

    Description

    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

    Impact to Keeper

    Keeper Security's application servers are protected by AWS Shield which defends against DDoS attacks, and Keeper is not vulnerable to this attack. More info is posted on .

    If you have any questions, please email us at [email protected].

    CVE-2023-27706

    Bitwarden vulnerability with biometric key storage

    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-27706

    Description

    Bitwarden Windows desktop application versions prior to v2023.4.0 store biometric keys in Windows Credential Manager, accessible to other local unprivileged processes.

    Impact to Keeper

    Keeper is not impacted by this issue. To ensure that we were not impacted by a similar vulnerability, Keeper contracted a 3rd party penetration tester in July 2023 to validate our protection against this type of attack. The report PDF is posted below:

    If you have any questions, please email us at [email protected].

    Vault Release 16.10.12

    Released on Jan 15, 2024

    Features

    • VAUL-6001: Security Key can be set up as the only 2FA method

    • VAUL-6097: Support for Security Key and PIN enforcement policies

    • VAUL-6129: Users can now control if FIDO2 WebAuthn user verification (PIN) is required

    Bug Fixes

    • VAUL-6395: KeeperPAM Router/Gateway connection issue in GovCloud environment

    CVE-2024-35164

    Improper Validation of Array Index in Apache Guacamole

    NIST Link

    Description

    The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

    Black Hat EU 2023

    Response to "AutoSpill" report from Black Hat EU 2023

    Description

    A presentation at Black Hat EU 2023 discussed credential stealing on mobile password managers. Keeper was listed as an impacted application. Keeper has safeguards in place to protect against this issue as described below.

    CVE-2023-4863

    Heap buffer overflow vulnerability in the WebP Codec

    NIST Link

    Description

    Vault Release 16.11.2

    Released August 06, 2024

    Enhancements:

    • VAUL-6715: Improved KeeperFill Installation Prompt: The installation prompt for KeeperFill has been enhanced to offer a better user experience.

    • VAUL-6716, VAUL-6789: Enhanced Import Functionality: When importing data from Keepass KDBX files, TOTP fields will now be correctly recognized and imported as Keeper TOTP fields, ensuring better accuracy and usability.

    • VAUL-6748: Password Complexity and Generation: Password complexity rules can now be applied independently without generating a new password, offering more flexibility in managing your passwords.

    Vault Release 16.10.9

    Released on Sep 29, 2023

    Security Updates

    • KDE-1425: Heap buffer overflow vulnerability in the libvpx library. Updated Electron framework.

    Vault Release 16.10.6

    Released on Aug 20, 2023

    Bug Fixes

    • VAUL-6150: Shared folders are not instantly removed on team removal

    Vault Release 16.10.0

    Released on May 2, 2023

    New Features

    • VAUL-5652: Recovery Phrase. We have upgraded our account recovery process with a new and more secure 24-word “recovery phrase” feature. Read more on the .

    Vault Release 16.8.3

    Released on Nov 29, 2022

    Bug Fixes

    • VAUL-5551: Extension not auto-logged in if installed while Web Vault currently logged in

    Vault Version 16.7.1

    Released July 17, 2022

    Bug Fixes

    • Multiple Tickets: Several UI bugs, translations and visual fixes

    Vault Version 16.6.0

    Released on May 4, 2022

    Features

    • VAUL-5029: Introducing One-Time Share. See the and for more details.

    Vault Version 16.4.2

    Released on Feb 2, 2022

    Features & Improvements

    • KDE-1193: Include TOTP fields in LastPass automated import

    Vault Version 16.1.0

    Released on June 28, 2021

    Accessibility (508 Compliance)

    • Keeper has been making UI changes across all web-applications and browser extensions to comply with Section 508 of the Rehabilitation Act (29 U.S.C. § 794d). The Keeper Web Vault and Desktop App now supports keyboard navigation and they are compatible with popular screen readers and other assistive technology.

    Vault Version 15.2.0

    Released April 3, 2021

    New Features & Improvements

    • Expansion to AU Data Center - Keeper now supports an AU data center. Users have the option to select "AU" from the region selector at login for Keeper Desktop App.

    CVE-2022-21449

    "Psychic Signatures" vulnerability in the Oracle Java SE, Oracle GraalVM

    NIST Link

    Description

    Vault Version 15.1.0

    Released on March 8, 2021

    New Features

    • New "Shared Records Report" added to the Export screen:

    Vault Version 16.2.5

    Release ETA on Oct 18, 2021

    Bug Fixes

    • VAUL-5024: Record Type records not syncing after activating Record Types

    • VAUL-5018: Showing "unexpected error" when creating account with a pending transfer acceptance

    Vault Version 15.0.9

    Published on October 22, 2020

    Bug Fixes

    • VAUL-4472: "Salt/Iterations" error message when Master Password user tries to login with the SSO Alternate Master Password login screen.

    Vault Version 15.0.14

    Estimated Release Date: January 22, 2021

    Improvements

    • VAUL-4589: Support for Avast password import

    Vault Version 15.0.3

    Released September 11, 2020

    Benefits & Enhancements

    • Support Email Address Change - Enterprise (SSO) users now have the ability to change their email address from their Vault (if role enforcement policies allow).

    Vault Version 14.13.3

    Released May 19, 2020

    Benefits & Enhancements

    • Password Importer Update - The Keeper Import Tool has been updated to version 14.0.6, supporting Brave, Chromium and Edge browsers along with several bug fixes.

    Vault Version 15.0.11

    Released December 14, 2020

    Bug Fixes

    • VAUL-4549: Unable to reset Master Password with Browser Extension v15.0.2 installed

    Vault Version 16.4.3

    Released on Feb 3, 2022

    Bug Fixes

    • Resolve data import issues with version 16.4.2 that caused crashes on the Browser Extension and Android app. See resolution page: -->

  • VAUL-6792: Better Folder Selection: We've improved the folder location selection in the new shared folder modal for a more intuitive experience.

  • VAUL-4959: Updated Referral Program: Our referral program has been enhanced with updated incentives to encourage more users to invite friends.

  • VAUL-6807: Password Policy Enforcement: The minimum password length is now set to 8 characters, with a maximum of 99 characters. Client applications will enforce this minimum length but allow users to increase it through their settings.

  • VAUL-6798: Feature Promotion: New features such as RBI and KSM are now more visible to users for better awareness.

  • Bug Fixes:

    • VAUL-6788: UID Generation: We've updated the UID generation logic to prevent creating UIDs that start with a dash.

    • VAUL-6746: Firefox Compatibility: Fixed an error occurring in Firefox related to unsupported table versions.

    • VAUL-6805: Privacy Screen: Resolved an issue where the privacy screen disabled URL edits for non-enforced URLs in shared records.

    • VAUL-6784: Sharing Screen: Corrected the sorting order of items in the sharing screen for better usability.

    • VAUL-6794: Account Registration: Addressed an issue where credentials were not properly handled when switching between login and account registration screens.

    • VAUL-6819: Banner Display: Updated the banner display and support tool to match rounding requirements for better accuracy (e.g. number of days left in trial).

    • VAUL-6786: Shared Folder Management: Fixed an issue where deleting a V2 record from a shared folder caused the folder to appear incorrectly. The record will now appear correctly.

    • VAUL-6780: GRE Import Error Handling: Improved error handling during GRE import to ensure proper messaging when users are restricted from creating folders.

    • VAUL-6808: App Stability: Fixed an issue where the app could crash if shared folder users were undefined, ensuring better stability.

    VAUL-6151
    : Advanced search is not matching records when typing multiple search strings into the search field
    VAUL-5547: Right-click menu is showing different options when in different areas of the vault
  • VAUL-5529: Shared Folder "Add User" search/suggest list includes people already in the folder

  • VAUL-5563: Vault crashes when a user with "Prevent sharing records with file attachments" enforcement deletes a record.

  • Improvements

    • VAUL-5565, VAUL-5327, VAUL-5458, VAUL-5325, VAUL-5404: 508 Compliance items

    • VAUL-4772: Removed all legacy jquery/jquieryui references

    • VAUL-5559: Roboform import issues

    • VAUL-5090: Auto-select custom field title when clicking Edit

    • KDE-1308: Update Electron to latest v20 patch version

    • KDE-1314: Remove legacy Windows installers

    VAUL-5307:
    SMS support for Trinidad and Tobago
  • VAUL-5260: Payment card phone number saves incorrectly

  • VAUL-5344: Removed Duplicate detection button for now due to inconsistencies

  • KDE-1255: Touch ID setting turns off when signing in with the Laptop lid open

  • KDE-1228: Canceling the Yubikey setup and login flow gives error

  • KDE-1254: Filling from KeeperFill for Apps with German keyboard issues

  • KDS-1244: Filling from KeeperFill for Apps with French keyboard issues

  • KDE-1269: After logout, KeeperFill for Apps not selecting proper region (Govcloud)

  • KDE-1274: KeeperFill for Apps with Privacy Screen not working in Microsoft Edge

  • Improvements

    • VAUL-5320: Additional confirmation upon deletion of a Shared Folder

    • KDE-1266: Added ability to delete account for Mac Store consumer version

    KDE-1178: Include file attachments in LastPass automated import
  • VAUL-5133: Add checkbox to make LastPass shared folder imports optional

  • Bug Fixes

    • VAUL-5143: Error message first time you drag-and-drop a file attachment into a record

    Features and Improvements
    • KDE-1079: Packaged an all new Safari browser extension with the latest features as Chrome, Firefox and Edge extension.

    • KDE-1080: Added support for Windows Hello role enforcement policy

    • KDE-1081: Upgraded the Electron framework to v12.0.9

    • VAUL-4692: Add clarification around the minimum security answer length requirements

    • VAUL-4588: Initial Support for 508 Compliance across Web Vault and Desktop Application

    • VAUL-4694: Unless disabled by role enforcement policies, users will be required to configure Account Recovery instead of indefinitely delaying

    • VAUL-4750: Simplified the new customer experience when purchasing Keeper prior to creating free Vault account.

    • VAUL-4822: Improved the embedded image viewer

    • VAUL-4092: Added Bitwarden to the available import formats

    Bug Fixes

    • KDE-1092: LastPass automated import broken for certain users due to iterations settings.

    • VAUL-4830: 2FA enforcement with SSO user causes extension and vault to be out of sync during login.

    • VAUL-4836: Auto-suggestion drop-down fills the entire screen when there are very long URLs stored in the vault.

    • VAUL-4838: "Ghost" records in vault when deleting a shared folder containing an owned record

    • VAUL-4840: Gracefully handle scenarios where team keys cannot be decrypted

    • KDE-1073: UI issues caused when the vault logs out while push notifications are in front.

    • KDE-1085: Denying the password importer prompts can lead to a frozen Keeper Desktop app.

  • VAUL-4578: Account recovery failure on a new device

  • VAUL-5000: Prevent record copy when record type is restricted by role enforcement

  • VAUL-4978: When sharing is restricted, user receives no visible error when sharing and it fails silently

  • VAUL-4906: Unknown Sharing Error when email is not verified

  • VAUL-5023, VAUL-5017: Record type errors with Bank Account and Payment Cards

  • VAUL-5030: Browser Extension causes forced logout after importing records

  • VAUL-4491: Unable to login on Chromium Edge from Extension in Microsoft Store version.
  • VAUL-4494: Occasional failure to process Admin Approval for device approval step.

  • VAUL-4265: Pressing "Enter" key while entering text in Japanese characters had unexpected results.

  • KDE-941: Unexpected Logout occurring even if "Stay Logged In" enabled.

  • Bug Fixes
    • KDE-991: KFFA allows for special characters during hotkeys setup

    • KDE-993: Defined hotkeys are still active when the Vault window is closed

    • KDE-994: Keeper Desktop app fails to install on Windows 10 20H2

    • VAUL-4557: Error message intermittently appears upon logout

    Bug Fixes
    • Fixed: The "record_open" ARAM event sends duplicate requests to the server when users are opening a record.

    • Fixed: Users are prompted for 2FA Keeper Push approval twice.

    • Fixed: First time login to the web vault from the browser extension fails in Firefox browsers.

    Bug Fixes
    • Fixed: KeeperFill for Apps crashes when a viewed record is deleted or transferred.

    • Fixed: Record edits made in KeeperFill for Apps are not displayed until after the user logouts/logins.

    • Fixed: 401 error appears when a user redirects between US and EU accounts.

    • Fixed: Users receive "exceeded_depth" error message in an attempt to delete a root folder with a large quantity of subfolders.

    • Fixed: Issues with DUO push for back-up Two-Factor Authentication method and "Forgot Password" flow.

    VAUL-4548: Master Password reset hangs when session is resumes via "Stay Logged In" feature
  • VAUL-4556: Shared folder/record invitation is not appearing on login

  • KDE-975: Javascript error appears when opening Desktop Electron from Safari Extension

  • Enterprise Bridge
    open a ticket
    contact the Keeper support team
    Amazon's blog here
    819KB
    Keeper protection against CVE-2023-27706.pdf
    PDF
    Open

    Impact to Keeper

    Keeper deployed the update containing the fix for this issue as part of Keeper Connection Manager 2.19.2 on December 7, 2024.

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2024-35164
    Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical).

    Impact to Keeper

    Keeper Security may be impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.24 and published Keeper Desktop version 16.10.8.

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2022-21449
    CVE-2023-5217
    KDE-1214: Support for M1-based Macs. Our download page provides install links for the .dmg file and the Mac App Store. The .dmg file contains both Intel and M1 Mac binary builds.

    Improvements

    • VAUL-5021: Additional support for 508 compliance in Secrets Manager and other functional areas.

    Bug Fixes

    • VAUL-5228: Unable to recover account with WebAuthn as the 2FA method

    • VAUL-5233, VAUL-4958, VAUL-5232: Several issues with File Upload failures

    • VAUL-5164: Support for Dashlane import with Argon2D and PBKDF2 200k iterations

    • KDE-1233: Crash on Windows Server 2012 R2 on SSO Login

    • KDE-1237: Tab key not being sent to Citrix client use Native App Fill

    Admin Guide
    End-User guide
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries).

    Oracle link:

    https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA

    Impact to Keeper

    Keeper Security is not impacted by this vulnerability. Keeper does not use Java runtimes that are affected, as reported by Oracle. Keeper also does not use the ECDSA implementation in the built-in Java library. Keeper uses BouncyCastle for ECDSA implementation, which is not impacted.

    If you have any questions, please email us at [email protected].

    https://nvd.nist.gov/vuln/detail/CVE-2022-21449
    Bug Fixes
    • Operations that required re-authentication (e.g. export, reset master password, etc) were not accepting the password, if the session was resumed from a page reload or "Stay Logged In". This has been resolved.

    https://docs.keeper.io/user-guides/export-and-reports/shared-records-report
    View Page

    Vault

    The Keeper Web Vault and Keeper Desktop App share a common codebase. Desktop app is deployed as an Electron application to Windows, Mac and Linux platforms.

    Vault Version 16.3.1

    Released on Nov 17, 2021

    Bug Fixes

    • VAUL-5079: Unable to login with Internet Explorer 11

    Improvements

    • VAUL-5032: 508 Accessibility updates (checkboxes, menus, contrast and resizing)

    Vault Release 16.8.9

    Released on Feb 13, 2023

    Improvements

    • VAUL-5653: Force auto-update all users to 1,000,000 PBKDF2 iterations

    • VAUL-5655: Switch transmission key from RSA to EC

    Bug Fixes

    • KDE-1333: LastPass import missed some custom fields such as SSH keys

    Vault Version 14.14.1

    Released June 12, 2020

    Bug Fixes

    • Fixed: The import instructions from a ZOHO file are incorrect causing fields to not parse correctly.

    • Fixed: User receives error when attempting to import a .csv file with three fields.

    • Fixed: Import instructions missing for JSON files.

    • Fixed: Automated import form LastPass is unresponsive and no longer displays progress animation.

    Vault Version 15.0.16

    Released on February 15, 2021

    Bug Fixes

    • VAUL-4643: Login hangs when a user converts from Master Password to SSO Cloud login.

    • VAUL-4644: Record "info" screen sometimes does not return the user information in Last Modified date.

    Vault Version 15.0.1

    Released September 4, 2020

    Bug Fixes

    • Fixed: New Enterprise users (non-SSO) are prompted for device approval prior to account creation.

    • Fixed: User login to web vault from browser extension fails on IE11 browsers.

    Vault Version 15.0.8

    Released on October 16, 2020 @ 10PM PST

    Bug Fixes

    • VAUL-4487: Users who created their account prior to several years ago, who are part of an Enterprise without a Master Password policy, with a Master Password that is less than 10 characters, are being prompted to change their Master Password upon logging into the vault. However, the resulting flow is not enforcing the 10-character minimum, so the user may enter into a confusing loop. This issue is being fixed EOB today.

    Improvements

    • KDE-940: Removed legacy PBKDF2 Iteration settings

    • KDE-939: "Stay Logged In" setting now appears on the Keeper Desktop application.

    Keeper's Response

    On May 31, 2022, Keeper received a report from the researcher about a potential vulnerability. We requested a video from the researcher to demonstrate the reported issue. Based upon our analysis, we determined the researcher had first installed a malicious application and subsequently, accepted a prompt by Keeper to force the association of the malicious application to a Keeper password record.

    Keeper has safeguards in place to protect users against automatically filling credentials into an untrusted application or a site that was not explicitly authorized by the user. On the Android platform, Keeper prompts the user when attempting to autofill credentials into an Android application or website. The user is asked to confirm the association of the application to the Keeper password record prior to filling any information. On June 29, we informed the researcher of this information and also recommended that he submit his report to Google since it is specifically related to the Android platform.

    Generally, a malicious Android application would first need to be submitted to Google Play Store, reviewed by Google and subsequently, approved for publication to the Google Play Store. The user would then need to install the malicious application from Google Play and transact with the application. Alternatively, the user would need to override important security settings on their device in order to sideload a malicious application.

    Keeper always recommends that individuals be cautious and vigilant about the applications they install and should only install published Android applications from trusted app stores such as the Google Play Store.

    Resources

    A screenshot of Keeper's protection in place is displayed below. A user is prompted to trust the application from retrieving and filling the specified credentials. This security feature has been in place for several years and no additional updates are required.

    Keeper Android prompt for Autofill

    This simple Android app demonstration can be viewed on Keeper's public Github repo: https://github.com/Keeper-Security/android_webview_autofill

    To learn more about how to keep your smartphone safe, please visit: https://www.keepersecurity.com/blog/2022/10/13/how-to-keep-your-smart-phone-safe-and-personal/

    If you have any questions, please email us at [email protected].

    VAUL-5867: Support for TOTP seeds in CSV import method

    Support for Two-Factor Code in CSV import
    • VAUL-5177: Import from Thycotic Secret Server / Delinea

    Import from Thycotic / Delinea Secret Server

    Bug Fixes

    • KDE-1364: Crash when double-clicking the Touch ID icon

    • KDE-1365: Entering an incorrectly formatted username in SSO Connect on an ASDF Domain causes a crash

    Keeper Blog
    Bug Fixes
    • KDE-1043: Horizontal scrollbar appears in record details

    DEF CON 2025

    Response to "Clickjacking" report from DEF CON 2025

    Description

    At DEF CON 33, a researcher presented on Clickjacking (UI redressing), where users can be tricked into clicking hidden UI elements. The researcher showed a scenario in which a malicious site could prompt a user to click on a transparent password manager autofill interface.

    Keeper already blocks cross-domain autofill but collaborated with the researcher to further strengthen the browser extension as described below. We value the security research community and regularly collaborate with researchers to help protect our customers.

    Timeline

    • Apr 9, 2025: Researcher reported the issue. Keeper classified it as low severity since autofill from untrusted domains is already blocked.

    • Apr 15, 2025: Engineering delivered a patched test build to the researcher within 8 days. Researcher noted the fast response.

    • May 26, 2025: Fix released in browser extension v17.1.2 (see ).

    Keeper's Protection

    Keeper’s browser extension is designed to autofill credentials and payment information only on websites explicitly saved by the user. This creates a trust relationship between the user and the destination website. Keeper does not allow cross-domain autofill under any circumstances.

    Users can optionally enforce stricter matching by requiring a full subdomain match for autofill. This behavior can be enabled via the browser extension’s settings, and it can also be enforced organization-wide by administrators through role-based policies in the Keeper Admin Console.

    Autofill of payment cards and address information only occurs if the site matches a saved record in the user's vault, and the user has explicitly saved those details for the site. If a match does not exist, the user must manually confirm the autofill operation through a native popup dialog.

    Reported Behavior:

    The scenario reported by the researcher required:

    1. Explicitly saving a Keeper record for a malicious or compromised website to your vault,

    2. Visiting that site again, and

    3. Interacting (clicking multiple times) on UI elements overlaid with a transparent Keeper autofill interface.

    In this context, the user has already trusted the website by saving credentials to their vault with the exact root domain of the website. There is no vector for a different, unrelated root domain to initiate autofill without this precondition.

    Because this relies on the user already trusting and saving the same domain, there is no cross-domain attack vector. The issue was therefore rated low severity, but Keeper implemented additional protections as a precaution.

    Updating

    The Keeper Browser Extension v17.2 updates automatically across Chrome, Firefox, Edge, Safari, Brave, and other Chromium-based browsers. No further action is required by users.

    Contact

    If you have any questions, please email us at [email protected].

    CVE-2023-5217

    Heap buffer overflow in libvpx

    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-5217

    Description

    Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

    Impact to Keeper

    Keeper Security may have been impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.25 and published .

    If you have any questions, please email us at [email protected].

    CVE-2023-36266

    Response to CVE-2023-36266

    NIST Link

    https://nvd.nist.gov/vuln/detail/CVE-2023-36266

    Description

    A researcher filed a CVE (CVE-2023-36266) in regards to the scanning of local memory when using Keeper Desktop and browser extension software.

    Impact to Keeper

    We have disputed this CVE. Keeper performs quarterly pen testing with 3rd party experts including , and independent security researchers against all of our products and systems. Keeper has also partnered with to manage its vulnerability disclosure and bug bounty programs. As part of our testing, we explicitly test the storage of secrets in memory while our applications are in use, and when logged out. Keeper removes all decrypted vault data from memory upon logout and provides settings to also wipe memory and restart the app upon vault auto-lock. This functionality has been verified by our pen testers and the test results are available for customer review.

    As with any software product, if an attacker controls the local computer, the attacker can perform any action the user or an application could perform. In the case of a password manager, if an attacker can read arbitrary memory, then an attacker can read decrypted contents of the password manager while the application is in use. This applies to any password management product. Security researchers understand that a fully compromised device scenario has severe implications for the user.

    Keeper has multiple security mechanisms in-place to defend against compromised end-user devices. Keeper client software only decrypts the user's vault upon successful login, and only stores decrypted values during use in volatile memory. When a user is logged out or timed-out, decrypted values are removed from memory. In addition, the Keeper desktop application provides a setting in the "Security" screen which forces a full application restart upon auto-logout, to ensure that data is cleared upon locking. In the case of a web browser such as Chrome, Keeper requests the clearing of memory after logout, however the memory management of the underlying browser is outside of Keeper’s control and can sometimes take time for the memory management system to complete this operation.

    With all end-user software, it's important to ensure that users reduce the risk of a compromised device by following security best practices, keeping all software up-to-date and installing adequate antivirus / malware protection software.

    Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class Zero-Knowledge and Zero-Trust security model and transparent approach to sharing it with the public. For information regarding Keeper's security and encryption model, please visit:

    If you have any questions, please email us at [email protected].

    Troubleshooting

    Solutions to common Keeper issues and questions based on platform

    iPhone & iPad

    Troubleshooting and support for the Keeper iOS App

    Downloads

    Keeper for iOS is available at the Keeper download page.


    User Guides

    The iOS user guide is with additional info about autofill and passkey setup .


    iOS Missing Payment Cards

    If your payment cards are missing, go to Keeper > Account tab > Sync > Sync Now.


    iOS Stuck on Syncing

    If you are seeing syncing stuck on the screen, please check the following:

    • Update to the latest version of Keeper on the App Store

    • Instead of logging in with biometrics, try to login with your Master Password (clicking "Next")

    • After a successful login, visit the settings screen of Keeper and turn OFF/ON the Face ID or Touch ID setting.


    Syncing, Updates and Device Approvals

    If adding a password on your desktop doesn't automatically sync down your mobile device, ensure that push notifications are enabled.

    iOS and Android apps use push notifications for functionality such as:

    • Realtime sync

    • Device approvals

    • Sharing notifications

    Please ensure that push notifications for Keeper are enabled on your device (Settings > Notifications > Keeper and enable "Allow Notifications"). Also, "Do Not Disturb" mode will prevent certain notifications from appearing. Device approvals will not be received if you have iOS in Do Not Disturb mode.


    Other iOS Issues

    Having issues on iOS? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.

    Before resetting your mobile app, make sure you can first access Keeper on the or and ensure that all of your data is appearing.

    • On the front door of the Keeper app, tap on "Need Help?" then tap Reset Keeper.

    • Launch Keeper and Login to your account.

    • You will be asked to approve the device during the login process.


    Feature Requests

    We love hearing from iOS customers. Send your feature requests to: [email protected].


    Beta Slack Channel

    Join our to post questions, feedback or receive new beta versions.

    Android

    Troubleshooting and support for the Keeper Android App

    Downloads

    Keeper for Android is available at the Keeper download page.


    User Guides

    The Android user guide is with additional info about autofill and passkey setup .


    Syncing Errors

    If you are receiving an error on your mobile app, please make sure to update to the latest version. After you update, we recommend performing a Full Sync by clicking on Sync > Sync Now. This tends to resolve any searching or record-related issues.


    Syncing, Updates and Device Approvals

    If adding a password on your desktop doesn't automatically sync down your Android device, ensure that push notifications are enabled.

    Android apps use push notifications for functionality such as:

    • Realtime sync

    • Device approvals

    • Sharing notifications

    Please ensure that push notifications are enabled for Keeper from your device's settings menu. Also, "Do Not Disturb" mode will prevent certain notifications from appearing.


    Other Android Issues

    Having issues on iOS or Android? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.

    Before resetting your mobile app, make sure you can first access Keeper on the or and ensure that all of your data is appearing.

    • Go to your device Settings icon, and then tap on the Applications menu. Scroll down until you see the Keeper icon and tap on it. Click on the Clear Data button, and then click OK. The next time you load Keeper, it will be reset to its original settings. Another way is to press-and-hold on the Keeper icon, then open the application info and clear the data.

    • Re-install Keeper from Google Play on your device

    • Launch Keeper and Login to your account. You will be asked to approve the device during the login process.


    Feature Requests

    We love hearing from Android customers. Send your feature requests to: [email protected].


    Beta Slack Channel

    Join our to post questions, feedback or receive new beta versions.

    Preview Release

    Early access Preview (pre-release) Keeper Vault and Desktop app

    When a major release is planned, Keeper publishes a Preview version of the Vault and Desktop app, documented below. The pre-release version is typically published 1 week before public release.

    Web Vault Preview

    If you encounter any issues with this version, please email [email protected].

    • US:

    • EU:

    • AU:

    Desktop App Preview with Forcefield

    Keeper Desktop is a native application for Windows, macOS and Linux platforms. On Windows devices, this is bundled with the service.

    The Desktop App preview does not auto-update. On Windows computers, a new version of the pre-release version requires a full uninstall and re-install of Keeper. This does not affect stored data.

    • Mac (.dmg) -

    • Mac (.pkg) -

    • Windows (.appx) -

    • Windows (.msix) -

    Standalone Forcefield Preview

    Keeper Forcefield can also be deployed on a standalone basis, without the Keeper Desktop application. The URL and MSI installer for the Forcefield preview is available here:

    Send feedback to: [email protected]

    Vault Release 17.4

    Released on Sep 30, 2025

    Enhancements

    • VAUL-4284: Added numerous updates to KeeperAI threat detection across PAM resources, PAM configuration settings, gateway settings and session history. about KeeperAI for privileged sessions.

    • KDE-1639: Published Keeper Desktop to Snap store for Linux. Snapcraft (and Snaps) are used on numerous Linux distributions, including Ubuntu, Debian, Fedora, RHEL, CentOS, AlmaLinux, Rocky Linux, Linux Mint, Manjaro, and openSUSE. Snap link:

    • KDE-1738: We've rewritten the entire Hotkey system in the desktop application from the ground up.

      • Addressed several reported inconsistencies between macOS and Windows platforms.

      • Hotkeys can now be further customized with any character or symbol.

      • You can allow virtual input from software like Synergy or 3rd party applications to optionally control hotkeys.

    • The Password Importer standalone executable for Microsoft Windows has been improved to import passwords stored in Chrome. NOTE: Enterprise customers may need to add an exclusion policy on their EDR platform if Keeper is flagged.

    Bug Fixes and Improvements

    • VAUL-7455: We fixed an issue where PAM features were displayed even when the user didn’t have the required enforcements.

    • VAUL-7612: We fixed an issue where the password generator did not retain the length of the previous password.

    • VAUL-7252: We enhanced the search bar accessibility on smaller screens.

    • VAUL-7633: We fixed an issue where selecting and unselecting options when creating a Gateway did not preserve the previous form state.

    Vault Release 17.1.1

    Released on March 12, 2025

    Enhancements

    • VAUL-6349: Updated the Security Audit tab in Vault to ensure the overall Security Audit score matches the per-user score in the Admin Console, reducing confusion.

    Other Updates

    • KDE-1534: Updated new installs to default to the native browser for SSO authentication instead of the app browser.

    • VAUL-7176: Fixed an issue where setting up a hardware security key required extra steps; the Vault now prioritizes it using the “hints” syntax.

    • VAUL-7262: PAM Updated router calls to use the /api/user path for commands.

    Bug Fixes

    • KDE-1607, 1606, 1608, and 1619: The SSH Agent will scan General typed records for private key file attachments

    • KDE-1611: Fixed an issue where selecting Two-Factor Authentication triggered the Offline Access dialog.

    • VAUL-7094: Fixed an issue preventing master password login when session resumption and 2FA were enabled

    • VAUL-6787: Fixed an issue where the folder structure in Delete Items did not match the folder structure in Vault.

    Vault Release 17.1.0

    Released on February 13, 2025

    Get started by setting up your KeeperPAM sandbox! Visit to begin.

    KeeperPAM is now available for all customers. Keeper Vault 17.1 and newer is required to access the new privileged access management features.

    For more information on KeeperPAM, visit the following:

    • Website

    New Features

    • - manage all rotations directly from the Vault UI

    • - instantly and securely access assets within their target infrastructure

    • - use native apps for establishing remote access

    • - protect web-based apps

    Activating KeeperPAM features requires a license. Contact your Keeper account representative for details.

    Improvements

    • Browser tab now shows username: "Keeper® Vault - [email protected]"

    Vault Release 16.11.3

    Released September 20, 2024

    Enhancements

    • VAUL-6966: Updated the vault login screen animations to stop after 30 seconds

    • VAUL-6606: Updated the remaining router API endpoints to enhance performance and security.

    • VAUL-6785: Adjusted the location of the visibility "eyeball" icon for long passwords, ensuring consistent UI across all record views.

    • VAUL-6821: Introduced a new dialog that users are required to accept when being invited to a managed enterprise. Letting users know the enterprise administrator has the ability to manage their vault in accordance with company policies.

    • VAUL-6866: Updated URL handling to restrict it to standard HTTP/HTTPS protocols, improving security and validation.

    • VAUL-6869: Updated the title and meta description of the settings page to enhance SEO and search engine visibility.

    Bug Fixes

    • VAUL-5853: Addressed formatting inconsistencies within custom record types for Security Q&A fields.

    • VAUL-5898:Fixed an issue where using the search and location filter together resulted in invalid or unexpected search results.

    • VAUL-6051: Fixed an issue where the UI adjusted incorrectly after closing an error message generated by an invalid value in the native app filler.

    • VAUL-6247

    Vault Version 16.0.0

    Released April 26, 2021

    New Features and Improvements

    • Introducing Record Types for Web Vault & Desktop App (Limited Release) This release introduces a powerful new feature called "Record Types", which gives users the ability to create records of various template types, grouped into categories, each containing a unique collection of field types and functionality fields within the record. Record templates can be created by Admins that are custom to the needs of the business. This feature is only available for Enterprise customers, activated on an individual basis at this time, because the Browser Extension, iOS and Android apps are still under development. If you are interested in being an early adopter of Record Types, please contact your customer success team member at Keeper and we'll activate the feature.

    • Generate a Password in KeeperFill for Apps Keeper's password generator is now within easy reach in the KeeperFill for Apps toolbar landing screen. Users can generate and copy the secure password or use it to create a new record.

    • Comprehensive Keyboard Command Functionality for KeeperFill for Apps

    • Support for NTLM Authentication for Microsoft Windows Customers

    Bug Fixes

    • KDE-959: The "Session Timed Out" dialogue appears when logging into a different account after a session timeout occurs

    • KDE-1034: When a user attempts to switch from US to EU region at login, an Uncaught TypeError is returned

    • KDE-977: Selecting "Create an Account" in KFFA opens the login page on Keeper Desktop

    • VAUL-4721: The "Admin Console" button in the Vault fails to redirect Enterprise users to the console

    Vault Version 15.0.12

    Estimated Release Date: December 31, 2020

    Improvements

    • VAUL-4547: Support for Kaspersky password import

    • VAUL-4552: Admins now receive a warning before removing themselves from a shared folder

    • VAUL-4566: Improved performance handling of vaults with large data sets

    • VAUL-4551: Enterprise users to receive notification with explanation for Master Password change and complexity requirements upon login

    Bug Fixes

    • KDE-945: User receives error message after closing Desktop App and relaunching

    • KDE-962: "About Keeper" options menu fails to appear after first launch of Desktop App on Windows

    • KDE-972: KeeperFill for Apps fails to respond to hotkeys when switching between apps

    • KDE-973: Recipient of a shared record is required to login again after the shared record has been edited

    Vault Version 15.0.18

    Released on March 4, 2021

    Features

    • KDE-990: Support for logout timer with more than 1440 minutes

    Bug Fixes

    • KDE-1021: Errors when logging into Azure

    • VAUL-4643: Login hangs when a user converts from Master Password to Cloud SSO

    • VAUL-4644: Record "info" screen is not showing the user who made the change

    • KDE-839: Update Electron framework dependencies

    Vault Version 16.3.0

    Released on Nov 5, 2021

    New Features and Improvements

    • VAUL-4710: Secrets Manager user interface is now generally available on the Keeper Web Vault and Desktop App. For more information about Keeper Secrets Manager, see:

      https://docs.keeper.io/secrets-manager

    • VAUL-4904: Visual improvements and workflow improvements for Record Types template creation.

    • VAUL-5062: Added MyKi password manager to Keeper Import screen

    Security Updates

    • VAUL-5038: Migrated from webpack4 to webpack5

    • KDE-1163: Additional changes to ensure that logout clears all memory. User-initiated logout performs full restart of the Keeper Desktop application.

    Bug Fixes

    • KDE-1164: KeeperFill for Apps will only process hotkeys when a record has been selected. This prevents conflicts between existing hotkeys and KeeperFill.

    • KDE-1169: Sync errors after deleting a Shared Folder

    • KDE-1168: "Object no longer exists" error when switching between KFFA and Desktop App

    Vault Version 16.5.0

    Released on March 31, 2022

    Features & Improvements

    • VAUL-5035: Ability to convert "general" to new Record Types

    • VAUL-4879: Role enforcement to activate Stay Logged In

    • VAUL-4893: Role enforcement to enable Self Destruct

    • VAUL-5201: Improved performance of uploads and downloads

    Bug Fixes

    • VAUL-5187: QR Code upload fails for certain formats

    • VAUL-5202: MyKi and 1Password TOTP record imports are not autofilling*

      (*) To resolve existing records, run the verify-records command in .

    • VAUL-5191: TOTP and custom fields not available in CSV export

    Vault Version 16.2.6

    Released on Oct 22, 2021

    Improvements

    • KDE-1150: Support for CCH Axcess native app autofill

    • VAUL-4991: Changed Software License Number to a hidden field

    Bug Fixes

    • KDE-1157: Improved support for Azure Conditional Access

    • KDE-1156: Remove use of legacy windows registry key which generates a report in Cybereason

    • VAUL-5036: Restore of Record Type records

    • VAUL-5018: Showing "unexpected error" when creating user accounts with a pending transfer acceptance

    Vault Version 15.0.0

    Released September 3, 2020

    Benefits & Features

    • New "Help" Button - A "Get Help" button has been integrated into the Vault login page. Upon clicking this button, the user will be prompted to select either "Forgot Master Password" or "Get Help". "Get Help" redirects the user to Keeper's Support page where our user guides and Support Team can be reached.

    • Enhanced Enterprise Authentication Flow - Keeper has launched a new authentication flow for our customers with Enterprise plans that simplifies deployment and usability while enhancing security.

      • If Keeper recognizes an end user’s email domain as an SSO-enabled Enterprise, the user will be automatically routed to their identity provider instead of having to type in the Enterprise Domain string.

      • For Master Password users, if a device is recognized, and 2FA is activated, the user will receive a prompt prior to typing in their Master Password.

    Bug Fixes

    • Fixed: An error message fails to appear when a user has reached device approval limit.

    • Fixed: Upon logging into the vault, the device approval Keeper Push prompt displays a key value.

    • Fixed: When an SSO user attempts to delete all their owned records they a incorrectly prompted to enter a Master Password.

    Okta Breach

    Okta security breach disclosed in October 2023

    Description

    Keeper Security is aware of the , where cybercriminals accessed client files through its support system. As part of its support process and system, Okta’s customers upload HTTP Archive (HAR) files which contain sensitive information from the user's web browser. This information included session tokens that were used to impersonate several Okta customers.

    Vault Release 17.2

    Released on May 18, 2025

    Security Updates

    Keeper Desktop version 17.2 includes the installation and activation of Keeper Forcefield. Keeper Forcefield is an advanced endpoint security product for Windows that protects sensitive applications and processes from unauthorized access. It is specifically designed to defend against threats such as memory scraping and credential harvesting from malicious software installed via phishing or other attacks.

    More info:

    • Website:

    Vault Release 16.11.0

    Released May 2, 2024

    Features

    The 16.11.0 release contains several new features, including , , and .

    Passphrases

    Vault Release 16.9.0

    Released April 6, 2023

    Keeper is proud to announce our release of version 16.9.0 of our Web Vault and Desktop App. This new version includes a new design with a user interface refresh along with some new features and bug fixes.

    See our blog post for additional details:

    New Features

    Vault Version 16.7.0

    Released on June 21, 2022

    Features

    • VAUL-5165: Offline Create/Edit Record capability

    Vault Version 16.0.1

    Released on May 21, 2021

    This is a bug fix release that mainly focuses on the new Record Types feature (still in beta). Therefore most customers are not affected by the bug fixes listed below.

    Bug Fixes

    • KDE-1077: Logout from KeeperFill for Apps generates an error

    Vault Version 15.0.4

    Released September 18, 2020

    Bug Fixes

    • Fixed: The Web Vault logs out ahead of the browser extension and generates error messages

    Vault Version 14.13.0

    Released April 16, 2020 for Desktop App

    Benefits & Enhancements

    KeeperFill for Apps Redesign - This release entails a comprehensive design and technical update of KeeperFill for Apps, dramatically enhancing the user experience with the Keeper Desktop App. The Desktop App window can now be closed but remain running and accessed through the system tray via the familiar Keeper icon.

    Many of the existing features of Keeper's Desktop App can now be applied through KeeperFill for Apps, such as: filling credentials and launching websites, viewing all records and favorites, adjusting settings, and accessing Keeper's User Guides. Additionally, within the Settings menu, the following KeeperFill hotkey actions can be customized by the user, further streamlining their experience with Keeper for Desktop:

    Vault Version 15.0.5

    Released September 1, 2020

    Features & Enhancements

    • Login V3 General Availability (GA) More information available here:

    Vault Version 15.0.10

    Published on December 8, 2020

    Special Notes

    • Password Complexity requirements are checked upon every login, not just during Master Password Reset. If you have a user being asked to change your Master Password, they are likely using a password that does not meet the policy requirements.

    Vault Version 15.0.7

    Released October 16, 2020

    Bug Fixes

    • KDE-933: Fix for minor UI display issue

    • KDE-932: User unable to proceed past 2FA timeout screen and return to login upon clicking "OK" button when prompted

    Vault Version 14.14.0

    Released June 9, 2020

    Features & Enhancements

    • Privacy Screen - Admins now have the ability to control the viewing (unmasking) of passwords based on a specified domain. Additionally, it prevents the user from changing the website URL after the record has been saved. This policy is enforceable by the Admin for individual domains within each of their Generated Password Complexity settings by enabling "Apply Privacy Screen".

    Vault Version 15.0.6

    Released October 10, 2020

    Enhancements & Benefits

    • VAUL-4459: SSO Cloud users are able to auto-login and logout to the vault and browser extension simultaneously.

    Vault Version 16.2.0

    Released on September 14, 2021

    New Features & Improvements

    • Support for Azure Conditional Access on the Keeper Desktop application for users who login with Single Sign On. Previously, Azure Conditional Access policies could not be added to Keeper.

    Vault Version 14.13.2

    Released May 5, 2020

    Benefits & Enhancements

    • Support for Chrome v80 Password Import - Support established for the import of passwords from Chrome v80 and newer on Windows devices.

  • VAUL-6394: Fixed an issue where the Web Vault allowed uploads past the storage limit; users are now blocked when the limit is reached.

  • VAUL-6090: Fixed an issue where shortcut-linked records were not retained in shared folders after CSV export/import, preventing data loss.

  • VAUL-5989: Fixed an issue where the password font displayed incorrectly when Japanese was selected on Windows 10/11.

  • VAUL-6902: Fixed an issue where restoring a file attachment record caused repeated error messages and made attachments inaccessible in the Web Vault.

  • VAUL-7095: Fixed an issue where creating a new record with a file attachment showed an empty record state instead of the record details.

  • VAUL-7104: Fixed an issue where switching to Suomi/Svenska caused a Content Security Policy error in Stack.

  • VAUL-7102: Fixed an issue where importing from Proton Pass did not include login details.

  • VAUL-7109: Fixed an issue where "Share only in SF allowed" displayed the wrong modal in OTS.

  • VAUL-6826: Fixed an issue where V3 records generated an error when viewing or downloading attachments.

  • VAUL-7155: Fixed an issue where sharing a record to an account with an invalid email format failed silently instead of displaying an error message.

  • VAUL-7101: Fixed an issue where expired business admins were not redirected to checkout and received the wrong message.

  • VAUL-7184: Fixed an issue where failed invite attempts incorrectly showed a success message instead of an error.

  • VAUL-7216: Fixed an issue where Firefox always assumed a security key was inserted for 2FA, preventing access to alternative methods; a modal now informs the user.

  • VAUL-7219: PAM: Fixed an issue where the Gateway button was not visible despite the appropriate permissions being enabled.

  • VAUL-7264: Fixed an issue where the Save & Share button remained disabled after validation.

  • VAUL-7268: Fixed an issue where the Add button in the Shared Folder Share tab was enabled before entering an email.

  • VAUL-7300, 7306, 7303, 7310, 7315, 7313, 7314, 7316, 7317, and 7321: Fixed several Security Audit bugs.

  • : Fixed a bug where the "Success" message was missing after successfully removing users from shared records.
  • VAUL-6312: Resolved a security issue where creating a duplicate record allowed shared users to access the full history, including previous sensitive information.

  • VAUL-6385: Updated privacy screen for Teams / Owners, ensuring compliance with privacy requirements.

  • VAUL-6403: Fixed an issue where users with role-based enforcements preventing record creation in shared folders were not receiving feedback when using "Create Duplicate" on a V2 General record.

  • VAUL-6424: Fixed visual artifacts in the left navigation bar that appeared as unexpected white pixels.

  • VAUL-6598: Fixed an issue where dropdown menus opened via the enter key couldn't be navigated using arrow or tab keys, improving screen reader accessibility.

  • VAUL-6599: Resolved an issue where users needed to press the arrow key twice to focus on both icons and text when navigating the "Create New" menu or filter dropdowns via the Enter key.

  • VAUL-6609: Addressed an issue where attachments in the detail pane of V3 shared records were not being displayed properly after edit or sync.

  • VAUL-6652: Resolved UI issue where the PAM script model was cut off, improving the user experience.

  • VAUL-6806: Fixed an issue where security data updates were not occurring as expected, improving data reliability.

  • VAUL-6827: Resolved an issue where extra white space appeared in custom fields, improving layout consistency.

  • VAUL-6839: Addressed issues related to missing or bad security data being propagated in certain scenarios.

  • VAUL-6865: Removed the deprecated asmcrypto.js dependency, improving app performance and security.

  • VAUL-6882: Fixed a password complexity error that occurred during save, when using the password rotation setting in certain scenarios.

  • VAUL-6912: Resolved overlapping text issues on Mac/Chrome browsers when displaying tabs.

  • VAUL-6964: Fixed an issue where the logout timer enforcement was not working as intended.

  • VAUL-6967: Applied updates to sync timeline, loading vault records and then updating BreachWatch & Security Audit scores.

  • KDE-903: Hotkey "CMD+TAB" focuses on KeeperFill for Apps when hidden instead of Desktop App (Mac)

  • VAUL-4560: Deleting a record shortcut also deletes the original record

  • VAUL-4468: Importing CSV records with "can edit" permission does not set permission

  • VAUL-4562: Entering an email address with a trailing space at login generates an error message

  • VAUL-4574: Sharing a folder causes login errors for the sharing user

  • KDE-1009: Update Electron framework

  • KDE-1005: Touch ID + Yubikey + using a backup 2FA method fails login

  • KDE-1007: Signing in on KeeperFill for Apps using SSO and Duo not receiving verification email

  • KDE-1013: Clicking to copy a field sometimes didn't copy

  • KDE-1011: Better handling of Logout Timer setting

  • KDE-990: Logout Timer improved handling and support for more than 1440 minutes

  • KDE-1018: Windows Hello activation issue on Microsoft Store version

  • VAUL-5039: Record Type fields saving the translated label
  • VAUL-5041: Importing CSV with limited columns can throw an error

  • VAUL-5042: Can't view notes when Privacy Screen is ON and Masking is ON

  • VAUL-5049: Can't change the record type (causes crash)

  • VAUL-5000: Prevent record copy when Record Type is restricted by role enforcement

  • VAUL-4978: When sharing is disabled, the action silently fails when adding a user to a shared folder.

  • VAUL-5014: Edit and Delete actions in the Grid View don't work

  • VAUL-4964: "Unknown sharing error" when the user's email has never been verified.

  • VAUL-4999: Error when trying to edit a custom Record Type when the type is restricted.

  • VAUL-5030: Importing records can generate an app crash

  • VAUL-4869: Import column selections don't persist when there are many fields to map

  • VAUL-5001: During import of CSV, column changes are lost when scrolling horizontally

  • VAUL-4934: Large number of image attachments in a record can generate errors when loading thumbnails.

  • Keeper Push, Keeper’s proprietary notification-based device approval system, simplifies the device approval process without compromising security. Keeper will now support 2FA code entry from a TOTP or text message, or a push notification to an existing, recognized device.
    Fixed: An internal error message appears after a user denies DUO push verification.
  • Fixed: InvalidKey error message appears in place of the correct KeePass translation string during import process.

  • KDE-1067: Record Type creation not using the generated password

  • VAUL-4811: Australia data center link to Keeper Importer generates 404

  • VAUL-4784: Edit button missing

  • VAUL-4790: Decryption issue with Linked Record Types

  • VAUL-4786: Privacy Screen is hiding notes and custom fields

  • VAUL-4789: Uploading large number of files produces "throttle" errors

  • VAUL-4791: Decryption errors inside Shared Folders with Record Types

  • VAUL-4667: Error message when using Account Recovery flow

  • VAUL-4524: BreachWatch status failure with "status 400"

  • VAUL-4787: Vault grid view now showing new Record Type icons

  • VAUL-4800: Sharing and Emergency Access showing confusing messages

  • VAUL-4805: Deleting shared record not showing in Deleted Items

  • VAUL-4810: Newly attached files not creating record links, produces error with Record Types

  • VAUL-4825: BreachWatch admin reports not getting updated

  • Improvements

    • KDE-1072: Update Electron Framework to 12.0.6

    Fixed: Shared folder permissions changes do not automatically appear for users in detail view as expected.

    Launch KeeperFill

  • Fill Username

  • Fill Password

  • Open Desktop App

  • Logout

  • Bug Fixes

    • Fixed: Users are not able to save a new billing address when it is created within the New Payment Card window.

    • Fixed: The shadow of KeeperFill for Apps remains behind after the window has been closed.

    • Fixed: In certain scenarios, a password import from newer versions of Firefox cause the Keeper Desktop App to crash.

  • VAULT-4478: Unable to login with SSO Cloud v15 in these scenarios: (1) Existing vault user, adds v15 extension, logging into the vault doesn't also login to the extension. (2) New vault device and new browser extension device, unable to login to the vault. The "push" screen blinks and hangs.

  • VAUL-4482: User receives "You do not have the required privilege to perform this operation." when resetting their Master Password.

  • VAUL-4483: User registration emails to create Vault with a Master Password do not work if the browser extension is pre-loaded on the device prior to receiving the invitation.

  • VAUL-4484: User logging into the Extension is forced to change Master Password when complexity rules change. However, the Web Vault was not forcing prompt.

  • VUL-4479: Account Recovery + Duo Push providing "invalid code" after submitting.

  • Master Password Re-entry Enforcement - This role enforcement allows Admins to require their users to re-enter their Master Password in order to unmask or copy a password.

  • Sharing & Uploading Enforcement Policy - This role enforcement policy allows Admins to prevent their users from importing records from Web App and Desktop App.

  • Bug Fixes

    • Fixed: "Can Edit" and "Can Manage" text is not translated when a user attempts to import from a JSON file. Instructions for the JSON import feature have been updated and can be referenced here.

    • Fixed: New user accounts prematurely display step 3 of the "Quick Start" walkthrough as completed.

    • Fixed: Various issues related to the privacy screen feature within the Admin Console.

    • Fixed: KeeperFill for Apps crashes when unlocking in offline mode.

    • Fixed: The Keeper icon is missing from the dock on Linux operating systems.

    VAUL-4400: Implementation of file attachment support for KDBX file format
  • KDE-929: At login, the region automatically defaults to the region the user most recently has used

  • Bug Fixes

    • VAUL-4471: The vault stores a cache for vault_login, overwriting new user Enterprise email invitations

    • VAUL-4463: Excessive update_security_data requests are dispatched

    • VAUL-4427: User unable to connect via Cloud SSO using Edge 44 and Firefox browsers

    • VAUL-4311: Fix to allow the import of empty custom field values

    • KDE-926: DUO push fails in EU accounts

    • KDE-923: Windows Hello login fails in EU accounts

    • KDE-919: "Clipboard Expiration" option missing from Settings menu

    Bug Fixes
    • Fixed: A blank page appears when a user navigates first to the Sharing feature of a record then to Security Audit.

    • Fixed: A user receives "device_id" error upon editing an record.

    • Fixed: Issue preventing a user from saving Personal Info after an edit has been made.

    • Fixed: After the 2FA duration enforcement change has been made, system is unresponsive to DUO Push verification.

    • Fixed: Creating a new account following a login to an SSO account, triggers an error notification.

    Keeper Desktop version 16.10.9
    NCC Group
    Cybertest
    Bugcrowd
    https://docs.keeper.io/enterprise-guide/keeper-encryption-model
    located here
    here
    Web Vault
    Desktop App
    Beta Slack Channel
    located here
    here
    Web Vault
    Desktop App
    Beta Slack Channel

    VAUL-5195: Field validation on custom field Phone Number not working properly

  • KDE-1224: Linux app shows blank screen when using Yubikey

  • KDE-1222: Login on desktop app with Touch ID and Yubikey not working properly

  • KDE-1218: Default password generator in KeeperFill for Apps not including symbols

  • KDE-1223: Desktop App not maintaining disabled logout timer setting

  • Keeper Commander
    Impact to Keeper

    Keeper Security does not use any of Okta’s products internally - for Single Sign-On (SSO) or any other purpose. Therefore, Keeper’s internal business operation was not impacted by the security incident at Okta.

    Keeper is a zero-knowledge and zero-trust cybersecurity platform which means that all of the encryption of user data occurs on the user's device, and Keeper does not have the ability to access any customer data. Further, least-privilege, role-based access control and delegated administration permit and restrict access for all users in the system. Keeper's employees utilize the Keeper Enterprise platform for authenticating into websites and applications using strong and unique passwords generated by our software.

    Keeper SSO Connect® is a powerful feature of the Keeper platform which provides customers with the ability to authenticate into their Keeper vaults using their preferred SAML 2.0 identity provider - both on-premises and in the cloud. Keeper SSO Connect, when properly configured with Okta SSO, provides enterprise-wide authentication and end-to-end encryption with zero-knowledge and zero-trust security.

    For those customers who use Okta with Keeper SSO Connect for accessing their Keeper vaults, please implement the following best practices:

    1. Enforce MFA on the Keeper vault in addition to enforcing MFA at Okta for all privileged users. Keeper is the only Enterprise Password Manager that provides an additional layer of MFA to reduce the risk associated with an identity provider takeover attack.

    2. To prevent users from accessing their work vaults outside of approved locations and networks, administrators should activate IP Address Allowlisting. This is a role-based enforcement setting in the Keeper Admin Console which enforces that users can only access their vaults when their device is on an approved network. This should always be enforced for administrative roles.

    3. Reduce administrator privilege for SSO-enabled accounts. If an administrator uses Okta to authenticate into the Keeper platform, reduce the role privilege so that their administrative responsibility is limited in scope to perform their role with the organization.

    4. Ensure that at least one administrator is able to access the Keeper platform using a Master Password authentication method in case the SSO identity provider is unavailable.

    5. Activate Keeper's event reporting and alerting system into your security operations. Keeper integrates into any popular SIEM solution including Splunk and Datadog. In the Keeper Admin Console, alerts can be configured to notify your security team covering over 200 different event types.

    References

    Blog Post Regarding IdP Takeover Attacks

    https://www.keepersecurity.com/blog/2023/10/24/enforcing-least-privilege-mitigates-identity-provider-takeover-attacks/

    Keeper Enterprise Security Recommendations

    https://docs.keeper.io/enterprise-guide/recommended-security-settings

    Keeper SSO Connect

    https://docs.keeper.io/sso-connect-cloud/

    Keeper's Security and Encryption Model

    https://keepersecurity.com/security.html

    If you have any questions please contact [email protected].

    recent security breach at Okta

    Documentation: https://docs.keeper.io/en/enterprise-guide/keeper-forcefield

  • Standalone Download: https://www.keepersecurity.com/download.html?p=mac

  • To activate Keeper Forcefield, visit the Settings > Forcefield screen on your Keeper Desktop app for Microsoft Windows.

    Features

    • BreachWatch Update: Enabled non-BreachWatch users to run a free scan, showing a “Records at Risk” count with a CTA to upgrade for details.

    • Secure File Storage: Added contextual product info in the Keeper Vault attachment workflow.

    • UI Enhancements: Updated in-app messaging for improved clarity and a modern look.

    • Security Fixes: Resolved various Security Audit issues, including translations and score parity between Vault & Console.

    • PAM: Support for JIT, Discovery and Endpoint Privilege Manager capabilities.

    Changes

    • VAUL-7342, KDE-1624: Keeper Forcefield

    • VAUL-7273: Renamed "Renewal Date" to "Expiration Date" for clarity in the Vault.

    • VAUL-6358: PLG feature enables non-BreachWatch users to run a free scan, showing a “Records at Risk” count with a CTA to upgrade for details.

    • VAUL-6374: “PLG” Added contextual upsell for Secure File Storage in the Keeper Vault attachment workflow.

    • VAUL-7309: Allowed non-owners to submit security data for shared records.

    • VAUL-6800: Fixed Vault to read security blobs and reuse existing scores.

    • VAUL-6472: Updated in-app pop-ups for clarity and a modern look.

    Bug Fixes

    • VAUL-7310, VAUL-7329, VAUL-7338, VAUL-7339, VAUL-5258, VAUL-7350: We resolved a number of Security Audit issues relating to translations and score parity between Vault & Console.

    • VAUL-6091: Renamed "URL" to "Website Address" for V3, V2, and Custom Fields consistency.

    • VAUL-6036: Fixed issue where the Website Address field was incorrectly added as a custom field

    • VAUL-7347: Updated button shapes, enabled automatic BreachWatch scan on first login, and ensured the red dot appears on the BreachWatch badge for insecure records.

    • VAUL-7349: Fixed an issue where, after record creation or edit record action, KeeperFill displays a gray overlay.

    • VAUL-7352, VAUL-7353, VAUL-7354: Fixed multiple file attachment issues related to PLG.

    • KDE-1618: Fixed a desktop issue that allowed file uploads beyond the storage limit.

    https://www.keepersecurity.com/forcefield-endpoint-protection/
    Support provided for Touch ID and Windows Hello Login at the expired session screen

    Bug Fixes

    • Fixed: Accounts containing imported passwords do not calculate audit scores correctly.

    • Fixed: Various login screen display issues causing various login/logout side effects (Safari).

    • Fixed: When a user attempts to close the quick start module upon first login to the Web Vault, an error is triggered and window closes.

    • Fixed: Logging out while in Offline Mode, generates an "Internal Error" message.

    • Fixed: Canceling a Windows Hello Login, generates an "Error" message.

    • Fixed: KeeperFill for Apps crashes when user attempts to search their records.

    • Fixed: User unable to back out of the login screen once "Touch ID " is selected (Mac OS).

    https://docs.keeper.io/enterprise-guide/login-api-v3

    Read Me First

    Searchable FAQs

    Enterprise Admin

    Browser Extensions

    Web Vault & Desktop App

    iPhone & iPad

    Android

    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    July 25, 2025
    : Additional edge-case protections added in v17.2.0 (see
    ).
    release notes
    release notes
    CA:
  • JP: https://keepersecurity.jp/vault/preview

  • US_GOV: (No US Gov preview available for Web Vault)

  • Windows (.msi) - Download

  • Linux (.rpm) - Download

  • Linux (.deb) - Download

  • https://keepersecurity.com/vault/preview
    https://keepersecurity.eu/vault/preview
    https://keepersecurity.com.au/vault/preview
    Keeper Forcefield
    Download
    Download
    Download
    Download
    https://download.keepersecurity.com/forcefield/preview/keeperforcefield.msi
    https://keepersecurity.ca/vault/preview

    Hotkeys can be disabled. Visit the Settings > KeeperFill screen in the desktop app to configure hotkeys.

  • VAUL-7720: We updated the Record History UI to display the "Current Version" at the top, to match mobile apps.

  • VAUL-7656: We updated the Vault to support the latest protobuf definitions.

  • VAUL-7467: We fixed an issue where enterprise users could see the option to create a Self-Destructing Record during record creation even when the role enforcement was turned off.

  • VAUL-7664 & KDE-1696: We added numerous missing translations to our KeeperPAM user interface screens.

  • KDE-1657: We fixed an issue where changing the focused element with the arrow keys caused the focus highlight to become invisible.

  • VAUL-7542: Fixed an issue where scheduled monthly rotations did not account for daylight saving time.

  • VAUL-7539: Fixed an issue where rapidly clicking Save & Share when creating an SDR could create duplicate records.

  • VAUL-7609: Fixed an issue where BW, “has no scanned” was incorrectly displayed on V2 records without passwords but with attachments.

  • VAUL-7500: Fixed an issue in Japanese where the values for “Bytes Used of Bytes Total” were reversed.

  • VAUL-7698: Fixed an issue where rotation did not work for the initial example MySQL record in the sandbox records.

  • VAUL-7681: Fixed a start_login 406 error by clearing the token in local storage and registering a new device.

  • VAUL-7674: Fixed an issue where BreachWatch displayed an incorrect scan time.

  • KDE-1712: We updated the Windows tray icon on the desktop app.

  • KDE-1715: We fixed an issue where a fresh installation on Windows could not log in to an existing account on the first attempt.

  • KDE-1665: We have fixed an issue that caused an infinite spinner on the login page during a fresh installation.

  • KDE-1781: Updated packages to address CVE-2025-59343

  • On high resolution displays, resizing KeeperPAM sessions to full screen size was not also resizing text properly. This has been improved significantly.

  • https://snapcraft.io/keepersecurity

    - monitor usage for all privileged sessions

  • - discover and onboard resources and accounts into Keeper

  • - controlling privilege across your fleet of devices.

  • - PAM enforcement policies to enable and configure PAM feature permissions

  • KeeperPAM Documentation
  • VAUL-4516: Users are prompted for their 2FA code twice when logging into EU SSO Cloud account

  • Passphrases can now be generated and stored in the vault. The Password Generator includes advanced character/symbol policy preferences
    Generate Passphrases for Increased Password Strength

    Time-Limited Access

    Launched Time-Limited Access, which allows temporary sharing of records and folders with other Keeper users.

    Full Documentation Here

    Set an Access Expiration Period for Shared Documents

    Self -Destructing Records

    Launched Self-Destructing Records, which allows sharing of records with other Keeper users for a time period after which the record is deleted for both parties.

    Full Documentation Here

    Share Sensitive Information with Self-Destructing Records
    Specify an Expiration Date for the Self-Destructing Record

    Shared Item Recovery

    Recently deleted shared records from within shared folders can now be recovered from the "Deleted Items" section of the Web Vault and Desktop app.

    In the "Deleted Items" section of the vault, you'll see a new tab called "Shared Folder Contents". This tab contains records that were deleted by a user of the shared folder with "Can manage records" permission. Records which appear in this tab are able to be restored from any user who currently has access to the shared folder. This feature was created to make the restore process accessible from any shared folder participant when a record has been removed by any team member.

    For security reasons, if a change was made to the record after it was removed from the shared folder, it cannot be restored and the original owner must re-share it.

    Shared Folder Recovery from Deleted Items

    Bug Fixes

    • VAUL-5271: Fixed an issue that prevented record type changes with some records

    • VAUL-5628: Fixed an issue that prevented some date fields from being searchable

    • VAUL-5842: Fixed various issues with consistently updating fields on language changes

    • VAUL-6163: Fixed an issue that allowed entry of more than the five allowed emergency access contacts

    • VAUL-6168: Fixed a display issue when certain record types are disabled

    • VAUL-6198: Fixed an issue that prevented error message from being shown when attempting to invite a user with an invalid email address

    • VAUL-6242: Fixed an issue that prevented hover text from being displayed on truncated records

    • VAUL-6301: Fixed an issue where some countries would not sort properly in records with a Country field

    • VAUL-6340: Implemented hashing algorithm for account mapping within the vault

    • VAUL-6345: Implemented proper handling of international phone numbers in records

    • VAUL-6353: Fixed a UI issue where a password slider artifact would appear over search results

    • VAUL-6365, VAUL-6373, VAUL-6392: More descriptive errors are now displayed when attempting to create a record, folder or shared folder using an account that does not have appropriate rights

    • VAUL-6370: Fixed an issue syncing teams to the vault on initial sync

    • VAUL-6383: Fixed an issue that prevented a user from creating a shared folder under certain Granular Sharing Enforcement policies

    • VAUL-6393: Granular Sharing Enforcements now apply even in the vault is in offline mode

    • VAUL-6397: Fixed an issue with syncing records after ownership transfer

    • VAUL-6427: Fixed an issue importing from Proton Pass on Windows

    • VAUL-6439: Fixed an issue that prevented the owner of a shared record from deleting records in some scenarios

    Passphrases
    Time-Limited Access
    Self-Destructing Records
    Shared Item Recovery
    Keeper Desktop App now supports Import SSO LastPass vaults from Okta SSO and Azure SSO federated accounts
  • Advanced Search: Recently viewed records, search filters and more

  • Onboarding: New user onboarding has been improved

  • UI Refresh: Look and feel of the vault has been improved

  • MFA: When signing in with 2FA for the first time, there are now additional options. The Web Vault now offers 12-hour and 24-hour in addition to the previous options (every login, every 30 days, and don’t ask again on this device.)

  • Support for Google Authenticator QR code export format

  • Security Scores: "Security Data Sync" in the diagnostics menu will refresh your security scores

  • Lost Records: Shared records that have been removed from your vault, but are owned by you, can be recovered from the Deleted Items screen. The tab will only show if you have relevant records.

  • Note: There has been a change on our Privacy Screen feature. If you are the owner of the record, you will now be able to see the password even if there is a privacy screen applied and you couldn’t see the password previously. The privacy screen is still working and in effect for users who do not own the record. This change is being made across all platforms.

    Bug Fixes

    • We truncated the view of super long URLs in the record detail screen

    VAUL-5181
    : New UI for login screens
  • VAUL-5031: Hundreds of new website logos added

  • VAUL-5208: Additional 508 compliance / accessibility updates

  • KDE-1253: Enterprise enforcements for Desktop App distribution defaults. This allows the Admin to define the default SSO Domain and Data Center location. Detailed instructions available at this link: https://docs.keeper.io/enterprise-guide/deploying-keeper-to-end-users/desktop-application#enterprise-configuration

  • New Login UI

    Bug Fixes

    • VAUL-5295: CSV Import GUI fixes

    • VAUL-5095: Unable to ignore BreachWatch record which has edit rights

    • VAUL-5045: BreachWatch can indefinitely alert about a breached record

    • VAUL-5257: Second login required to send security audit data to the Admin Console.

    • VAUL-5251: Unable to export records with the Login record type restricted by admin.

    • VAUL-5248: Create Duplicate feature appearing for records that have Privacy Screen enabled.

    • VAUL-5270: Processing pending team members can sometimes cause the vault to display no data.

    • KDE-1220: KeeperFill for Apps compatibility issues with Apache Guacamole / Keeper Connection Manager running on a Mac host.

    • Several small UI bug fixes

    Improvements

    • KDE-1246: Upgrade Electron framework

    • KDE-1261: 10x speed improvement on file uploads for large file attachments.

    Keeper prompts for 2FA prior to Master Password entry. This is part of our new Login V3 security model.

    New Features

    • VAUL-4470: Addition of "Stay Logged In" on the Settings > Security screen.

    • VAUL-4539: Automated Safari / iCloud Keychain password import

    Improvements

    • KDE-868: Improved handling of KeeperFill for Apps filling through ConnectWise Control

    • KDE-951: Improved handling of Microsoft 2FA token when scanning into the vault record

    • KDE-870: Implementation of more secure "Copy" feature utilizing Microsoft API (Learn More)

    • KDE-948: Allow KeeperFill for Apps widget to be moveable

    • KDE-950: Implement basic keyboard navigation for KeeperFill for Apps menu system

    • VAUL-4499: Increase length of Password Generator maximum length

    • VAUL-4190: Right-click on "My Vault" to provide quick functionality within the vault

    • VAUL-4495: Direct all new users to install of v15 Browser Extension instead of v14

    • VAUL-4470: Improved handling of "Stay Logged In" feature across Vault, Desktop App and Extension

    Bug Fixes

    • VAUL-4502: Very large Keepass imports timing out

    • VAUL-4492: Duo Push not adhering to 2FA duration setting for re-prompt

    • VAUL-4511: PDF Export failing with error

    Stay Logged In

    This feature keeps the user's session active for the amount of time as set by their Logout Timer, even between browser and computer restarts.

    For example if your logout timer is set to 30 minutes, you'll stay logged into Keeper for 30 minutes no matter which browsers you open and close, or if you restart your computer. "Stay Logged In" has been our most highly requested feature from customers.

    Turning Off Stay Logged In

    If you don't want this feature enabled, and you would like to disable this capability for yourself or all your users, there are two ways of controlling it:

    (1) From the Admin Console go into the Role > Enforcement Policies > Account Settings and turn on the "Disable Stay Logged In" option. This will restrict the feature for users in the role and they will be unable to turn this feature on.

    (2) For your own account, open the Keeper Desktop Application and go into Settings > Security and turn off Stay Logged In.

    Increased the number of special characters used in the password generator to this set:

    !@#$%()+;<>=?[]{}^.,

  • Support for cookie persistence on the Keeper Desktop application for users who login with Single Sign On. This reduces friction and steps for users who sign in often.

  • Support for additional SAML SSO identity providers and elimination of any browser type recognition issues.

  • Keeper Desktop now allows users to remain logged into their SSO identity provider. If you choose to remove Single Logout (SLO) from the SSO configuration, the user will not be logged out of their identity provider when they logout from Keeper. For more information about Single Logout configuration see the link below: https://docs.keeper.io/sso-connect-cloud/logout-configuration

  • 🇺🇸 Support for the Amazon AWS GovCloud environment. Keeper is currently FedRAMP in-process and public sector entities can now establish their Keeper tenant in the GovCloud environment. Contact the public sector sales team at [email protected] for more information.

  • Support for the upcoming Compliance Reports feature. The Vault will encrypt appropriate compliance data from records and send it to the Admin Console. There is no change to the end user experience in the Vault.

  • Added a Region Selector in login screens and KeeperFill for Apps

  • Users on the Web Vault are encouraged to download the Desktop App for performing automated transfer from LastPass.

  • Import from Bitwarden now supports TOTP seeds for Two-Factor Authentication.

  • Import from Bitwarden now supports multiple URL fields.

  • Bug Fixes

    • VAUL-4848: 1Password import not importing secure notes field

    • VAUL-4851: Safari Sierra and High Sierra not importing passwords

    • VAUL-4852: Import token invalid in AU region

    • VAUL-4543: User cannot save an address that does not have a title

    • VAUL-4586: Access Delay for Emergency Access displays incorrectly

    • VAUL-4640: Long security answer blocks user from using Account Recovery

    • VAUL-4797: Clicking the dice button on an existing record should not reduce the complexity.

    • VAUL-4911: Kaspersky import fails when the data contains certain reserved words

    • VAUL-4946: Card type not being displayed when typing in the credit card number

    • VAUL-4960: File drag-and-drop into a New record is not being saved on first try

    • VAUL-4941: Hebrew language is showing the TOTP code in reverse order

    • Multiple Record Types bug fixes. about the upcoming record types feature.

    Vault Release 16.11.1

    Released June 17th, 2024

    Improvements

    • VAUL-6523: Added pin code generator to "Pin Code" custom field

    Pin Code Generator
    • VAUL-6595: Improved 508 compliance for "Record Types" default actions

      • Escape key closes "Record Types"

    • VAUL-6596: Enhanced 508 compliance for "More Filters" default actions

      • Escape key closes "More Filters"

    • VAUL-6597: Fixed issues with 508 compliance regarding possible actions. Dropdown lists out of focus are automatically closed

    • VAUL-6648: Updated support information that appears in the vault directing users to:

    Bug Fixes

    • VAUL-6550: Implemented a modal warning for trials expiring within 24 hours

    • VAUL-6747: Removed offensive words from the word list

    • VAUL-6613: Updated strength indicator to prevent it from turning green erroneously

    • VAUL-6721: Fixed the default passphrase separator issue

    Vault Release 16.10.3

    Released on August 10, 2023

    Features

    • VAUL-5688: Support for Passkey record fields. Managing passkeys requires browser extension 16.6.0 which was released on Aug 7, 2023. Learn more about passkeys here.

    • VAUL-5977: Support for RESTRICT_IMPORT_SHARED_FOLDERS enforcement policy which will prevent users from importing shared folders from LastPass. See the Admin Console role enforcement policies to enable this setting.

    • VAUL-5502: Support for new paginated sync system on the backend API

    • VAUL-5999: Support for Swedish and Finnish languages

    • VAUL-5628: Date fields are searchable

    • VAUL-5580: Email addresses are auto-sanitized when pasting into sharing screens

    Bug Fixes

    • KDE-1376: Desktop app can get stuck when the main app is closed too quickly

    • KDE-1381: Offline records not syncing up properly in Linux

    • KDE-1382: RPM desktop installer not compatible with RHEL9

    Other Changes

    • VAUL-5899: Improved loading and search speed for large vaults

    • KDE-1343: Remove the deprecated browser extension for Safari users, point users to the new App Store version of the Safari extension

    • VAUL-6110: Removed the manual on/off toggle for logout timer. Users must specify a time (in minutes).

    Vault Version 16.8.0

    Released on Oct 20, 2022

    Features

    • Share Admin Keeper's Share Admin feature is a role-based permission that gives administrators elevated access rights over your organization's shared folders and shared records. Share Admins have full user and record privileges for any shared record that they have access to. See: https://docs.keeper.io/enterprise-guide/share-admin

    • MSP to Managed Company Team Sharing Directly share folders to Managed Company teams

    • General to Record Type Conversion You can now right-click to change the type of any record, including migration from the legacy "General" record types. Multi-select + right click allows migration of multiple records at once.

    • Default Record Permissions Quickly set permissions during the creation of a Shared Folder

    • Default Folder Settings moved into the "Settings" tab In addition, you can now apply permission changes recursively and retroactively.

    • Shared Folder UI improved visibility Several enhancements to the UI which improve the visibility and management of Shared Folders.

    • Team Visibility There is now a "View Team" function in several locations so that you can see who you're sharing to.

    • Collapsed View of Records When a folder contains subfolders and records within subfolders, you can now collapse the view, in order to apply changes recursively. Select "Show subfolder records" to collapse the list.

    • Retroactively apply permissions When "Show subfolder records" is selected, the Settings tab will display a checkbox called "Apply permissions to all subfolders" which will apply the default folder settings to all existing records within folders and subfolders.

    Vault Version 16.4.0

    Released on Jan 25, 2022

    Features and Improvements

    • KDE-1111: Native App Filler custom field type for Record Types which provides automated filling of native applications with application title matching, keystroke macros and advanced OCR for recognition of window content for automated record selection. More information about this feature can be found here:

      https://docs.keeper.io/user-guides/keeperfill-for-apps#native-app-filler

    • VAUL-4907: Support for Webauthn with automatic U2F->Webauthn transition

    • VAUL-4945: Import/Export support for Record Types

    • VAUL-5069: Support for Psono password import

    • VAUL-5006: Support for partial email search during Sharing for customers with over 500 users.

    • VAUL-5046: Display changes made on the record history screen

    • VAUL-5063: Allow record owner to change URL on Privacy Screen records.

    • VAUL-5016: Allow users in a shared folder to duplicate records

    • VAUL-4989: Allow users who are shared to a record (non-owner) to duplicate records

    • KDE-999: Automated LastPass import will convert Templates and Custom Fields into Keeper Record Types and Custom Fields

    Bug Fixes

    • KDE-1185: Conditional access blocking usage of Desktop App in certain environments

    • VAUL-5067, VAUL-5073: Secrets Manager client device bug fixes

    • VAUL-5968: SSO Cloud login hangs when the device has been locked

    Browser Extensions

    Troubleshooting and support for the KeeperFill browser extensions

    Downloads

    All KeeperFill browser extensions are available at the .


    Web Vault & Desktop App

    Troubleshooting and support for the Keeper Web Vault and Keeper Desktop App

    Downloads

    All Keeper Desktop apps are available at the .


    Vault Version 16.4.6

    Released on March 10, 2022

    Features & Improvements

    • KDE-1090: Upgraded Electron framework to 17.x

    VAUL-5726
    : Deleted items is missing right-click option
  • VAUL-5761: Remove RSA SecurID from GovCloud environment

  • VAUL-5960: Right Click New Shared Folder - Records are not being added to folder

  • VAUL-5945: After changing master password, user can login offline with old master password

  • VAUL-5981: TOTP URIs with leading white space are not parsed correctly by the vault

  • VAUL-5899: Large vault search speed is causing delays

  • VAUL-5986: Advanced search needs to dismiss results upon hitting <enter> key

  • VAUL-5983: The record owner is restricted from viewing the password on a V2 record that utilizes the enterprise domain enforcement

  • VAUL-5933: 508 compliance items (ensure image tags have alt attributes)

  • VAUL-5957: Drag/Drop file in the vault is adding to the prior record created

  • VAUL-5966: Drop target incorrect when file is dropped into the vault

  • VAUL-5968, VAUL-5969: Additional 508 compliance items

  • VAUL-5994: Select a shared folder and select a record not in the shared folder, right click and delete both. Vault will white screen.

  • VAUL-6053: Vault scrolls unexpectedly when clicking a folder

  • VAUL-6105: Security Audit: "reused" count includes owned records w/ the same password as a non-owned record

  • VAUL-6094: Multiple Share Relationship Invites are being sent after acceptance

  • VAUL-5947: Account recovery setup is removed during the onboarding for SSO users.
  • VAUL-6143: If onboarding is disabled through role policy, disable any browser extension popup messages that lead to an installation.

  • VAUL-5066: Using custom record types when offline generates errors
  • KDE-1145: SSO users who select 2FA setting "remember 30 days" are still being prompted every time.

  • VAUL-5064: Custom record type that requires a file isn't allowing save

  • VAUL-5083: Default folder settings are not viewable in folder view screen

  • VAUL-5054: Custom record type titles are not providing auto-suggestion

  • VAUL-5088: Bitwarden import of TOTP fields

  • KDE-1102: Improved handling of logout timer on desktop application

  • KDE-1097: LastPass imported custom fields truncated

  • KDE-1203: Added a new Hot Key for filling TOTP codes (Ctrl/Cmd+Shift+T)
  • KDE-1206: Added {SPACE} keystroke for KeeperFill for Apps typer feature

  • VAUL-5047: Added Passportal Import tool

  • VAUL-4597: Added Record UID to BreachWatch events for Advanced Reporting & Alerts module.

  • VAUL-5140: Improved speed for large vaults

  • VAUL-5160: Improved 1Password import which includes TOTP codes

  • VAUL-5184: Improved MyKi import to support TOTP codes

  • Bug Fixes

    • KDE-1200: Crash when running Keeper Desktop on Fedora 35

    • KDE-1207: KeeperFill hotkey filling improvements over VMWare, Datto RMM and other remote desktop tools.

    • KDE-1065: KeeperFill for Apps not working over RDP with french keyboard

    • KDE-1117: Touch ID with IP restriction and offline access not working

    • KDE-1087: "Unable to connect" error when using KeeperFill for Apps

    • KDE-1118: KeeperFill for Apps with Touch ID and Webauthn hangs on login

    • KDE-1181: Whichever method signed in last (master password or biometric) is only able to be used offline. So if you last signed in with master password, signing in offline with master password works. But if you last signed in with touch id, signing in with touch id offline works.

    • KDE-1132: KeeperFill for Apps using "Generate password" has issues when loading the main desktop app.

    • KDE-1183: Native App Filler clicking tray changes focus

    • KDE-1099: Offline mode not working with IP restriction is activated

    • KDE-1186: SSO user logging in with Biometric is logged out to the wrong screen

    • KDE-1209, KDE-1210: LastPass import improvements and error handling

    • KDE-1213: Crash when setting up the OnlyKey security key hardware device

    • KDE-1217: Searching for Typed records within Shared Folder paths fails

    • VAUL-5092: Copying UID from Safari 15 user interface fails

    • VAUL-5102: Switching to Keeper DNA push method not showing correct screen

    • VAUL-5113: Secrets Manager app details GUI not showing correct permissions

    • VAUL-5107: Allow viewing and copying of Notes if the masking and privacy settings are activated.

    • VAUL-5098: After deleting a security key, toggle of 2FA doesn't visually show the action

    • VAUL-5114: Enforcement policy of re-authentication when revealing password was not working properly

    • VAUL-5153: Web Vault is saving phone number fields with formatting, which caused other client apps to crash.

    • VAUL-5155: Automatically fixes formatting issues from Android record data

    • VAUL-5156: Re-sharing a shared Record Type record that contains file attachments fails

    • VAUL-5154: UI issues when linking to Emergency Access screens

    • VAUL-5144: Multi-select and bulk edit not working properly in List View

    • VAUL-4933: Repaired Avast import

    • VAUL-5157: Import from legacy records missing TOTP field

    • VAUL-5163: QR codes from Okta Verify are showing empty fields

    • VAUL-4949: Can't type spaces when searching through the country names

    • VAUL-5185: Searching not matching on general record types with custom field values

    Learn More
    User Guides

    Web Vault and Desktop App user guides are located here.


    Keeper Import Error

    If you receive an "Unexpected Error" or "Unable to connect" when performing an import using the Keeper Import tool, this is typically due to a conflict with installed Antivirus or Proxy software. If this happens for you, please try importing by installing the Keeper Desktop application instead.

    If you are an Enterprise Admin and you have control over the end-user firewall settings, please make sure that the user's desktop applications can communicate with Keeper Security's endpoints (e.g. keepersecurity.com, keepersecurity.eu, keepersecurity.ca, keepersecurity.jp, keepersecurity.com.au or govcloud.keepersecurity.us depending on the region).


    Web Vault Login Issues

    If you are experiencing issues with logging in, you simply may need to clear the Keeper cache in your browser following the steps below:

    Chrome:

    1. Open the Web Vault

    2. Click on "View" > "Developer" > "Developer Tools"

    3. Click on the "Application" tab > "Clear Storage" > then click on “clear site data”

    Edge:

    • Clear Browsing data (Browsing history, Download History, Cookies and other Site Data, Cached Images and Files, Hosted App Data)

    Firefox:

    • From Privacy & Security page > Clear Data (Cookies and Site data, Cached Web Content)

    Safari:

    1. Go to Preferences > Advanced > select checkbox "Show Develop menu in menu bar"

    2. Then select "Develop" > Empty Caches

    3. Select "Safari" menu then "Clear History" and select All Time


    Installation error 0x8007000D on Microsoft Store

    If you receive this error when updating or installing the Desktop App on Windows, follow the instructions below:

    1. 1Browse to "C:\Windows\SoftwareDistribution\Download" and delete the contents of the folder.

    2. Press Windows key + X > Click Command Prompt (Admin) then type "wuauclt.exe /updatenow". Hit <enter>.

    3. Open Control Panel > Windows Update and Windows 10 should begin downloading.

    4. Press Windows key + X

    5. Click Command Prompt (Admin)

    6. Enter at the prompt OR Copy and Paste these one at a time (hit enter after each entry): Dism /Online /Cleanup-Image /CheckHealth Dism /Online /Cleanup-Image /ScanHealth Dism /Online /Cleanup-Image /RestoreHealth

    7. Run the Windows update Troubleshooter

    8. Press “Windows + X” and select Control panel.

    9. In the search box, type troubleshooter, and then click Troubleshooting.

    10. Under System and Security, click Fix problems with Windows Updates.


    Keychain Password Import

    The Mac Store version of the Keeper application does not support iCloud Keychain password import due to Apple's review process. However, the solution is to install Keeper Desktop directly from our download page.


    Feature Requests

    We love hearing from customers. Send your feature requests to: [email protected].


    Beta Slack Channel

    Join our Beta Slack Channel to post questions, feedback or receive new beta versions.

    Keeper download page

    VAUL-6719: Corrected domain conflict alerts to display the appropriate text

  • VAUL-6519: Fixed issue with Chrome displaying a break in the password generator

  • VAUL-6728: Prevented users from saving passwords with domain conflicts

  • VAUL-6729: Ensured that users with privacy screens cannot view PIN codes

  • VAUL-6732: Introduced new alerts for different domain conflicts

  • VAUL-6737: Added missing strings for various languages

  • VAUL-6741: Improved vault UI responsiveness when saving new passwords

  • VAUL-6736: Resolved issues with the PIN-CODE and PIN Generator not working

  • VAUL-6740: Added missing translation for 'Your password has been saved'

  • VAUL-6754: Implemented in-app popup for expired trial warnings

  • VAUL-6753: Fixed issue with the privacy screen feature

  • VAUL-6759: Fixed the issue preventing saving passphrases with domain conflicts

  • VAUL-6761: Resolved incorrect display of consumer/enterprise settings

  • VAUL-6770: Ensured default configuration is correctly applied when new fields are unchecked

  • VAUL-6776: Fixed GUI issues in the password complexity feature

  • VAUL-6723: Fixed issues with losing ownership of a record in a shared folder

  • VAUL-6693: Corrected tooltip hover text display issues in shared folders

  • VAUL-6653: Fixed time selection issues in the date picker configuration

  • VAUL-6726: Resolved a white screen crash issue

  • VAUL-6688: Resolved UI issues with the new shared folder modal

  • VAUL-6733: Addressed issues with configuration records not being viewable

  • VAUL-6731: Fixed time picker for 24-hour time format in One-Time Share

  • VAUL-6734: Fixed file upload issues

  • VAUL-6738: Corrected viewing link display issues in One-Time Share

  • https://www.keepersecurity.com/support.html
    Security Key as the Only 2FA Method
    User Guides

    The browser extension user guides are located here.


    Firefox Plug-in Changes

    We used to have 2 versions of the Firefox extension in the Add-on store. We removed one of them and disabled the use of old versions. Please ensure that you are using only one extension, and ensure it's the latest one from our download page.


    Safari Extension Changes

    A new Safari extension is now available through the Mac App store. Old versions of the Safari extension have been disabled. Please ensure that you are running the latest version from our download page. Make sure to read the latest Safari user guide for step by step instructions.

    If you are unable to login to the KeeperFill Safari extension, a reset of the extension may be required. To reset your KeeperFill Safari extension, follow the below steps:

    • Open Safari and select Safari > Settings

    • From the Keeper extension, select Settings

    • Click on "Clear All Storage"

    • Restart Safari


    Experiencing Autofill Issues

    If you are having issues with autofill, please make sure you check for the following:

    • Make sure you only have ONE version of Keeper browser extension installed and active.

    • Do not have multiple password managers installed, such as LastPass and Keeper at the same time. This is known to cause conflicts and bugs when filling sites.

    • Make sure to turn off your browser's password manager.

    • Install any pending browser updates. Pending browser updates cause issues with browser plugins.

    • Ensure that "on all sites" is selected in your browser settings under Window > Extensions > Keeper Details screen under "Site access".

    • Learn how to use our Snapshot Tool to quickly report autofill issues by visiting . The Snapshot Tool can be accessed from the KeeperFill toolbar Options menu (three vertical dots) and selecting Report an Autofill Issue.

    • If you still need help, describes how to self-troubleshoot and capture information that our support team needs to help diagnose the problem.

    • Send any site-specific autofill issues to [email protected] and we'll fix it.

    How to Disable KeeperFill on Specific Sites

    Enterprise customers can disable KeeperFill on sites across the organization. Please be sure to add the site's website address to the KeeperFill enforcement policy for the role in which you reside.

    Admins can disable Keeper-fill on specific websites. This feature supports wildcard characters for matching domain names or URLs. One use case might be to disable Keeper-fill for internal applications that have a lot of form fields. Read more about this policy.


    Additional Help

    • See our general Browser Extension troubleshooting page

    • If you're having autofill issues, see the autofill feedback page

    • If you are a website developer looking to integrate, see our Website Developers page


    Feature Requests

    We love hearing from customers. Send your feature requests to: [email protected].


    Beta Slack Channel

    Join our Beta Slack Channel to post questions, feedback or receive new beta versions.

    Keeper download page
    MSP to MC Sharing
    Change Record Type
    Retroactively apply permissions to existing records

    Vault Release 16.10.10

    Released on Nov 16, 2023

    Features

    • VAUL-6175: Added thousands of popular website logos to the Vault user interface.

    Website icons

    The implementation of website logos preserves full zero knowledge encryption and privacy. The entire library of logo files are embedded within the vault application.

    • KDE-1403: Optional SSO login method through default web browser

    If the new "Use Default Browser for SSO" option is enabled from the desktop application menu, the user will be routed to their default web browser on the device in order to login with their configured identity provider.

    The primary reason for implementing this feature is to support SSO identity providers who support FIDO2 security keys or other authentication methods that are not technically supported from the Keeper Desktop embedded browser.

    For Admins who would like to enforce this to all desktops, a new item called UseDefaultBrowserSSO is available.

    • DR-265: Ability to specify time zone and hour of day for scheduled password rotations

    • VAUL-5620: Enhancements for Recently Deleted page

    • VAUL-5686: Security Audit screen now has a "Last Change" column

    • VAUL-6138: New "Advanced" settings menu which contains the following features:

    Bug Fixes

    • VAUL-6135: Currently only owner and share admin can update permissions, add/remove users, set/update expiration timers. User with can_share right should be also able to manage users up to its own level of privilege.

    • VAUL-5659: Multiple Record Selection is not working in Deleted Items

    • KDE-1421: Records created while in offline mode are not syncing properly when going online

    Security Updates

    • VAUL-6170: Security improvements using CryptoKey storage on Firefox browsers for device keys

    • VAUL-6179: Convert ECIES-encrypted Record Keys to Data Key-encrypted Record Keys upon login.

    • KDE-1406: New desktop app installs will now store device private keys in the Apple Keychain or Windows Credential Locker instead of Chrome CryptoKey local storage, for improved security for native app installation. Existing keys will not be transferred until a reset takes place.

    Other Improvements

    • KDE-1417: When filling into a remote desktop session using mstsc.exe, incorrect characters are used with a different keyboard layout than the host machine.

    • VAUL-6219: Improved the automatic team-user approvals upon logging in. This new method handles a large number of pending users.

    • VAUL-6200: When viewing a deleted record, file attachments cannot be downloaded until the record is restored.

    Known Issues

    • Migrating from LastPass using Okta SSO saying "Import Error"

    In the Okta Admin portal under Applications, locate your "LastPass Okta Login" application. Under the "Sign-in redirect URIs" section, add the following URI: http://localhost/ then click "Save".

    Vault Release 17.4.1

    Released on Nov 3, 2025

    Enhancements

    • VAUL-7458, KDE-1799: Fixed an issue causing slow file uploads in KeeperPAM connections.

    • KDE-1790: Integrated

    Vault Release 17.0.0

    Released on February 6, 2025

    If you installed Keeper Desktop from the website, this version will not auto-update and you'll need to install it manually from the Keeper website. If you installed Keeper Desktop from the Apple or Microsoft app stores, it will update automatically.

    Enhancements

    this helpful guide
    this page

    KDE-1400: RSA to EC Security Updates

  • VAUL-6152: RSA to EC Security Updates

  • VAUL-7031: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid. Backup codes are now copied without spaces.

  • VAUL-7029: The "Add Device" and "Provision Gateway" options are now only visible in View mode, not Edit mode.

  • KDE-1415: We've fixed an issue where incorrect OS keys were displayed in shortcut definitions.

  • KDE-1245: All alert models have been updated to follow the new design guidelines.

  • KDE-1240: We've fixed an issue where an incorrect error message was displayed when moving subfolders between shared folders.

  • KDE-1547: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid.

  • Other Updates

    • VAUL-6899: Updated linked personal accounts to indicate the family admin, helping users identify the correct account to log into for managing members.

    • VAUL-6590: We have allowed offline login with all 2FA durations as a separate setting in the app.

    • VAUL-7061: We removed legacy bundle support to improve build efficiency.

    • VAUL-7064: We updated the grid view icon.

    • KDE-1529: We updated the Windows desktop build to support Visual Studio 2022 and target it in the GitHub Actions workflow.

    • KDE-1532: Upgrade Electron framework to version 32.1.0 31.7.2 33.2.0.

    • KDE-1488: We've enabled context isolation security for the desktop vault/tray renderers.

    • KDE-1546: We've fixed an issue preventing Windows desktop builds from completing in GitHub Actions

    • KDE-1548: We've added a new setting to allow offline logins with all 2FA durations.

    • KDE-1550: We've fixed an issue with upload job caching by adding the Cache-Control: no-cache header.

    • KDE-1558: We've updated the Windows Credential Locker, Windows Hello, and App Model features.

    • KDE-1536: We fixed a recent Keeper outage caused by NGINX overload.

    Bug Fixes

    • VAUL-6437: Fixed an issue where custom templates with numeric names (without periods) appeared at the top of the list instead of under the "Custom Template" section.

    • VAUL-6275: Fixed an issue ensuring that Record Type Sorting aligns with the modified list.

    • VAUL-6889: The user gets a clear error message when the share request fails.

    • VAUL-6908: Prevented users restricted from sharing or receiving from creating shared folders.

    • VAUL-5874: Removed the period from the title on the empty Vault Splash Page.

    • VAUL-5958, VAUL-5959: Implemented functionality improvements for My Vault, Record view, and Security Audit page, addressing customer expectations for dark mode, though some visual inconsistencies and color contrast requirements

    • VAUL-6760: Fixed an issue where the Country field displayed incorrect or empty values when switching between Address records.

    • VAUL-5702: Changing the default field type now updates the label accordingly.

    • VAUL-6438: Standard records now appear in the top section and custom record types in the bottom section, each sorted independently with numerical first, followed by alphabetical.

    • VAUL-6436: Resolved an issue where the letter 'g' was cut off in custom templates.

    • VAUL-6758: Fixed an issue where the default password complexity wasn't saved during the initial rotation setup.

    • VAUL-6972: Fixed an issue where restored records did not update security scores until the user logged out and back in.

    • VAUL-5949: Fixed an issue where the Save button in Secrets Manager remained disabled after deleting a Gateway.

    • VAUL-5862: Fixed an issue preventing users from deleting a Gateway in Secrets Manager if multiple Gateways existed.

    • VAUL-5847: Fixed an issue where the sort header within the Secrets Manager did not reflect the selected sort option.

    • VAUL-6635: Fixed an issue where the tooltip did not describe the cron format, adding an explanation and examples for proper usage.

    • VAUL-6988: Fixed the update with the Login Buttons

    • VAUL-6983: Fixed an issue that restricted Unlimited, FP, and Trial users from accessing offline mode via the login page.

    • VAUL-6941: Fixed an issue where unreferenced records weren't deleted during sync down.

    • VAUL-6911: Fixed an issue where removing a record link deleted the linked record despite other existing references.

    • VAUL-6961: Resolved an issue where removing direct access to an owned record unintentionally removed ownership.

    • VAUL-6990: We've resolved an issue where uploading a file larger than 100MB would block the upload of other selected files.

    • VAUL-6977: We fixed the 'Internal Error' issue during offline logins.

    • VAUL-6995: We fixed the issues where discard changes are generated twice.

    • VAUL-6998: We fixed an issue where gateways were displayed randomly. They are now sorted numerically and alphabetically.

    • VAUL-6947: We've resolved an issue where records were unintentionally removed from shared folders during the sync-down process.

    • VAUL-7012: We fixed an issue with incorrect toast messages when trying to create duplicates without permission.

    • VAUL-6881: We've fixed an issue where breach watch results were only sometimes being returned when expected.

    • VAUL-6534: We've resolved an issue causing "bad request" errors during security data updates specifically for the vault client.

    • VAUL-6962: We've resolved an issue where records created in the BE weren't appearing in the BW.

    • VAUL-7019: We have fixed the issue with the secrets manager not showing up in SF/Records

    • VAUL-6750: Vault now uses the encrypted session token returned by accept_enterprise_invite instead of the previous session token.

    • VAUL-7025: We've fixed an issue where records with the password "hasOwnProperty" were causing various client crashes.

    • VAUL-7018: We fixed an issue where selecting "all" in an empty shared folder incorrectly showed "1 selected." Now, it correctly shows "0 selected" and unselecting the box removes the message.

    • VAUL-7036: We've fixed an issue where the Grid View Record Context Menu button was incorrectly positioned when focused.

    • VAUL-7039: We fixed an issue where the file_attachment_uploaded audit event was incorrectly triggered for file removals.

    • VAUL-7045: We've fixed an issue where vertical dividers were missing from the Security Audit.

    • VAUL-7053: We've fixed an issue where the UI didn't display throttle messages when entering incorrect passwords multiple times in offline mode.

    • VAUL-7059: We've fixed an issue where the cursor focus was incorrect after entering a password in the MP entry modal.

    • VAUL-7060: We've fixed an issue where the Offline Duration Setting required a browser refresh to take effect.

    • VAUL-7050: We've fixed an issue preventing MSPs from logging in offline.

    • VAUL-7058: We've fixed an issue where Free Trial users without a BW subscription encountered a "bad request" error when scanning records with strong passwords.

    • VAUL-7057: We've fixed an issue where the last scan date was incorrectly displayed as "N/A" in BW.

    • VAUL-7065: ​​We've fixed an issue causing incorrect font display on the web vault.

    • VAUL-7068: We resolved an issue where the "Work Offline" button was incorrectly displayed for users without offline access, even after clearing the browser cache or logging out

    • VAUL-7076: We've fixed an issue causing the error "No key for encryption of security data" in Vault.

    • VAUL-7074: Sharing invitations can now be sent without errors.

    • VAUL-7080: We've fixed an issue preventing update_security_data from working on ECC-only enterprises.

    • VAUL-7079: We've fixed an issue causing several missing key warnings.

    • KDE-1346: We've fixed an issue with misaligned edit icons for KFFA hotkeys.

    • KDE-1423: We've fixed an issue where the Topsite list wasn't narrowing correctly as users typed in the title field

    • KDE-1428: We've fixed an issue preventing users from moving owned records into shared folders.

    • KDE-1500: We've fixed an issue where incorrect notifications were displayed for oversized file uploads

    • KDE-1048: We've fixed an issue where the Region Selector was cut off at the bottom in KFFA.

    • KDE-1538: We've fixed an issue where resetting Keeper from the Help Menu didn't clear the desktop app cache

    • KDE-1539: We've fixed an issue with the localization of the access expiration banner.

    • KDE-1544: We've fixed an issue preventing password re-entry in KFFA.

    • KDE-1545: We've fixed an issue where the offline edit indicator persisted after reconnecting to the server and logging.

    • KDE-1540: We've fixed an issue preventing users from downloading large file attachments, which caused the app to stall

    • KDE-1549: We've fixed an issue preventing Direct Import from LastPass due to a JavaScript error.

    • KDE-1551: We've fixed an issue preventing the import of simple phone data from LastPass for non-address records.

    • KDE-1552: We've fixed an issue that prevented new Enterprise Admin accounts from using a fresh install of KDE.

    • KDE-1478: We've fixed an issue where the "Securely Upload to My Vault" option did not clear after a drag-and-drop operation.

    • KDE-1553: We updated the macOS build environment from macOS 12 to macOS 13 in the build-desktop-vault.yml workflow.

    • KDE-1556: We updated the download links for the desktop app to point to the new CloudFront distribution.

    • KDE-1559: Fixed QA download page: now shows versions and directs users to the latest build.

    • KDE-1565: We've fixed an issue preventing KSM device configurations from being generated.

    https://www.keepersecurity.com/download.html
    Search overlay controls
  • Syncing delay to improve overall performance in high volume enterprise tenants

  • Showing numbering in the record list view

  • KDE-1373: KeeperFill for Apps Window opens in wrong location when tray is not in visible dock
  • KDE-1395: Memory leak on Mac App from repeat launching through cmd+tab, clicking the dock item, etc. This leads to unintended event handlers being enabled.

  • VAUL-5675: User is not able to delete forever a Lost Record shared via Shared folder from Lost Access

  • VAUL-5737: Missing 'Add to My Vault' button for records details panel in Lost Access tab

  • VAUL-6009: If you have a role enforcement set to restrict all record types in the vault, the import option during onboarding is now hidden.

  • VAUL-6083: Filename not being added to title when drag-and-drop attachment in Chrome/Edge

  • VAUL-6204: Import from Thycotic / Delinea Secret Server missing notes field and SecretTemplates section

  • VAUL-6213: Record title auto-suggestion not working when there are multiple words

  • VAUL-6214: Date formatting error when Arabic language selected

  • KDE-1411: On Mac, keyboard layout is cached on first use. When filling a password with KeeperFill for Apps on Mac, a map of key codes to character mappings is generated and cached. This cache is not released when the keyboard layout changed with the app running, resulting in incorrect key codes being sent for some characters.

  • KDE-1422: The "Create Record" hot key is turned on when the app is initially not in focus, preventing that hotkey from being used by other apps.

  • KDE-1385: KeeperFill for Apps is not able to detect secure fields when a record uses the "native app filler" field type.

  • KDE-1426: After importing files, KeeperFill for Apps doesn’t show the records. This leads to assertion failures with BreachWatch data which require record keys to decrypt the data.

  • KDE-1412: Upgraded Electron platform to v26.2.4. This was actually released to production already in version 16.10.9 on a standalone basis.

    DR-348: Hide or gray out "Rotate now" button on modifying rotation settings
  • VAUL-5926: Shared Folder and Direct Share screens will only list those Share Admins who are explicitly shared to the object, to reduce confusion.

  • VAUL-5738: Allow free trial users to view record history

  • VAUL-6128: Show long folder names on-hover

  • KDE-1399: Return focus to previous app/window when KeeperFill for Apps is closed

  • 508 Compliance: Over 20 tickets related to 508 compliance / ergonomics improvements

  • VAUL-5875: Create Duplicate UI changes to support various use cases:

    • If privacy screen is enabled, do not allow duplication

    • If a user duplicates a record that has linked records such as address or payment records, allow duplication of the record, disallow duplication of linked records, and present a notification: “The record you are duplicating contains links to other records. The linked records will not duplicated.”

    • If a user duplicates a record that has attachments, allow duplication of the record, disallow duplication of the attachment, and present a notification: “The record you are duplicating contains attachments. Attachments will not be duplicated. In order to duplicate attachments, download the attachment from the original record and re-upload to the newly created record.”

  • KDE-1414: New font type "Outfit" to replace "Overpass". This is Keeper's new font that is being slow-rolled across all platforms and interfaces.

  • Enterprise Configuration
    Use Default Browser for SSO
    specify time zone and hour of day
    Advanced Settings
    with Windows x64 and ARM64 support.
  • VAUL-6783: We implemented the ability to restrict saving TOTP fields from role policy.

  • VAUL-7662: We added numerous KeeperPAM connection parameters listed below.

  • New SSH Connection Parameters

    • Public Host Key

    • Font Name

    • Scrollback Size

    • Read-Only

    • Remote Command Execution

    • Language/Locale

    • Time Zone

    • Server "keepalive" Interval

    • Terminal Behavior - Backspace Key Send Option

    • Terminal Type

    • Clipboard usage

    • See

  • New RDP Connection Parameters

    • Initial Program Execution

    • Session "client name"

    • Keyboard Layout

    • Timezone

    • Enable multi-touch

    • RDP Administrative Console

    • Display Width/Height/Resolution

    • Color Depth

    • Force lossless compression

    • Read-only

    • Resize Method

    • Clipboard settings

    • Line ending normalization

    • Remote App Execution - Program, Working Directory, Parameters

    • Device Redirection for audio input/output

    • Printing support

    • Enable Wallpaper

    • Enable theming

    • Enable font smoothing

    • Enable full-window drag

    • Enable desktop composition (Aero)

    • Enable menu animations

    • Disable bitmap caching

    • Disable off-screen caching

    • Disable glyph caching

    • Load Balancing cookie

    • Pre-connection PDU (Hyper-V) RDP Source ID and Preconnection Blob

    • SFTP default upload directory

    • SFTP Keepalive interval

    • See

  • New Remote Browser Isolation Connection Parameters:

    • Disable audio

    • Audio capabilities (Stereo/Mono, Bit Depth, Sample Rate)

  • New VNC Connection Parameters:

    • Read-only

    • Swap red/blue components

    • Force lossless compression

    • Encoding

    • Cursor local/remote setting

    • Color depth

    • Audio enable

    • Text Encoding

    • VNC Repeater host/port

    • See

  • New Database Parameters (MySQL, PostgreSQL, SQL Server):

    • Font Name

    • Font Size

    • Maximum Scrollback Size

    • Read-only


  • Bug Fixes and Improvements

    • VAUL-7530: Fixed an issue where devices with long names in KSM caused the UI to break.

    • VAUL-7665: Updated the APIs for the security audit data.

    • VAUL-7907: We modified the GovCloud vault to use the GovCloud krelay servers.

    • VAUL-5424: Fixed an issue where legacy usernames did not display the primary username correctly.

    • VAUL-7802: Implemented a sticky footer so that save options remain visible without requiring users to scroll to the bottom of the page.

    • VAUL-7927: Improved reliability when downloading and decrypting PAM session recordings by updating the decryption process to use a new, more secure salt value method.

    • VAUL-7945: Added some RBI Connection Parameters.

    • KDE-1750: Confirmed MacOS Tahoe (Version 26) compatibility.

    • VAUL-7800: Fixed an issue where a shared folder remained visible after team removal if it was assigned to multiple teams and the user did not belong to the remaining team.

    • VAUL-7431: Fixed progress bar when usage exceeds limits for file attachments.

    • VAUL-7496: Enhanced the error message displayed when a Kubernetes connection fails to provide more explicit guidance.

    • VAUL-7780: Made the database "type" a required field when launching a connection with an ephemeral account.

    • VAUL-7821: We fixed a Vault scroll bar issue.

    • VAUL-7856: Fixed an issue where the Session Activity filter did not update correctly when the Risk Score option was unchecked.

    • VAUL-7871, 7876, 7858: We fixed several PAM AI bugs.

    • VAUL-7897: Fixed an issue where “Enable Remote Browser Isolation” was not automatically selected when creating a new RBI connection, causing users to manually enable it after setup.

    • VAUL-7809: Disabled partial selection and click-to-copy functionality for the username and custom fields.

    • VAUL-7919: Fixed a problem where resizing the remote window with the +/- buttons caused parts of the screen to become unclickable.

    • VAUL-7928: Fixed a minor typo in the Gateway’s Docker Compose AppArmor profile name for improved consistency.

    • VAUL-7935: Fixed a bug that caused rotation schedules to run on the wrong day in Monday-first locales (like Europe/UK).

    • VAUL-7942: Fixed an issue where records created via right-click or the Create New button were saved outside the selected folder or shared folder (SF).

    • VAUL-7944: Fixed a problem where the Save button didn’t re-enable after closing an error message.

    • VAUL-7884: Fixed an issue where the Vault did not display more than two queued discovery jobs.

    • KDE-1693: We fixed an issue with \ or / in the download file.

    • KDE-1788: Fixed Snap Store install errors.

    • KDE-1734, 1729: Fixed Hotkey issues

    • KDE-1685: Fixed an issue where passwords imported from Windows appeared empty when using the latest version of Chrome.

    • KDE-1780: Fixed an issue where Keeper Desktop did not start correctly after proxy authentication was completed.

    • KDE-1794: Fixed an issue where filling into a macOS Parallels VM caused a crash when certain characters were entered.

    • KDE-1797: Fixed an issue where new Chrome windows could not be opened on macOS when KFFE was active.

    • KDE-1793: Fixed an issue on macOS where using the hotkey Cmd + Shift + P to fill passwords did not work when targeting a password field, but worked in non-password fields.

    • KDE-1803: Fixed an issue where the TOTP field from BitWarden CSV was not importing.

    • KDE-1804: Fixed a problem where Bitwarden CSV imports with multiple URLs only saved the first URL in Keeper.

    Keeper Forcefield 1.1.0
    Keeper Unveils New UI for a More Intuitive Customer ExperienceKeeper Security Blog - Cybersecurity News & Product Updates
    KeeperFill for Apps v15.0.10: New Features
    Introducing Share Admin

    Vault Release 17.3

    Released on July 24, 2025

    New PAM Features & Improvements

    Summary

    Keeper version 17.3 brings several powerful PAM enhancements that empower DevOps, IT Security, and development teams with enhanced visibility, control, and collaboration across IT environments.

    • Updates to Keeper introduce the Domain Controller configuration for Active Directory environments.

    • include Launch Credentials, Personal Credentials, and Ephemeral Accounts within Keeper Connections, offering flexible, secure access options that eliminate standing privilege, and enable Just-in-Time session-based authentication.

    • Secrets Manager now allows and Gateways with other Keeper users, enabling secure and collaborative management of secrets across your organization.


    Discovery

    Keeper Discovery provides DevOps, IT Security, and development teams with centralized visibility into privileged accounts and IT assets across local, AWS, and Azure environments. Integrated through the Keeper Gateway, it helps organizations identify unmanaged accounts, misconfigurations, and security risks. By automating asset discovery and delivering actionable insights, Keeper Discovery strengthens security, streamlines operations, and supports compliance across complex infrastructure setups. Version 17.3 brings additional features to the discovery process for customers.

    Details

    To create a Discovery Job, navigate to the Discovery tab and click Create Discovery Job. Then, select an active Keeper Gateway to perform the scan. The Gateway is linked to a PAM Configuration, which defines the environment type being scanned.

    If the PAM Configuration is missing required details, such as CIDR ranges or cloud credentials, you’ll be prompted to provide that information before the job can proceed.

    Once a Discovery Job reaches the Completed state, clicking on the job allows you to review and process the findings interactively. You can select multiple items or go through them individually, adding findings to a queue before finalizing the results.

    While reviewing discovery results, you can choose the Vault location where each resource will be stored and assign the appropriate Admin Credentials. These credentials serve several key functions:

    • User Account Discovery: Used in future discovery jobs to remotely access the resource and identify local user accounts.

    • Password Rotation: Enables on-demand and scheduled password rotations for discovered accounts.

    Additionally, PAM Users identified during discovery can be configured for automatic password rotation.

    In the Discovery Job panel, you can view all previously run jobs along with their status, such as Completed, Running, or Failed.


    New Ways to Connect with Keeper Connections

    Keeper Connections offer multiple authentication methods to securely access target systems:

    • Launch Credentials: Use credentials configured directly on the PAM Machine, Database, or Directory record. Users can initiate sessions without needing direct access to the credentials themselves.

    • Personal/Private Credentials: Users can authenticate using their own credentials stored securely in their Keeper Vault, providing flexibility and personal control.

    • Ephemeral Accounts: When enabled, a temporary, system-generated privileged account is created specifically for the session. This account is automatically removed after the session ends, supporting Just-in-Time access with zero standing privilege.

    Connection Templates

    PAM Machine, PAM Database, and PAM Directory record types can now be set up as Connection Templates, allowing users to launch sessions to target systems without needing a predefined hostname or credential.

    Each template requires configuration of the Keeper Gateway and the relevant connection protocol settings. Once created, templates can be shared with other users. When launching a session from a template, users are prompted to:

    • Enter the target hostname

    • Select a credential from their own Keeper Vault for authentication

    The Keeper Connections tab enable users to instantly and securely access infrastructure assets, such as servers, databases, web apps, and workloads, directly from the Keeper Vault, without exposing credentials. This ensures a zero-trust, zero-knowledge security model.

    Connections are configured on PAM Machine, PAM Database, PAM Directory, and PAM Remote Browser record types, and can be launched directly from these records.

    Under the Connection tab, you can enable users to select credentials from their own vault and optionally configure the launch credentials to rotate automatically upon session termination.

    Within the PAM settings, we've added a new Rotation tab and a JIT Settings tab for each resource.

    Just-in-Time Access with Ephemeral Accounts and Role Elevation enables secure, one-click privileged sessions to infrastructure assets directly from the Keeper Web Vault. With Just-in-Time (JIT) access, users are granted elevated privileges only for the duration of a session, significantly reducing the risk of standing privileged accounts. Once the session ends, all elevated access is automatically revoked.

    Ephemeral Account Creation

    The Keeper Gateway can automatically create temporary privileged accounts on the target system at the start of a session and delete them at the end. This ensures no persistent accounts exist to be compromised.

    Role and Group Elevation

    Instead of creating temporary accounts, KeeperPAM also supports role or group-based elevation, temporarily assigning elevated privileges (e.g., Windows “Administrators” or AWS IAM roles) to the session user. Elevation is revoked automatically when the session ends.

    This flexible approach to JIT access, via ephemeral accounts or role elevation, supports a zero-trust security model while simplifying privileged access management across your infrastructure.


    Sharing Secrets Manager Applications and Gateways

    Keeper Secrets Manager (KSM) offers DevOps, IT Security, and development teams a fully cloud-based, Zero-Knowledge platform to securely manage infrastructure secrets, such as API keys, database passwords, access tokens, certificates, and other sensitive data.

    Once a KSM Application is created, it can be securely shared with other users in your organization. Shared users gain access to application features, including viewing secrets, managing devices and gateways, and configuring PAM record types via the associated Keeper Gateway.

    This sharing capability enables secure team collaboration while preserving strict access controls through Keeper’s Zero-Knowledge security model.

    Domain Controller Configuration

    KeeperPAM now supports Domain Controller configurations, enabling seamless discovery and management of domain-joined resources. When combined with Keeper Discovery, organizations can automatically identify domain-connected assets across their environment and securely manage access through shared KSM Applications, PAM record types, and the Keeper Gateway, all within Keeper’s Zero-Knowledge architecture.


    One-Time Share (OTS) Bidirectional Update

    Keeper One-Time Share (OTS) enables secure, time-limited sharing of records with anyone, no Keeper account required. Ideal for sharing sensitive information with friends, family, or colleagues, OTS eliminates the risks of sending data via email, text, or messaging apps.

    Each share link:

    • Expires automatically at a time you choose

    • Can only be accessed on a single device (device-locked for added security)

    • Prevents unauthorized access, even if the link is intercepted or your email is compromised

    • Supports bidirectional communication, allowing both parties to securely view, edit, or upload content during the session, while maintaining full control and temporary access

    When the recipient opens the share link, the record will launch in their web browser and become bound to that specific device. Access will automatically expire after the designated time, at which point the link becomes invalid and the record can no longer be viewed, even on the originally authorized device.

    The new bidirectional capabilities of Keeper’s One-Time Share (OTS) feature enable true two-way collaboration between Keeper users and non-Keeper recipients, all within a secure, time-limited session. Once the recipient opens the shared record in their browser, they can not only view the information but also:

    • Edit existing fields within the record (e.g., notes, credentials, custom fields)

    • Upload and attach files, such as documents, images, or certificates

    All changes are made within the same secure, device-bound session. Once the recipient clicks Save, the updates are reflected in the sender’s vault in real time.

    This allows for secure, efficient collaboration, such as collecting sensitive onboarding details, exchanging credentials, or updating records, without requiring the recipient to create a Keeper account or leave the zero-knowledge environment. Once the session expires, all access is revoked, ensuring the shared information remains tightly controlled.

    To learn more about Keeper's One-Time Share feature, click .

    Activating Editable One-Time Sharing

    By default, this permission is disabled for Enterprise environments. To activate the feature, visit the Admin Console > Roles > Enforcement Policies > Creating and Sharing and check the box next to "Can create links with editable fields and file upload capabilities".


    Discover all the , or visit website to start your free trial or request a personalized demo.

    Enhancements

    • VAUL-7283: Admins can now create flexible resource records with separate admin and launch credentials, user-supplied credentials, or templates that support custom host and credential entry.

    • VAUL-7285: Admins can now enable JIT ephemeral access, allowing temporary admin privileges, automatic account cleanup, and post-session credential rotation—all securely managed in PAM settings.

    • VAUL-5995, VAUL-7333, VAUL-7235: KSM applications can now be shared with users, with role-based permissions and enhanced management of folders, devices, gateways, and activity logs for better collaboration and security.

    Other Updates

    • VAUL-7488: We improved the import of Dashlane .dash files into Keeper.

    • VAUL-7138: We added the UID from reporting & alerts to the deleted items.

    • VAUL-7370: Fixed a bug that prevented session recording playback from scaling properly.

    • VAUL-7432: Now, users can rotate credentials on PAM user records as long as they have the "Can Rotate" policy and the KSM application has edit permissions.

    Bug Fixes

    • VAUL-6440: Fixed an issue where 2FA duration settings were not honored for users with SMS-based 2FA, causing repeated prompts on each login.

    • VAUL-7325: Fixed an issue where non-owners could manually enter passwords in the Privacy Screen.

    • VAUL-6069, VAUL-6070: Fixed alignment issues in the advanced search results dropdown.

    • VAUL-5979: Updated the login flow so that selecting ‘Master Password’ from the SSO dropdown now defaults the cursor to the email field.

    Enterprise Admin

    Troubleshooting and support for Keeper Enterprise

    Enterprise Guide

    The full Enterprise guide is . Part of the guide contains information on .


    Logo
    The One-Time Share (OTS) feature now enables secure, temporary, bidirectional content exchange with non-Keeper users—no account required—ensuring secure collaboration without sacrificing control or compliance.
    DR-646: Keeper Discovery enhancements to the vault UI provide teams with complete visibility into privileged accounts and IT assets across different environments, helping to eliminate misconfigurations and security gaps.
  • VAUL-6904, VAUL-6167, VAUL-7499: This update enables bidirectional sharing of files, notes, and record content, with full editing capabilities, for seamless collaboration.

  • VAUL-7480: Updated expired account popups to use the latest UI design.

  • VAUL-7195: Keeper Discovery now supports asset discovery with the Domain Controller configuration in Active Directory environments.

  • VAUL-7217: We implemented new router API’s for the DAG.

  • VAUL-6363: Added a warning pill and banner for users in preview mode to highlight the limitations of using beta features and encourage informed testing.

  • VAUL-6055: Updated role enforcement for password length requirements.

  • VAUL-6123: Fixed an issue so that when you click on a record in the search results, it takes you to the correct record.

  • VAUL-7075: Fixed an issue in PAM where the record rotation setting wasn’t being properly checked when updating the resource configuration.

  • VAUL-7172: Updated the PAM script documentation.

  • VAUL-7121: Fixed an issue in the Create New PAM Record modal where tab focusing removed the visual outline around the selected record type.

  • VAUL-6141: Fixed an issue in BreachWatch where a weak password did not correctly update BreachWatch after a record restore.

  • VAUL-7427: Fixed style bugs on the new Security Audit page.

  • VAUL-7215: Fixed an issue where consumers with expired accounts were logged into an unintended limbo state.

  • VAUL-7462: Fixed an issue where importing a Keeper JSON file displayed an error and failed to import folder permissions correctly.

  • VAUL-7472: Fixed an issue where the ARAM event “Created Re-used Password” (reused_password) was not triggering in specific scenarios from the web vault.

  • VAUL-7244: Fixed an issue where SCIM-provisioned, Automator-approved Teams were not appearing in the Vault as expected.

  • VAUL-7490: Fixed a bug where the credentials record icon should be gray when not selected.

  • VAUL-7491: Updated the PAM user record settings to rename one of the duplicate “Rotation” fields to “Rotation Profile” for clarity.

  • Discovery
    Connection updates
    sharing of applications
    here
    Keeper PAM
    License expired and need to to renew your subscription?

    Visit our checkout page: https://keepersecurity.com/checkout


    User Status Report with invalid Last Login date

    The Admin Console user report currently contains empty login dates for accounts larger than 1,000 end-users. We recommend using Keeper Commander to generate a user status report using the user-report command. For example:


    SSO Login: Unable to parse the SAML Response from the IDP

    Typically, this means you need to update your SAML signing certificate. Follow the guide below for step by step instructions:

    https://docs.keeper.io/en/v/sso-connect-cloud/certificate-renewal


    General SCIM Provisioning Issues with Teams and Users

    • Ensure that you have assigned users or groups to the correct SAML application in your IdP

    • When you invite a user from the identity provider or assign a user into a group that has been provisioned, the IdP will send the request to Keeper to either invite a user to join, or to add a user to a team, or to create a team.

    • If the user does not exist yet in Keeper, they will receive an invite to sign up (or they can use just-in-time provisioning)

    • After the user has created their Keeper account, the user will not yet be assigned into a Keeper team until one of a few things happen: (a) Admin logs into the Admin Console > Click on "Full Sync" from the Admin screen (b) A user from the relevant team logs into the Web Vault or Desktop App (c) Admin runs team-approve from Keeper Commander The reason that teams and users can't be created instantly via SCIM, is due to the encryption model and the need to share a private key between users. Sharing an encryption key (e.g. Team Key) can only be performed by a user who is logged in, and has access to the necessary private keys.

    • Note: The next version of the Keeper Automator service (v3.0) will support the dynamic approvals of teams and team-user assignments. about the Keeper Automator service.


    SCIM Team User Assignment Delays

    In Keeper, a team that is provisioned must generate the necessary public/private encryption key pair for that team. Similarly, when a user is assigned to a team, the team private key is encrypted with the public key of the user. This way, a user who is assigned team folders in the Keeper vault is able to decrypt the necessary folder keys and record keys. Since Keeper is a zero knowledge platform, this transaction must occur from one of the authenticated client device applications, such as the Admin Console, Vault, Commander CLI or Automator tools.

    When a team or a team-user assignment is provisioned through SCIM, the team creation and the user team assignment goes into a "pending queue". This queue is then processed by the authenticated client side application that either creates the necessary team keys and shares the private keys with the intended users.

    Currently, team creation and team-user assignment occurs when:

    • The Admin logs in to the Keeper Admin Console UI

    • The Commander CLI "team-approve" command is run

    • The Keeper Automator service is deployed (version 3.2+)

    If you need to quickly clear out your pending Team and Team-User assignments, please run the following steps on a periodic basis:

    • Install the Keeper Commander CLI

    • Login to Keeper Commander using keeper shell

    • Run the following commands:


    Enterprise SSO Users unable to login

    For security reasons, Keeper will prevent Enterprise users outside of an SSO node from logging in with a federated identity provider. If you have users unable to login with SSO, please ensure that the user is provisioned to the node within the Keeper Admin Console to the SSO-enabled node. To move a user into an SSO node, edit the user and select the node from the drop-down.


    Users Not Receiving Email Invites

    Keeper's email system will automatically suppress delivery to an email that has bounced. This typically occurs if you set up someone's Keeper account before their email inbox exists. If you are in this situation with a particular user, please contact the Keeper B2B support team and we'll remove the email from our suppression list.


    Enterprise End-User's Email Changed

    If your user's email has changed in your identity provider, you can simply add an alias to the user's identity in Keeper. This can be accomplished using the enterprise-user command. For example:

    This command will only allow aliases to be created with reserved domains. To learn more about Keeper Commander, visit the documentation.


    Enterprise Domain is Changing or has Changed

    If your company is migrating users to a new email domain, Keeper supports enterprise-wide domain aliases to make the transition seamless. Open a support ticket to request a domain alias.


    SSO Users asked for Master Password

    If you have an SSO user being asked to enter a Master Password:

    • Ensure that the user has been provisioned to an SSO-enabled node

    • Ensure that the user is logging in from the correct data center (US, EU, AU, JP, CA, GOV)


    User Prompted for Device Approval

    Device Approvals are a required component of the SSO Connect Cloud platform. Approvals can be performed by users, admins, or automatically using the Keeper Automator service.

    • Users can approve their additional devices by using a previously approved device. For example, if you are logged into your web vault on your computer already, and logging into your phone app for the first time, you will get a device approval prompt on your web vault with the mobile device's information which you can approve or deny.

    • Keeper SSO Connect Cloud™ provides Zero-Knowledge encryption while retaining a seamless login experience with any SAML 2.0 identity provider.

    • When a user attempts to login on a device that has never been used prior, an Elliptic Curve private/public key pair is generated on the new device. After the user authenticates successfully from their identity provider, a key exchange must take place in order for the user to decrypt the vault on their new device. We call this "Device Approval".

    • Using Guest, Private or Incognito mode browser modes or clearing the browsers cache will identify itself to Keeper as a new device each time it is launched, and therefore will require a new device approval.

    To preserve Zero Knowledge and ensure that Keeper's servers do not have access to any encryption keys, we developed a Push-based approval system that can be performed by the user or the designated Administrator. Keeper also allows customers to host a service which performs the device approvals and key exchange automatically, without any user interaction.

    When logging into a new or unrecognized device, the user has two options:

    • Keeper Push (using their own devices)

    • Admin Approval (request administrator approval)

    Or, you can skip this step completely by deploying the Keeper Automator service.


    Questions about Cost of Deploying Automator

    Keeper Automator can be deployed many ways, depending on your requirements. The least expensive method of using Automator would be using a micro instance of a Linux VM using the Docker Compose method. If you would like to use only cloud services, we recommend the AWS Container Service or Azure App Gateway method.


    Delays in Login and Device Approval

    If logging into a new device takes 20-30 seconds to complete, this could be caused by your Keeper Automator service being misconfigured or inaccessible by the Keeper servers. Please disable the Keeper Automator in your environment using the "automator disable" command.


    Automator Fails after Instance Reboot (when using Azure App Gateway)

    After an unexpected reboot of the container instance in Azure the container can sometimes come back up with a new IP address (e.g. x.x.0.5 even when the App Gateway had originally been provisioned with an IP of x.x.0.4 in the backend pool). Updating the IP of the container in the backend pool resolves this issue.

    • In the Azure cloud shell, retrieve the current IP: az container show --name keeperautomatorcontainer --resource-group keeper_automator_rg --query ipAddress.ip --output tsv

    • In Azure portal select Resource groups > $your_resource_group > your Application Gateway > Backend pools > change Target IP to the new one from above.


    SSO Cloud Certificate Update

    Keeper's SSO Certificate expires annually in August timeframe. The new cert is available by logging into the Admin Console. If you need to update the Keeper SP Certificate, see the step by step instructions here.


    SSO Connect On-Prem Certificate

    Customers running SSO Connect On-Prem must renew SSL certificates on an annual basis. The date depends on when your SSL certificate is expiring. If you are receiving an SSL certificate error, please renew your cert by following the instructions here.


    Commander scripting or coding questions

    Please see the Keeper Commander troubleshooting page.


    Secrets Manager

    Please see the Secrets Manager troubleshooting page.


    Keeper Connection Manager

    Please see the KCM troubleshooting page.


    Contact Us

    If you need help, please open a support ticket in our ServiceNow system.

    If you need to speak to our support team, simply make the request and we will schedule it during business hours. Please be patient as we coordinate the call.


    Emergency Support

    If you're a business customer having an emergency and need urgent support, make sure to use our ServiceNow support portal. On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".


    Feature Requests

    We love hearing from Enterprise customers. Send your feature requests to: [email protected].


    Beta Slack Channel

    Join our Beta Slack Channel to post questions, feedback or receive new beta versions.

    located here
    deploying to end-users
    user-report --format csv --output last-logins.csv 
    enterprise-down
    team-approve --team
    team-approve --email
    enterprise-user --add-alias [email protected] [email protected]
    Read more

    Latest Updates from Keeper

    Keeper platform updates and release notes

    Jump to Section
    Join our Communities
    Resources
    • to our Slack Channels

    Recent Updates

    Date
    Platform
    Links

    Release History by Platform

    New Content and Guides

    Description
    Links

    Milestones

    Keeper Forcefield

    Protect your machines against infostealers and memory-based attacks.

    FIPS 140-3 Validation

    The Keeper Security Cryptographic Module is certified by the NIST Cryptographic Module Verification Program (CMVP) to meet the FIPS 140 standard under certificate #4976.

    Endpoint Privileged Manager

    Advanced Privileged Elevation and Delegation Management (PEDM) solution that provides secure, just-in-time privileged access across your IT environments.

    KeeperPAM: Privileged Access Manager

    Achieve visibility, security, access control and compliance across your entire organization.

    Risk Management Dashboard

    Comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring.

    Passphrase Generator, Password and Passphrase Policies

    Enhanced policy enforcements for password and passphrase generation.

    Granular Sharing Policies

    Enhanced policy enforcements related to record and folder sharing.

    Time-Limited Access

    Provide time-based access to any resource in Keeper.

    Self-Destructing One-Time Shares

    Simplify employee onboarding and external data management with self-destructing shares.

    Automated Password Rotation

    Securely and automatically rotate credentials across cloud-based and on-premises environments.

    Share Admin

    Provide additional privilege to admins who manage shared data.

    FedRAMP Authorization

    Keeper is the industry's first FedRAMP and StateRAMP Authorized solution.

    One-Time Share

    Share records securely to non-Keeper users

    Keeper Connection Manager

    Instantly access your infrastructure with zero-trust security.

    Compliance Reports

    On-demand visibility to access permissions on records and credentials in your enterprise.

    Keeper Secrets Manager

    Manage and protect your cloud infrastructure with zero-trust and zero-knowledge security.

    Record Types

    Structured template that can contain any type of information such as logins, payment cards, bank accounts, and many more.

    Keeper Automator

    Automated encryption operations and end-user approvals for SSO Cloud deployments.


    Slack Channel

    Please join Keeper's Slack Channel by requesting access from [email protected] or contact your Keeper customer success representative.

    Statuspage

    Realtime system status is available at:

    Reddit

    Post public questions on our Reddit community page

    Need Help?

    If you require assistance, please open a ticket:

    Enterprise customers please select "Business" or "MSP"

    If this is an urgent issue, click on the "This is an emergency..." checkbox

    Nov 25, 2025

    SSO Connect On-Prem 17.0.2

    Nov 24, 2025

    Admin Console 17.6.4

    Nov 19, 2025

    Browser Extension 17.4.0

    Nov 17, 2025

    Admin Console 17.6.3

    Nov 15, 2025

    Keeper Gateway 1.7.5

    Nov 14, 2025

    KSM "interpolate" command

    Nov 13, 2025

    Keeper Gateway 1.7.4

    Nov 12, 2025

    The New Commander Python SDK

    Nov 12, 2025

    Backend API 17.6.1

    Nov 10, 2025

    SSO Connect On-Prem 17.0.1

    Nov 6, 2025

    Ruby SDK for Secrets Manager

    Nov 6, 2025

    Cursor Plugin 2.0.0 (Open VSX)

    Nov 6, 2025

    VSCode Extension 2.0.0

    Nov 3 , 2025

    Android 17.3.30

    Nov 3, 2025

    Raycast Extension

    Nov 3, 2025

    Web Vault & Desktop App 17.4.1

    Oct 29, 2025

    Admin Console 17.6.2

    Oct 16, 2025

    iOS 17.6

    Oct 15, 2025

    Browser Extension 17.3

    Oct 12, 2025

    Jetbrains Plugin 1.0.0

    Oct 9, 2025

    Keeper Gateway 1.7.2

    Oct 3, 2025

    Admin Console 17.6

    Oct 3, 2025

    Keeper Gateway 1.7.1

    Sep 30, 2025

    Web Vault & Desktop App 17.4

    Sep 30, 2025

    Password Importer 17.0.1

    Sep 30, 2025

    Backend API 17.6

    Sep 30, 2025

    Forcefield 1.1

    Sep 22, 2025

    Keeper Gateway 1.7

    Sep 22, 2025

    Browser Extension 17.2.4

    Sep 18, 2025

    Terraform Provider for KSM 1.1.7

    Sep 18, 2025

    Visual Studio Plugin 1.0.1

    Sep 18, 2025

    Cursor Plugin 1.0.1 (Open VSX)

    Sep 18, 2025

    Admin Console 17.5

    Sep 15, 2025

    Keeper Connection Manager 2.21.0

    Sep 11, 2025

    Browser Extension 17.2.3

    Sep 5, 2025

    Keeper Security Trust Center

    Sep 3, 2025

    Commander CLI 17.1.8

    Aug 28, 2025

    Commander CLI 17.1.7

    Aug 28, 2025

    Java SDK 17.1.1 for Secrets Manager

    Aug 27, 2025

    Browser Extension 17.2.1

    Aug 26, 2025

    Keeper Connection Manager 2.20.1

    Aug 18, 2025

    Rust SDK for Secrets Manager

    Aug 18, 2025

    Backend API 17.5.9

    Aug 11, 2025

    Web Vault & Desktop App 17.3.3

    Aug 4, 2025

    iOS 17.4

    Aug 1, 2025

    Web Vault & Desktop App 17.3.2

    July 31, 2025

    Commander CLI 17.1.5 with Biometric Login

    July 31, 2025

    Microsoft Sentinel Integration in Azure Marketplace

    July 28, 2025

    Backend API 17.5.8

    July 24, 2025

    Web Vault & Desktop App 17.3

    July 24, 2025

    Keeper Gateway 1.6.1

    July 24, 2025

    Browser Extension 17.2 with Biometric Login and TOTP capture

    July 23, 2025

    Connection Manager 2.20.0

    July 22, 2025

    Backend API 17.5.6

    July 9, 2025

    Commander 17.1.3

    July 7, 2025

    Keeper Gateway 1.6.0

    July 3, 2025

    Keeper Gateway 1.5.6

    July 2, 2025

    Admin Console 17.4

    June 20, 2025

    Commander PAM Resource Import

    June 19, 2025

    Keeper Gateway 1.5.5

    June 16, 2025

    Keeper Gateway 1.5.4

    June 10, 2025

    Backend API 17.5.1

    June 10, 2025

    Admin Console 17.3

    May 26, 2025

    Browser Extension 17.1.2

    May 18, 2025

    Web Vault & Desktop App 17.2

    May 18, 2025

    Backend API 17.5.0

    May 18, 2025

    Keeper Forcefield

    |

    May 15, 2025

    Customer service AI chatbot

    May 14, 2025

    Admin Console 17.2.4

    May 14, 2025

    Commander 17.0.19

    April 18, 2025

    KeeperChat 17.0

    April 10, 2025

    KeeperPAM Gateway 1.5.2

    April 8, 2025

    Backend API 17.4

    April 8, 2025

    Admin Console 17.2.2

    Mar 31, 2025

    Browser Extension 17.1

    Mar 23, 2025

    Commander 17.0.11

    Mar 20, 2025

    KeeperPAM Gateway 1.5.1

    Mar 12, 2025

    Web Vault & Desktop App 17.1.1

    Mar 6, 2025

    Admin Console 17.2

    Mar 1, 2025

    Commander 17.0.8

    Feb 28, 2025

    Connection Manager 2.19.3

    Feb 27, 2025

    FIPS 140-3 Module

    Feb 13, 2025

    Web Vault & Desktop App 17.1

    Feb 13, 2025

    Admin Console 17.1

    Feb 12, 2025

    Automator 17.0

    Feb 9, 2025

    Browser Extension 17.0

    Feb 6, 2025

    KeeperPAM Cloud Launch

    and

    Feb 5, 2025

    Admin Console 17.0

    Example PAM Resource import through Commander

    Browser Extension tool to clear your browser cache

    Keeper MCP Server (node version)

    and

    Keeper MCP Server for AI Agents (docker)

    and

    Commander Service Mode (REST API)

    Keeper Forcefield

    and

    Keeper for Wear OS

    Browser Extension Snapshot Tool for autofill fixes

    Endpoint Privilege Manager

    and

    Guest Mode feature for Connection Manager

    CyberArk cloud import

    PowerShell and

    Automator guide for Google Cloud Run

    Keeper Connection Manager custom extension

    TeamCity integration

    Dec 8, 2025

    Backend API 17.6.3

    Release Notes

    Nov 28, 2025

    Credential Provisioning Commands

    Nov 28, 2025

    ServiceNow ITSM Integration

    Nov 25, 2025

    Keeper Connection Manager 2.22.0

    Release Notes

    • Web Vault & Desktop

    • Admin Console

    • iOS

    • Browser Extensions

    • Connection Manager

    • Secrets Manager

    • Keeper Gateway

    • SSO Connect On-Prem

    • Commander

    • Backend API

    • Automator

    • KeeperChat

    KeeperAI video overview

    KeeperAI for Privileged Sessions

    KeeperAI for privileged sessions

    Access to our security and compliance resources and reports

    Keeper Security Trust Center

    Bidirectional One-Time Share

    Documentation

    Browser Extension Biometric Login with Passkeys

    Documentation

    Health Checks on the Keeper Gateway

    https://www.keepersecurity.com/forcefield-endpoint-protection/
    https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4976
    https://docs.keeper.io/en/keeperpam/endpoint-privilege-manager/overview
    https://docs.keeper.io/en/privileged-access-manager
    https://docs.keeper.io/en/enterprise-guide/risk-management-dashboard
    https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.18.0
    https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.16.0
    https://docs.keeper.io/en/v/enterprise-guide/sharing/time-limited-access
    https://docs.keeper.io/en/v/enterprise-guide/sharing/self-destructing-records
    https://docs.keeper.io/en/privileged-access-manager/privileged-access-manager/password-rotation
    https://docs.keeper.io/enterprise-guide/share-admin
    https://www.keepersecurity.com/industries/public-sector.html
    https://docs.keeper.io/enterprise-guide/one-time-share
    https://www.keepersecurity.com/connection-manager.html
    https://docs.keeper.io/enterprise-guide/compliance-reports
    https://www.keepersecurity.com/secrets-manager.html
    https://docs.keeper.io/user-guides/record-types
    https://keeper.io/automator
    https://statuspage.keeper.io/
    https://www.reddit.com/r/KeeperSecurity/
    https://www.keepersecurity.com/support.html
    Recent Updates
    Releases by Platform
    New Content and Guides
    Milestones
    Request Access
    Register for Update Emails
    Reddit Community
    Keeper Trust Center

    Read Me First

    Most common troubleshooting issues across all Keeper applications

    System Status

    Monitor the Keeper infrastructure system health here:


    User Guides

    All Keeper end-user and Enterprise documentation can be found at the .


    AI Chatbot

    We have published a helpful AI chatbot which is trained on Keeper documentation. Give it a try here:


    Searchable FAQs

    See our FAQ list from:


    Syncing or Data Issues

    If information is not sync'd or out of date, you may just need to run a Full Sync.

    • From the web vault or desktop app, click on Full Sync from the lower right.

    • On iOS and Android, go to the Account tab > Sync > Sync Now.

    • On the browser extension (17.2+), click on Full Sync from the main menu.


    Autofill Issues

    Keeper has implemented a "Snapshot Tool" which helps customers solve Autofill issues quickly. This process allows us to deploy autofill fixes within the same day.


    SCIM Provisioning Errors

    SCIM enforces reserved domains on any provisioning request. If you receive an error like "This domain cannot be used for SCIM provisioning" or "Use a different email domain" from SCIM provisioning, This means that you need to request domain reservation for the email domain that is being provisioned.


    SSO Logins not working

    Typically, this means you need to update your SAML signing certificate. Follow the guide below for step by step instructions:


    Email Invites Not Sending Custom Template

    For security reasons, custom email invitations cannot be sent to users if the domain has not been reserved by the customer. To learn about Domain Reservation please .


    Ubuntu Linux GPG Key

    Keeper's signing key for the Ubuntu Linux version of Keeper Desktop has expired, so we extended the expiration and pushed up a new GPG public key. This key is hosted at the below location:

    We've also submitted this latest GPG public key to the keyserver.ubuntu.com keyserver.

    Customers can pull down the latest key by running the below command and then retrying:


    Samsung Autofill Selection Not Showing

    Some customers are unable to select Keeper from the Samsung provider list when activating KeeperFill.

    If Keeper does not show up, please open your device settings and search for "Passwords" then select Keeper under "Passwords, passkeys and autofill".


    iOS Stuck on Syncing

    If you are seeing syncing stuck on the screen, please check the following:

    • Update to the latest version of Keeper on the App Store

    • Instead of logging in with biometrics, try to login with your Master Password (clicking "Next")

    • After a successful login, visit the settings screen of Keeper and turn OFF/ON the Face ID or Touch ID setting.


    Verification Codes Missing on Apple Watch After Update (Keeper v17.4.0):

    Following the update to Keeper on iOS version 17.4.0, some users may find that the Verification Code (2FA/OTP) option is no longer visible on their Apple Watch. This happened due to a required update to how the iPhone app and the watch app talk to each other. For those users, this means the link between the two needs to be re-established to get your codes showing again.

    How to Fix It:

    Use a Backup Code to Log In & Reset your 2FA

    1. When logging into your account, choose the option to use a backup code when prompted for your usual verification code.

    2. Once you are logged in, navigate to Settings & then Two-Factor Authentication.

    3. Find and select the option to Turn Off Two-Factor Authentication.

    4. Finally, select Two-Factor Authentication again and proceed to add your Apple Watch.

    When you set up 2FA again, you will get a new set of backup codes. Please remember to save these new codes in a safe and secure place!

    Don't Have Your Backup Codes?

    If you can't find your backup codes, please contact our support team . We are ready to help you get this sorted out.


    I'm being asked for a PIN with my FIDO2 Security Key

    We're constantly improving Keeper's security to keep our users safe. Starting with Backend API Version , if you're using a FIDO2 Yubikey device for two-factor authentication (2FA), you might need to enter a PIN associated with your device when you log into Keeper. This is a FIDO2 feature called "user verification" that our system uses to check if the PIN is set up on your device.

    If you'd rather not use a PIN with your FIDO2 Yubikey device, you can remove it using the . However, keep in mind that if you reset your Yubikey device, you'll have to re-register your key with Keeper and any other application that you use with your key.

    We will add a feature soon to allow consumers to decide whether or not user verification is required. This will be added to Vault version 16.10.4.

    For our business customers, we're planning a role enforcement feature that requires user verification (by setting userVerification response to "required"). Until then, the system will respond based on your device setup.

    Getting a 403 Error or Unable to Load Website

    If you are unable to access Keeper's website or Vault from your device with a "403 error", your IP address is being blocked. Keeper automatically blocks IP Addresses that have a "low reputation score". This list of IPs is maintained by a dedicated threat research team at Amazon AWS, and as such we do not have visibility into exact reasons why an IP is placed on this list. To resolve the issue:

    • Open the below URL on a computer which is generating this error:

    • Your external IP address will be provided on the screen.

    • Please send the IP to the Keeper support team support team via our support page at and we'll check into unblocking it from our WAF.


    Upgrade to the Latest Version

    Many issues can be resolved by updating your Keeper app. Install the latest Keeper version from your App Store or the .


    Perform a Full Sync

    From the mobile apps, go to the Account screen > Sync > Sync Now. This performs a "full sync" of all the data and ensures that anything missed in the normal sync process is caught. The latest Web Vault and Desktop App also have a "Sync" feature along the bottom of the screen.


    Install Any Pending Browser Updates

    Browser extensions generally stop working properly if an update is pending or the browser is out of date, even by one version. Make sure to update your web browser to the latest version and then fully restart your web browser.


    Clear Cache / Reset the Vault

    Clear cache on your web browser or open Incognito Mode to try and login. If this works, you should just reset your Keeper app by visiting the Web Vault on your respective data center:

    • (US)

    • (EU)

    • (AU)

    • (CA)

    By appending #reset on the end will force Keeper to clear local data. Refresh the page a few times and this should clear things out.


    Ensure Only One Extension is Installed

    Ensure only ONE Keeper browser extension is installed. Having two installed causes many issues. Visit Window > Extensions and check your extensions. Don't use multiple password managers at the same time.


    Check for Cache Settings

    Ensure that "clear site data when you quit Chrome" is disabled. This can cause errors and vault decryption issues.


    Check for Conflicting Antivirus, Popup Blockers, Other Browser Extensions

    This is a very common issue with our users. Keeper's advanced security protection and encryption prevents inspection of traffic, otherwise known as "man-in-the-middle". This can sometimes conflict with antivirus, popup blockers and web filtering apps. Make sure to try turning OFF these 3rd party plugins or applications to see if they are causing any conflict with Keeper.


    Don't Block Cookies

    Many websites (including Keeper's browser tools) won't function correctly if you block cookies, block Javascript, block local storage or have any extreme browser privacy settings that prevent our product from running. Please try to set your browser to default settings and see if that resolves the issue you're experiencing.


    Check Your System Clock

    If you are experiencing an issue where the Two-Factor (TOTP) codes are different between your mobile and desktop devices, this is usually caused by the time difference between your devices. Ensure that your device time and date is set to "Automatic". If the times are different by even a few seconds, this will cause different codes to appear on different devices.


    Face ID or Touch ID Stopped Working

    If biometrics such as Face ID / Touch ID stops working, simply login to Keeper with your Master Password (or SSO), then visit the Settings screen and turn biometric login OFF and ON. This should resolve any biometric login issues.


    Forgot Master Password?

    Consumers: Keeper employees do not have access to your Master Password or Recovery Phrase, and we cannot reset it for you. If you have forgotten your Master Password, please try using our Account Recovery feature by visiting the "Need Help" > "Forgot Master Password" option on the Keeper login screen.

    Without your Master Password or recovery phrase, your records cannot be decrypted. If you don't have recovery setup for the Keeper account at all, unfortunately account recovery will not be possible.

    If you have tried all possible Master Password and Account Recovery options and are still unable to login to Keeper, we can delete your account so that you can start over. Please contact the support team for assistance.

    A very common issue when a user is unable to login, is that people could have multiple Keeper accounts (perhaps from different email addresses), or maybe a typo in your email address. If you think that's a possibility, please contact our support team and we will assist you.

    Business Customers: If you have tried all possible Master Password options and are still unable to login to Keeper, you will need to contact one of your Keeper Administrators within your company to have them either transfer your account to a new vault so that you do not lose any data. Or, request your Admin to delete your profile and re-invite you which will allow you to start over with a new master password. If you are using SSO for login, they can assist you in recovering your account with the SSO provider.

    If you would like to change your existing Master Password from the Web Vault & Desktop App, from the account dropdown menu (your email ) select Settings and next to "Master Password" click Reset Now. You will then be prompted to enter your current Master Password Password and create and confirm a new Master Password.

    To change your Master Password on iOS and Android devices, within your vault, navigate to the Settings menu, scroll down and tap Reset Master Password (on iOS) or RESET NOW (on Android). You will then be prompted to enter your Current Master Password Password and create and confirm a new Master Password.


    2FA Issues (Lost phone or Authenticator)

    Consumers: If you changed phones or do not have access to your two-factor authentication device, please contact Keeper support and we will assist you in resetting your Two-Factor Authentication settings. For individual and family users, please open a consumer support ticket and we will assist you.

    Business Customers: Please contact the Keeper Administrator at your company. Your Keeper Admin can disable your 2FA. For Keeper Administrators, please open a business support ticket and we will assist you.


    How to Stay Logged In Longer

    Keeper Web Vault, Desktop App and Browser Extensions have been updated with the "Stay Logged In" feature for all customers. To activate this feature open your browser extension > settings > Stay Logged In and turn the setting "ON". If it's already on, you may want to turn the setting OFF and ON. Then, logout and login to the browser extension. Learn more about "Stay Logged In" here:


    Account Recovery Phrase Setup

    Upon initial vault login, new users will be prompted to set up Account Recovery. Click Generate Recovery Phrase to begin.

    Once your recovery phrase has been generated, be sure to store it in a safe place. For added convenience, you will be given the option to copy or download it. Check the box to acknowledge you have stored it in a safe place and click Set Recovery Phrase to complete the setup.

    Please note that if you forget your master password and lose your recovery phrase, you will not be able to login to your vault and Keeper Support will be unable to help you regain access.


    Forgotten Master Password & Account Recovery

    After their initial login, users are asked if they would like to set up Account Recovery using an account recovery phrase. This is especially important if you forget your Master Password during the account recovery process which is based upon an account recovery phrase, backup verification code (sent via email) and Two-Factor Authentication code (if enabled).

    In addition to enabling an account recovery phrase, we recommend turning on Keeper's Two-Factor Authentication feature from your account's "Settings" menu.

    Users who have signed into Keeper after August 2015, will automatically have Account Recovery enabled. To initiate Account Recovery, simply open Keeper through the Web Vault, iOS, Android or Desktop app and from the login screen, click/tap Forgot Password. Keeper will then walk you through a few steps to change your Master Password and recover your account. These steps will include a series of prompts requesting the following actions:

    • Enter your email address to initiate the account recovery process

    • Enter a backup verification code

    • Enter your account recovery phrase

    • Enter your Two-Factor Verification code (if enabled)


    SSO Cloud SP Cert Update

    The SSO Connect Cloud SP Cert has been renewed. If you have enabled strict SP certificate checking on your identity provider, you may need to update the Keeper cert in your IdP.

    • Login to Admin Console > select SSO node > Provisioning > click on SSO Cloud > "Export SP Cert"

    • Upload the cert to your IdP "SP Certificate" or "SP Signing Certificate" section.

    Notes:

    • This only affects identity providers where strict SP cert validation is enabled

    • This will not affect environments running the Automator service

    • Customers using Okta and Single Logout (SLO) may need to update the SP certificate.


    Platform-Specific Troubleshooting Guides

    Business customers who need a range of IPs to be unblocked can provide a CIDR.

    https://keepersecurity.jp/vault#reset (JP)

  • https://govcloud.keepersecurity.us/vault#reset (GOV)

  • Enter a new Master Password

    Enterprise Admin

    https://statuspage.keeper.io/
    https://www.chatbase.co/chatbot-iframe/zL9amcXx2TZAhf79olykG
    https://help.keeper.io/
    https://docs.keeper.io/en/v/sso-connect-cloud/certificate-renewal
    follow this link
    https://keepersecurity.com/desktop_electron/Linux/signing.pub
    HERE
    16.10.0
    Yubico Manager app
    https://checkip.amazonaws.com
    keeper.io/freesupport
    Keeper Website
    https://keepersecurity.com/vault#reset
    https://keepersecurity.eu/vault#reset
    https://keepersecurity.com.au/vault#reset
    https://keepersecurity.ca/vault#reset
    https://docs.keeper.io/user-guides/tips-and-tricks/stay-logged-in
    KeeperFill Browser Extensions
    Vault & Desktop App
    iPhone & iPad
    Android
    Quick Sync and Full Sync
    Cookie Settings
    Android
    Enterprise Bridge
    Typer
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Download Link
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Download Link
    Download Link
    Release Notes
    Release Notes
    Release Notes
    Trust Center
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Website
    AI Chatbot
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    View Certificate
    Release Notes
    Release Notes
    Release Notes
    Release Notes
    Web page
    Release Notes
    Documentation
    Github
    Documentation
    Github
    Documentation
    Web Page
    Documentation
    Documentation
    Documentation
    Web Page
    Documentation
    Docs
    Commander import method
    Docs
    Docs
    Documentation
    Introducing Keeper's Bidirectional One-Time Share
    sudo gpg --keyring /etc/apt/trusted.gpg.d/keeper.gpg --keyserver 
    hkp://keyserver.ubuntu.com:80 --recv-keys A692259838FF25C92DC863269883A36384BA3F6B
    Learn more
    here
    Optimized Password Rotation
    Connections
    Tunnels
    Remote Browser Isolation
    Session Recordings and Playback
    Discovery
    Endpoint Privilege Manager
    PAM Enforcement Policies (RBAC)
    detailed documentation on SSH parameters
    detailed documentation on RDP parameters
    detailed documentation on VNC parameters
    PAM features
    Documentation
    Documentation
    KeeperAI Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    Documentation
    documentation portal
    Security and Encryption Model
    Documentation
    Docs
    Documentation
    Read more about Domain Reservation
    Read more about the Autofill Snapshot Tool