Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Okta security breach disclosed in October 2023
Keeper Security is aware of the recent security breach at Okta, where cybercriminals accessed client files through its support system. As part of its support process and system, Okta’s customers upload HTTP Archive (HAR) files which contain sensitive information from the user's web browser. This information included session tokens that were used to impersonate several Okta customers.
Keeper Security does not use any of Okta’s products internally - for Single Sign-On (SSO) or any other purpose. Therefore, Keeper’s internal business operation was not impacted by the security incident at Okta.
Keeper is a zero-knowledge and zero-trust cybersecurity platform which means that all of the encryption of user data occurs on the user's device, and Keeper does not have the ability to access any customer data. Further, least-privilege, role-based access control and delegated administration permit and restrict access for all users in the system. Keeper's employees utilize the Keeper Enterprise platform for authenticating into websites and applications using strong and unique passwords generated by our software.
Keeper SSO Connect® is a powerful feature of the Keeper platform which provides customers with the ability to authenticate into their Keeper vaults using their preferred SAML 2.0 identity provider - both on-premises and in the cloud. Keeper SSO Connect, when properly configured with Okta SSO, provides enterprise-wide authentication and end-to-end encryption with zero-knowledge and zero-trust security.
For those customers who use Okta with Keeper SSO Connect for accessing their Keeper vaults, please implement the following best practices:
Enforce MFA on the Keeper vault in addition to enforcing MFA at Okta for all privileged users. Keeper is the only Enterprise Password Manager that provides an additional layer of MFA to reduce the risk associated with an identity provider takeover attack.
To prevent users from accessing their work vaults outside of approved locations and networks, administrators should activate IP Address Allowlisting. This is a role-based enforcement setting in the Keeper Admin Console which enforces that users can only access their vaults when their device is on an approved network. This should always be enforced for administrative roles.
Reduce administrator privilege for SSO-enabled accounts. If an administrator uses Okta to authenticate into the Keeper platform, reduce the role privilege so that their administrative responsibility is limited in scope to perform their role with the organization.
Ensure that at least one administrator is able to access the Keeper platform using a Master Password authentication method in case the SSO identity provider is unavailable.
Activate Keeper's event reporting and alerting system into your security operations. Keeper integrates into any popular SIEM solution including Splunk and Datadog. In the Keeper Admin Console, alerts can be configured to notify your security team covering over 200 different event types.
https://docs.keeper.io/enterprise-guide/recommended-security-settings
https://docs.keeper.io/sso-connect-cloud/
https://keepersecurity.com/security.html
If you have any questions please contact security@keepersecurity.com.
Notices of recent security advisories and impact on Keeper
As new security advisories are published online for various systems, Keeper Security will post relevant information here.
Latest product and system updates
Mar 6, 2025
Admin Console 17.2
Mar 1, 2025
Commander 17.0.8
Feb 28, 2025
Connection Manager 2.19.3
Feb 27, 2025
FIPS 140-3 Module
Feb 13, 2025
Web Vault & Desktop App 17.1
Feb 13, 2025
Admin Console 17.1
Feb 13, 2025
Android 17.0
Feb 12, 2025
Automator 17.0
Feb 10, 2025
iOS 17.0
Feb 9, 2025
Browser Extension 17.0
Feb 6, 2025
KeeperPAM Launch
Feb 6, 2025
Web Vault & Desktop App 17.0
Feb 5, 2025
Admin Console 17.0
Guest Mode feature for Connection Manager & RBI
CyberArk import (on-prem and cloud)
Automator installation guide for Google Cloud Run
Keeper Connection Manager example custom extension
TeamCity integration with Keeper Secrets Manager
The Keeper Security Cryptographic Module is certified by the NIST Cryptographic Module Verification Program (CMVP) to meet the FIPS 140 standard under certificate #4976.
https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4976
Achieve visibility, security, access control and compliance across your entire organization.
https://docs.keeper.io/en/privileged-access-manager
Comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring.
https://docs.keeper.io/en/enterprise-guide/risk-management-dashboard
Enhanced policy enforcements for password and passphrase generation.
https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.18.0
Enhanced policy enforcements related to record and folder sharing.
https://docs.keeper.io/en/v/release-notes/enterprise/admin-console/admin-console-16.16.0
Provide time-based access to any resource in Keeper.
https://docs.keeper.io/en/v/enterprise-guide/sharing/time-limited-access
Simplify employee onboarding and external data management with self-destructing shares.
https://docs.keeper.io/en/v/enterprise-guide/sharing/self-destructing-records
Securely and automatically rotate credentials across cloud-based and on-premises environments.
https://docs.keeper.io/en/privileged-access-manager/privileged-access-manager/password-rotation
Provide additional privilege to admins who manage shared data.
https://docs.keeper.io/enterprise-guide/share-admin
Keeper is the industry's first FedRAMP and StateRAMP Authorized solution.
https://www.keepersecurity.com/industries/public-sector.html
Share records securely to non-Keeper users
https://docs.keeper.io/enterprise-guide/one-time-share
Instantly access your infrastructure with zero-trust security.
https://www.keepersecurity.com/connection-manager.html
On-demand visibility to access permissions on records and credentials in your enterprise.
https://docs.keeper.io/enterprise-guide/compliance-reports
Manage and protect your cloud infrastructure with zero-trust and zero-knowledge security.
https://www.keepersecurity.com/secrets-manager.html
Structured template that can contain any type of information such as logins, payment cards, bank accounts, and many more.
https://docs.keeper.io/user-guides/record-types
Automated encryption operations and end-user approvals for SSO Cloud deployments.
Please join Keeper's Slack Channel by requesting access from feedback@keepersecurity.com or contact your Keeper customer success representative.
Realtime system status is available at: https://statuspage.keeper.io/
Post public questions on our Reddit community page
https://www.reddit.com/r/KeeperSecurity/
If you require assistance, please open a ticket:
https://www.keepersecurity.com/support.html
Enterprise customers please select "Business" or "MSP"
If this is an urgent issue, click on the "This is an emergency..." checkbox
Response to "AutoSpill" report from Black Hat EU 2023
A presentation at Black Hat EU 2023 discussed credential stealing on mobile password managers. Keeper was listed as an impacted application. Keeper has safeguards in place to protect against this issue as described below.
On May 31, 2022, Keeper received a report from the researcher about a potential vulnerability. We requested a video from the researcher to demonstrate the reported issue. Based upon our analysis, we determined the researcher had first installed a malicious application and subsequently, accepted a prompt by Keeper to force the association of the malicious application to a Keeper password record.
Keeper has safeguards in place to protect users against automatically filling credentials into an untrusted application or a site that was not explicitly authorized by the user. On the Android platform, Keeper prompts the user when attempting to autofill credentials into an Android application or website. The user is asked to confirm the association of the application to the Keeper password record prior to filling any information. On June 29, we informed the researcher of this information and also recommended that he submit his report to Google since it is specifically related to the Android platform.
Generally, a malicious Android application would first need to be submitted to Google Play Store, reviewed by Google and subsequently, approved for publication to the Google Play Store. The user would then need to install the malicious application from Google Play and transact with the application. Alternatively, the user would need to override important security settings on their device in order to sideload a malicious application.
Keeper always recommends that individuals be cautious and vigilant about the applications they install and should only install published Android applications from trusted app stores such as the Google Play Store.
A screenshot of Keeper's protection in place is displayed below. A user is prompted to trust the application from retrieving and filling the specified credentials. This security feature has been in place for several years and no additional updates are required.
If you have any questions, please email us at security@keepersecurity.com.
HTTP/2 protocol denial of service
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
If you have any questions, please email us at security@keepersecurity.com.
and
PowerShell and
This simple Android app demonstration can be viewed on Keeper's public Github repo:
To learn more about how to keep your smartphone safe, please visit:
Keeper Security's application servers are protected by AWS Shield which defends against DDoS attacks, and Keeper is not vulnerable to this attack. More info is posted on .
Heap buffer overflow in libvpx
https://nvd.nist.gov/vuln/detail/CVE-2023-5217
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Keeper Security may have been impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.25 and published Keeper Desktop version 16.10.9.
If you have any questions, please email us at security@keepersecurity.com.
Bitwarden vulnerability with biometric key storage
https://nvd.nist.gov/vuln/detail/CVE-2023-27706
Bitwarden Windows desktop application versions prior to v2023.4.0 store biometric keys in Windows Credential Manager, accessible to other local unprivileged processes.
Keeper is not impacted by this issue. To ensure that we were not impacted by a similar vulnerability, Keeper contracted a 3rd party penetration tester in July 2023 to validate our protection against this type of attack. The report PDF is posted below:
If you have any questions, please email us at security@keepersecurity.com.
Heap buffer overflow vulnerability in the WebP Codec
Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical).
If you have any questions, please email us at security@keepersecurity.com.
Response to CVE-2023-36266
A researcher filed a CVE (CVE-2023-36266) in regards to the scanning of local memory when using Keeper Desktop and browser extension software.
As with any software product, if an attacker controls the local computer, the attacker can perform any action the user or an application could perform. In the case of a password manager, if an attacker can read arbitrary memory, then an attacker can read decrypted contents of the password manager while the application is in use. This applies to any password management product. Security researchers understand that a fully compromised device scenario has severe implications for the user.
Keeper has multiple security mechanisms in-place to defend against compromised end-user devices. Keeper client software only decrypts the user's vault upon successful login, and only stores decrypted values during use in volatile memory. When a user is logged out or timed-out, decrypted values are removed from memory. In addition, the Keeper desktop application provides a setting in the "Security" screen which forces a full application restart upon auto-logout, to ensure that data is cleared upon locking. In the case of a web browser such as Chrome, Keeper requests the clearing of memory after logout, however the memory management of the underlying browser is outside of Keeper’s control and can sometimes take time for the memory management system to complete this operation.
With all end-user software, it's important to ensure that users reduce the risk of a compromised device by following security best practices, keeping all software up-to-date and installing adequate antivirus / malware protection software.
Keeper has stood by its commitment to protect your most valuable data for more than a decade, through our best-in-class Zero-Knowledge and Zero-Trust security model and transparent approach to sharing it with the public. For information regarding Keeper's security and encryption model, please visit:
If you have any questions, please email us at security@keepersecurity.com.
Solutions to common Keeper issues and questions based on platform
"Psychic Signatures" vulnerability in the Oracle Java SE, Oracle GraalVM
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries).
Oracle link:
Keeper Security is not impacted by this vulnerability. Keeper does not use Java runtimes that are affected, as reported by Oracle. Keeper also does not use the ECDSA implementation in the built-in Java library. Keeper uses BouncyCastle for ECDSA implementation, which is not impacted.
If you have any questions, please email us at security@keepersecurity.com.
Troubleshooting and support for desktop browser extensions and Autofill
If you are unable to login to the KeeperFill Safari extension, a reset of the extension may be required. To reset your KeeperFill Safari extension, follow the below steps:
Open Safari and select Safari > Settings
From the Keeper extension, select Settings
Click on "Clear All Storage"
Restart Safari
If you are having issues with Autofill, please make sure you check the below:
Make sure you only have ONE version of Keeper browser extension installed and active.
Don't have multiple password managers installed, such as LastPass and Keeper at the same time. This is known to cause conflicts and bugs when filling sites.
Make sure to turn off your browser's password manager.
Install any pending browser updates. Pending browser updates cause issues with browser plugins.
Ensure that "on all sites" is selected in your browser settings under Window > Extensions > Keeper Details screen under "Site access".
Send any site-specific Autofill issues to feedback@keepersecurity.com and we'll fix it.
Enterprise customers can disable KeeperFill on sites across the organization. Please be sure to add the site's website address to the KeeperFill enforcement policy for the role in which you reside.
We love hearing from customers. Send your feature requests to: feedback@keepersecurity.com.
General troubleshooting across all applications
Monitor the Keeper infrastructure system health here:
If you get this error, please click the "Full Sync" option from the vault along the bottom.
Typically, this means you need to update your SAML signing certificate. Follow the guide below for step by step instructions:
We've also submitted this latest GPG public key to the keyserver.ubuntu.com
keyserver.
Customers can pull down the latest key by running the below command and then retrying:
Some customers are unable to select Keeper from the Samsung provider list when activating KeeperFill.
If Keeper does not show up, please open your device settings and search for "Passwords" then select Keeper under "Passwords, passkeys and autofill".
If you are seeing syncing stuck on the screen, please check the following:
Update to the latest version of Keeper on the App Store
Instead of logging in with biometrics, try to login with your Master Password (clicking "Next")
After a successful login, visit the settings screen of Keeper and turn OFF/ON the Face ID or Touch ID setting.
We will add a feature soon to allow consumers to decide whether or not user verification is required. This will be added to Vault version 16.10.4.
For our business customers, we're planning a role enforcement feature that requires user verification (by setting userVerification response to "required"). Until then, the system will respond based on your device setup.
If you are unable to access Keeper's website or Vault from your device with a "403 error", your IP address is being blocked. Keeper automatically blocks IP Addresses that have a "low reputation score". This list of IPs is maintained by a dedicated threat research team at Amazon AWS, and as such we do not have visibility into exact reasons why an IP is placed on this list. To resolve the issue:
Your external IP address will be provided on the screen.
Business customers who need a range of IPs to be unblocked can provide a CIDR.
From the mobile apps, go to the Account screen > Sync > Sync Now. This performs a "full sync" of all the data and ensures that anything missed in the normal sync process is caught. The latest Web Vault and Desktop App also have a "Sync" feature along the bottom of the screen.
Browser extensions generally stop working properly if an update is pending or the browser is out of date, even by one version. Make sure to update your web browser to the latest version and then fully restart your web browser.
Clear cache on your web browser or open Incognito Mode to try and login. If this works, you should just reset your Keeper app by visiting the Web Vault on your respective data center:
By appending #reset on the end will force Keeper to clear local data. Refresh the page a few times and this should clear things out.
Ensure only ONE Keeper browser extension is installed. Having two installed causes many issues. Visit Window > Extensions and check your extensions. Don't use multiple password managers at the same time.
Ensure that "clear site data when you quit Chrome" is disabled. This can cause errors and vault decryption issues.
This is a very common issue with our users. Keeper's advanced security protection and encryption prevents inspection of traffic, otherwise known as "man-in-the-middle". This can sometimes conflict with antivirus, popup blockers and web filtering apps. Make sure to try turning OFF these 3rd party plugins or applications to see if they are causing any conflict with Keeper.
Many websites (including Keeper's browser tools) won't function correctly if you block cookies, block Javascript, block local storage or have any extreme browser privacy settings that prevent our product from running. Please try to set your browser to default settings and see if that resolves the issue you're experiencing.
If you are experiencing an issue where the Two-Factor (TOTP) codes are different between your mobile and desktop devices, this is usually caused by the time difference between your devices. Ensure that your device time and date is set to "Automatic". If the times are different by even a few seconds, this will cause different codes to appear on different devices.
If biometrics such as Face ID / Touch ID stops working, simply login to Keeper with your Master Password (or SSO), then visit the Settings screen and turn biometric login OFF and ON. This should resolve any biometric login issues.
Consumers: Keeper employees do not have access to your Master Password or Recovery Phrase, and we cannot reset it for you. If you have forgotten your Master Password, please try using our Account Recovery feature by visiting the "Need Help" > "Forgot Master Password" option on the Keeper login screen.
Without your Master Password or recovery phrase, your records cannot be decrypted. If you don't have recovery setup for the Keeper account at all, unfortunately account recovery will not be possible.
If you have tried all possible Master Password and Account Recovery options and are still unable to login to Keeper, we can delete your account so that you can start over. Please contact the support team for assistance.
A very common issue when a user is unable to login, is that people could have multiple Keeper accounts (perhaps from different email addresses), or maybe a typo in your email address. If you think that's a possibility, please contact our support team and we will assist you.
Business Customers: If you have tried all possible Master Password options and are still unable to login to Keeper, you will need to contact one of your Keeper Administrators within your company to have them either transfer your account to a new vault so that you do not lose any data. Or, request your Admin to delete your profile and re-invite you which will allow you to start over with a new master password. If you are using SSO for login, they can assist you in recovering your account with the SSO provider.
If you would like to change your existing Master Password from the Web Vault & Desktop App, from the account dropdown menu (your email ) select Settings and next to "Master Password" click Reset Now. You will then be prompted to enter your current Master Password Password and create and confirm a new Master Password.
To change your Master Password on iOS and Android devices, within your vault, navigate to the Settings menu, scroll down and tap Reset Master Password (on iOS) or RESET NOW (on Android). You will then be prompted to enter your Current Master Password Password and create and confirm a new Master Password.
Consumers: If you changed phones or do not have access to your two-factor authentication device, please contact Keeper support and we will assist you in resetting your Two-Factor Authentication settings. For individual and family users, please open a consumer support ticket and we will assist you.
Business Customers: Please contact the Keeper Administrator at your company. Your Keeper Admin can disable your 2FA. For Keeper Administrators, please open a business support ticket and we will assist you.
Upon initial vault login, new users will be prompted to set up Account Recovery. Click Generate Recovery Phrase to begin.
Once your recovery phrase has been generated, be sure to store it in a safe place. For added convenience, you will be given the option to copy or download it. Check the box to acknowledge you have stored it in a safe place and click Set Recovery Phrase to complete the setup.
Please note that if you forget your master password and lose your recovery phrase, you will not be able to login to your vault and Keeper Support will be unable to help you regain access.
After their initial login, users are asked if they would like to set up Account Recovery using an account recovery phrase. This is especially important if you forget your Master Password during the account recovery process which is based upon an account recovery phrase, backup verification code (sent via email) and Two-Factor Authentication code (if enabled).
In addition to enabling an account recovery phrase, we recommend turning on Keeper's Two-Factor Authentication feature from your account's "Settings" menu.
Users who have signed into Keeper after August 2015, will automatically have Account Recovery enabled. To initiate Account Recovery, simply open Keeper through the Web Vault, iOS, Android or Desktop app and from the login screen, click/tap Forgot Password. Keeper will then walk you through a few steps to change your Master Password and recover your account. These steps will include a series of prompts requesting the following actions:
Enter your email address to initiate the account recovery process
Enter a backup verification code
Enter your account recovery phrase
Enter your Two-Factor Verification code (if enabled)
Enter a new Master Password
Keeper Security may be impacted by this vulnerability in the Desktop App since we use the Electron framework. As a precaution, we immediately updated to Electron framework version to v22.3.24 and published .
We have disputed this CVE. Keeper performs quarterly pen testing with 3rd party experts including , and independent security researchers against all of our products and systems. Keeper has also partnered with to manage its vulnerability disclosure and bug bounty programs. As part of our testing, we explicitly test the storage of secrets in memory while our applications are in use, and when logged out. Keeper removes all decrypted vault data from memory upon logout and provides settings to also wipe memory and restart the app upon vault auto-lock. This functionality has been verified by our pen testers and the test results are available for customer review.
All KeeperFill browser extensions are available at the .
KeeperFill user guides are .
We used to have 2 versions of the Firefox extension in the Add-on store. We removed one of them and disabled the use of old versions. Please ensure that you are using only one extension, and ensure it's the latest one from our .
A new Safari extension is now available through the Mac App store. Old versions of the Safari extension have been disabled. Please ensure that you are running the latest version from our . Make sure to read the latest for step by step instructions.
You can sometimes self-fix an Autofill issue by visiting .
If you still need help, describes how to capture information that our support team needs to help diagnose the problem.
Admins can disable Keeper-fill on specific websites. This feature supports wildcard characters for matching domain names or URLs. One use case might be to disable Keeper-fill for internal applications that have a lot of form fields. about this policy.
See our general Browser Extension
If you're having Autofill issues, see the
If you are a website developer looking to integrate, see our page
Join our to post questions, feedback or receive new beta versions.
All Keeper end-user and Admin documentation can be found at the .
See our FAQ list from:
A backend security update was recently made which prevents custom email invitations from being sent to users if the domain has not been reserved by the customer. To learn about Domain Reservation please .
Keeper's signing key for the Ubuntu Linux version of Keeper Desktop has expired, so we extended the expiration and pushed up a new GPG public key. This key is hosted at the below location:
We're constantly improving Keeper's security to keep our users safe. Starting with Backend API Version , if you're using a FIDO2 Yubikey device for two-factor authentication (2FA), you might need to enter a PIN associated with your device when you log into Keeper. This is a FIDO2 feature called "user verification" that our system uses to check if the PIN is set up on your device.
If you'd rather not use a PIN with your FIDO2 Yubikey device, you can remove it using the . However, keep in mind that if you reset your Yubikey device, you'll have to re-register your key with Keeper and any other application that you use with your key.
Open the below URL on a computer which is generating this error:
Please send the IP to the Keeper support team support team via our support page at and we'll check into unblocking it from our WAF.
Many issues can be resolved by updating your Keeper app. Install the latest Keeper version from your App Store or the .
(US)
(EU)
(AU)
(CA)
(JP)
(GOV)
Keeper Web Vault, Desktop App and Browser Extensions have been updated with the "Stay Logged In" feature for all customers. To activate this feature open your browser extension > settings > Stay Logged In and turn the setting "ON". If it's already on, you may want to turn the setting OFF and ON. Then, logout and login to the browser extension. Learn more about "Stay Logged In" here:
The Keeper Web Vault and Keeper Desktop App share a common codebase. Desktop app is deployed as an Electron application to Windows, Mac and Linux platforms.
Troubleshooting and support for the Web Vault and Keeper Desktop App
All Keeper Desktop apps are available at the Keeper download page.
Web Vault and Desktop App user guides are located here.
If you receive an "Unexpected Error" or "Unable to connect" when performing an import using the Keeper Import tool, this is typically due to a conflict with installed Antivirus or Proxy software. If this happens for you, please try importing by installing the Keeper Desktop application instead.
If you are an Enterprise Admin and you have control over the end-user firewall settings, please make sure that the user's desktop applications can communicate with Keeper Security's endpoints (e.g. keepersecurity.com
, keepersecurity.eu
, keepersecurity.ca
, keepersecurity.jp
, keepersecurity.com.au
or govcloud.keepersecurity.us
depending on the region).
If you are experiencing issues with logging in, you may need to simply clear the Keeper cache on your browser. Here's the steps:
Chrome:
Open the Web Vault
Click on "View" > "Developer" > "Developer Tools"
Click on the "Application" tab > "Clear Storage" > then click on “clear site data”
Edge:
Clear Browsing data (Browsing history, Download History, Cookies and other Site Data, Cached Images and Files, Hosted App Data).
Firefox:
On Privacy & Security page > Clear Data, (Cookies and Site data, Cached Web Content)
Safari:
Go to Preferences > Advanced > select checkbox "Show Develop menu in menu bar"
Then select "Develop" > Empty Caches
Select "Safari" menu then "Clear History" and select All Time
If you receive this error when updating or installing the Desktop App on Windows, follow the below instructions.
1. Browse to "C:\Windows\SoftwareDistribution\Download" and delete the contents of the folder.
2. Press Windows key + X > Click Command Prompt (Admin) then type "wuauclt.exe /updatenow". Hit <enter>.
3. Open Control Panel > Windows Update and Windows 10 should begin downloading..
Press Windows key + X
Click Command Prompt (Admin)
Type in at the prompt OR Copy and Paste these one at a time : (Hit enter after each)
Dism /Online /Cleanup-Image /CheckHealth
Dism /Online /Cleanup-Image /ScanHealth
Dism /Online /Cleanup-Image /RestoreHealth
also, run the Windows update Troubleshooter and check if it helps:
Press “Windows + X” and select Control panel.
In the search box, type troubleshooter, and then click Troubleshooting.
Under System and Security, click Fix problems with Windows Updates.
The Mac Store version of the Keeper application does not support iCloud Keychain password import due to Apple's review process. However, the solution is to install Keeper Desktop directly from our download page.
We love hearing from customers. Send your feature requests to: feedback@keepersecurity.com.
Join our Beta Slack Channel to post questions, feedback or receive new beta versions.
Troubleshooting and support for the Keeper Android App
Keeper for Android is available at the Keeper download page.
Android user guides are located here with additional info about Autofill.
If you are receiving an error on your mobile app, please make sure to update to the latest version. After you update, we recommend performing a Full Sync by clicking on Sync > Sync Now. This tends to resolve any searching or record-related issues.
If adding a password on your desktop doesn't automatically sync down your Android device, ensure that push notifications are enabled.
Android apps use push notifications for functionality such as:
Realtime sync
Device approvals
Sharing notifications
Please ensure that push notifications are enabled on your device. Also, "Do Not Disturb" mode will prevent certain notifications from appearing.
Having issues on iOS or Android? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.
Before resetting your mobile app, make sure you can first access Keeper on the Web Vault or Desktop App and ensure that all of your data is appearing.
Go to your device Settings icon, and then tap on the Applications menu. Scroll down until you see the Keeper icon and tap on it. Click on the Clear Data button, and then click OK. The next time you load Keeper, it will be reset to its original settings. Another way is to press-and-hold on the Keeper icon, then open the application info and clear the data.
Re-install Keeper from Google Play on your device
Launch Keeper and Login to your account. You will be asked to approve the device during the login process.
We love hearing from Android customers. Send your feature requests to: feedback@keepersecurity.com.
Join our Beta Slack Channel to post questions, feedback or receive new beta versions.
Troubleshooting and support for Keeper Enterprise
The full Enterprise guide is located here. Part of the guide contains information on deploying to end-users.
Visit our checkout page: https://keepersecurity.com/checkout
The Admin Console user report currently contains empty login dates for accounts larger than 1,000 end-users. We recommend using Keeper Commander to generate a user status report using the user-report command. For example:
Typically, this means you need to update your SAML signing certificate. Follow the guide below for step by step instructions:
https://docs.keeper.io/en/v/sso-connect-cloud/certificate-renewal
Ensure that you have assigned users or groups to the correct SAML application in your IdP
When you invite a user from the identity provider or assign a user into a group that has been provisioned, the IdP will send the request to Keeper to either invite a user to join, or to add a user to a team, or to create a team.
If the user does not exist yet in Keeper, they will receive an invite to sign up (or they can use just-in-time provisioning)
After the user has created their Keeper account, the user will not yet be assigned into a Keeper team until one of a few things happen: (a) Admin logs into the Admin Console > Click on "Full Sync" from the Admin screen (b) A user from the relevant team logs into the Web Vault or Desktop App (c) Admin runs team-approve from Keeper Commander The reason that teams and users can't be created instantly via SCIM, is due to the encryption model and the need to share a private key between users. Sharing an encryption key (e.g. Team Key) can only be performed by a user who is logged in, and has access to the necessary private keys.
Note: The next version of the Keeper Automator service (v3.0) will support the dynamic approvals of teams and team-user assignments. Read more about the Keeper Automator service.
In Keeper, a team that is provisioned must generate the necessary public/private encryption key pair for that team. Similarly, when a user is assigned to a team, the team private key is encrypted with the public key of the user. This way, a user who is assigned team folders in the Keeper vault is able to decrypt the necessary folder keys and record keys. Since Keeper is a zero knowledge platform, this transaction must occur from one of the authenticated client device applications, such as the Admin Console, Vault, Commander CLI or Automator tools.
When a team or a team-user assignment is provisioned through SCIM, the team creation and the user team assignment goes into a "pending queue". This queue is then processed by the authenticated client side application that either creates the necessary team keys and shares the private keys with the intended users.
Currently, team creation and team-user assignment occurs when:
The Admin logs in to the Keeper Admin Console UI
The Commander CLI "team-approve" command is run
The Keeper Automator service is deployed (version 3.2+)
If you need to quickly clear out your pending Team and Team-User assignments, please run the following steps on a periodic basis:
Install the Keeper Commander CLI
Login to Keeper Commander using keeper shell
Run the following commands:
For security reasons, Keeper will prevent Enterprise users outside of an SSO node from logging in with a federated identity provider. If you have users unable to login with SSO, please ensure that the user is provisioned to the node within the Keeper Admin Console to the SSO-enabled node. To move a user into an SSO node, edit the user and select the node from the drop-down.
Keeper's email system will automatically suppress delivery to an email that has bounced. This typically occurs if you set up someone's Keeper account before their email inbox exists. If you are in this situation with a particular user, please contact the Keeper B2B support team and we'll remove the email from our suppression list.
If your user's email has changed in your identity provider, you can simply add an alias to the user's identity in Keeper. This can be accomplished using the enterprise-user command. For example:
This command will only allow aliases to be created with reserved domains. To learn more about Keeper Commander, visit the documentation.
If your company is migrating users to a new email domain, Keeper supports enterprise-wide domain aliases to make the transition seamless. Open a support ticket to request a domain alias.
If you have an SSO user being asked to enter a Master Password:
Ensure that the user has been provisioned to an SSO-enabled node
Ensure that the user is logging in from the correct data center (US, EU, AU, JP, CA, GOV)
Device Approvals are a required component of the SSO Connect Cloud platform. Approvals can be performed by users, admins, or automatically using the Keeper Automator service.
Users can approve their additional devices by using a previously approved device. For example, if you are logged into your web vault on your computer already, and logging into your phone app for the first time, you will get a device approval prompt on your web vault with the mobile device's information which you can approve or deny.
Keeper SSO Connect Cloud™ provides Zero-Knowledge encryption while retaining a seamless login experience with any SAML 2.0 identity provider.
When a user attempts to login on a device that has never been used prior, an Elliptic Curve private/public key pair is generated on the new device. After the user authenticates successfully from their identity provider, a key exchange must take place in order for the user to decrypt the vault on their new device. We call this "Device Approval".
Using Guest, Private or Incognito mode browser modes or clearing the browsers cache will identify itself to keeper as a new device each time it is launched, and therefore will require a new device approval.
To preserve Zero Knowledge and ensure that Keeper's servers do not have access to any encryption keys, we developed a Push-based approval system that can be performed by the user or the designated Administrator. Keeper also allows customers to host a service which performs the device approvals and key exchange automatically, without any user interaction.
When logging into a new or unrecognized device, the user has two options:
Keeper Push (using their own devices)
Admin Approval (request administrator approval)
Or, you can skip this step completely by deploying the Keeper Automator service.
Keeper Automator can be deployed many ways, depending on your requirements. The least expensive method of using Automator would be using a micro instance of a Linux VM using the Docker Compose method. If you would like to use only cloud services, we recommend the AWS Container Service or Azure App Gateway method.
If logging into a new device takes 20-30 seconds to complete, this could be caused by your Keeper Automator service being misconfigured or inaccessible by the Keeper servers. Please disable the Keeper Automator in your environment using the "automator disable" command.
After an unexpected reboot of the container instance in Azure the container can sometimes come back up with a new IP address (e.g. x.x.0.5 even when the App Gateway had originally been provisioned with an IP of x.x.0.4 in the backend pool). Updating the IP of the container in the backend pool resolves this issue.
In the Azure cloud shell, retrieve the current IP:
az container show --name keeperautomatorcontainer --resource-group keeper_automator_rg --query ipAddress.ip --output tsv
In Azure portal select Resource groups > $your_resource_group > your Application Gateway > Backend pools > change Target IP to the new one from above.
Keeper's SSO Certificate expires annually in August timeframe. The new cert is available by logging into the Admin Console. If you need to update the Keeper SP Certificate, see the step by step instructions here.
Customers running SSO Connect On-Prem must renew SSL certificates on an annual basis. The date depends on when your SSL certificate is expiring. If you are receiving an SSL certificate error, please renew your cert by following the instructions here.
Please see the Keeper Commander troubleshooting page.
Please see the Secrets Manager troubleshooting page.
Please see the KCM troubleshooting page.
If you need help, please open a support ticket in our ServiceNow system.
If you need a phone call or Zoom call, just request this from the team and we will schedule it during business hours. Please be patient as we coordinate the call.
If you're a business customer having an emergency and need urgent support, make sure to use our ServiceNow support portal. On the support form, select the option "This is an emergency, outage, or other time-sensitive issue which requires immediate assistance".
We love hearing from Enterprise customers. Send your feature requests to: feedback@keepersecurity.com.
Join our Beta Slack Channel to post questions, feedback or receive new beta versions.
Early access Preview (pre-release) Keeper Vault and Desktop app
When a major release is planned, Keeper publishes a Preview version of the Vault and Desktop app, documented below. The pre-release version is typically published 1 week before public release.
If you encounter any issues with this version, please email feedback@keepersecurity.com.
US_GOV: (No US Gov preview available for Web Vault)
The Desktop App preview does not auto-update. On Windows computers, a new version of the pre-release version requires a full uninstall and re-install of Keeper. This does not affect stored data.
Troubleshooting and support for the Keeper iOS App
Keeper for iOS is available at the Keeper download page.
iOS user guides are located here with additional info about Autofill.
If you are seeing syncing stuck on the screen, please check the following:
Update to the latest version of Keeper on the App Store
Instead of logging in with biometrics, try to login with your Master Password (clicking "Next")
After a successful login, visit the settings screen of Keeper and turn OFF/ON the Face ID or Touch ID setting.
If adding a password on your desktop doesn't automatically sync down your mobile device, ensure that push notifications are enabled.
iOS and Android apps use push notifications for functionality such as:
Realtime sync
Device approvals
Sharing notifications
Please ensure that push notifications are enabled on your device. Also, "Do Not Disturb" mode will prevent certain notifications from appearing. Device approvals will not be received if you have iOS in Do Not Disturb mode.
Having issues on iOS? You may need to simply clear the cache on your device and reset the app settings. But before you do that, please make sure your data is fully available on the Keeper Web Vault or Desktop App.
Before resetting your mobile app, make sure you can first access Keeper on the Web Vault or Desktop App and ensure that all of your data is appearing.
On the front door of the Keeper app, tap on "Need Help?" then tap Reset Keeper.
Launch Keeper and Login to your account.
You will be asked to approve the device during the login process.
We love hearing from iOS customers. Send your feature requests to: feedback@keepersecurity.com.
Join our Beta Slack Channel to post questions, feedback or receive new beta versions.
Released August 06, 2024
Enhancements:
VAUL-6715: Improved KeeperFill Installation Prompt: The installation prompt for KeeperFill has been enhanced to offer a better user experience.
VAUL-6716, VAUL-6789: Enhanced Import Functionality: When importing data from Keepass KDBX files, TOTP fields will now be correctly recognized and imported as Keeper TOTP fields, ensuring better accuracy and usability.
VAUL-6748: Password Complexity and Generation: Password complexity rules can now be applied independently without generating a new password, offering more flexibility in managing your passwords.
VAUL-6792: Better Folder Selection: We've improved the folder location selection in the new shared folder modal for a more intuitive experience.
VAUL-4959: Updated Referral Program: Our referral program has been enhanced with updated incentives to encourage more users to invite friends.
VAUL-6807: Password Policy Enforcement: The minimum password length is now set to 8 characters, with a maximum of 99 characters. Client applications will enforce this minimum length but allow users to increase it through their settings.
VAUL-6798: Feature Promotion: New features such as RBI and KSM are now more visible to users for better awareness.
Bug Fixes:
VAUL-6788: UID Generation: We've updated the UID generation logic to prevent creating UIDs that start with a dash.
VAUL-6746: Firefox Compatibility: Fixed an error occurring in Firefox related to unsupported table versions.
VAUL-6805: Privacy Screen: Resolved an issue where the privacy screen disabled URL edits for non-enforced URLs in shared records.
VAUL-6784: Sharing Screen: Corrected the sorting order of items in the sharing screen for better usability.
VAUL-6794: Account Registration: Addressed an issue where credentials were not properly handled when switching between login and account registration screens.
VAUL-6819: Banner Display: Updated the banner display and support tool to match rounding requirements for better accuracy (e.g. number of days left in trial).
VAUL-6786: Shared Folder Management: Fixed an issue where deleting a V2 record from a shared folder caused the folder to appear incorrectly. The record will now appear correctly.
VAUL-6780: GRE Import Error Handling: Improved error handling during GRE import to ensure proper messaging when users are restricted from creating folders.
VAUL-6808: App Stability: Fixed an issue where the app could crash if shared folder users were undefined, ensuring better stability.
Released on February 13, 2025
KeeperPAM is now available for all customers. Keeper Vault 17.1 and newer is required to access the new privileged access management features.
For more information on KeeperPAM, visit the following:
Currently only Supported on Keeper Commander
Browser tab now shows username: "Keeper® Vault - user@company.com"
Released May 2, 2024
Passphrases can now be generated and stored in the vault. The Password Generator includes advanced character/symbol policy preferences
Launched Time-Limited Access, which allows temporary sharing of records and folders with other Keeper users.
Launched Self-Destructing Records, which allows sharing of records with other Keeper users for a time period after which the record is deleted for both parties.
Recently deleted shared records from within shared folders can now be recovered from the "Deleted Items" section of the Web Vault and Desktop app.
In the "Deleted Items" section of the vault, you'll see a new tab called "Shared Folder Contents". This tab contains records that were deleted by a user of the shared folder with "Can manage records" permission. Records which appear in this tab are able to be restored from any user who currently has access to the shared folder. This feature was created to make the restore process accessible from any shared folder participant when a record has been removed by any team member.
For security reasons, if a change was made to the record after it was removed from the shared folder, it cannot be restored and the original owner must re-share it.
VAUL-5271: Fixed an issue that prevented record type changes with some records
VAUL-5628: Fixed an issue that prevented some date fields from being searchable
VAUL-5842: Fixed various issues with consistently updating fields on language changes
VAUL-6163: Fixed an issue that allowed entry of more than the five allowed emergency access contacts
VAUL-6168: Fixed a display issue when certain record types are disabled
VAUL-6198: Fixed an issue that prevented error message from being shown when attempting to invite a user with an invalid email address
VAUL-6242: Fixed an issue that prevented hover text from being displayed on truncated records
VAUL-6301: Fixed an issue where some countries would not sort properly in records with a Country field
VAUL-6340: Implemented hashing algorithm for account mapping within the vault
VAUL-6345: Implemented proper handling of international phone numbers in records
VAUL-6353: Fixed a UI issue where a password slider artifact would appear over search results
VAUL-6365, VAUL-6373, VAUL-6392: More descriptive errors are now displayed when attempting to create a record, folder or shared folder using an account that does not have appropriate rights
VAUL-6370: Fixed an issue syncing teams to the vault on initial sync
VAUL-6383: Fixed an issue that prevented a user from creating a shared folder under certain Granular Sharing Enforcement policies
VAUL-6393: Granular Sharing Enforcements now apply even in the vault is in offline mode
VAUL-6397: Fixed an issue with syncing records after ownership transfer
VAUL-6427: Fixed an issue importing from Proton Pass on Windows
VAUL-6439: Fixed an issue that prevented the owner of a shared record from deleting records in some scenarios
Released on February 6, 2025
KDE-1400: RSA to EC Security Updates
VAUL-6152: RSA to EC Security Updates
VAUL-7031: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid. Backup codes are now copied without spaces.
VAUL-7029: The "Add Device" and "Provision Gateway" options are now only visible in View mode, not Edit mode.
KDE-1415: We've fixed an issue where incorrect OS keys were displayed in shortcut definitions.
KDE-1245: All alert models have been updated to follow the new design guidelines.
KDE-1240: We've fixed an issue where an incorrect error message was displayed when moving subfolders between shared folders.
KDE-1547: We've fixed an issue where copied backup codes contained spaces, causing them to be invalid.
VAUL-6899: Updated linked personal accounts to indicate the family admin, helping users identify the correct account to log into for managing members.
VAUL-6590: We have allowed offline login with all 2FA durations as a separate setting in the app.
VAUL-7061: We removed legacy bundle support to improve build efficiency.
VAUL-7064: We updated the grid view icon.
KDE-1529: We updated the Windows desktop build to support Visual Studio 2022 and target it in the GitHub Actions workflow.
KDE-1532: Upgrade Electron framework to version 32.1.0 31.7.2 33.2.0.
KDE-1488: We've enabled context isolation security for the desktop vault/tray renderers.
KDE-1546: We've fixed an issue preventing Windows desktop builds from completing in GitHub Actions
KDE-1548: We've added a new setting to allow offline logins with all 2FA durations.
KDE-1550: We've fixed an issue with upload job caching by adding the Cache-Control: no-cache header.
KDE-1558: We've updated the Windows Credential Locker, Windows Hello, and App Model features.
KDE-1536: We fixed a recent Keeper outage caused by NGINX overload.
VAUL-6437: Fixed an issue where custom templates with numeric names (without periods) appeared at the top of the list instead of under the "Custom Template" section.
VAUL-6275: Fixed an issue ensuring that Record Type Sorting aligns with the modified list.
VAUL-6889: The user gets a clear error message when the share request fails.
VAUL-6908: Prevented users restricted from sharing or receiving from creating shared folders.
VAUL-5874: Removed the period from the title on the empty Vault Splash Page.
VAUL-5958, VAUL-5959: Implemented functionality improvements for My Vault, Record view, and Security Audit page, addressing customer expectations for dark mode, though some visual inconsistencies and color contrast requirements
VAUL-6760: Fixed an issue where the Country field displayed incorrect or empty values when switching between Address records.
VAUL-5702: Changing the default field type now updates the label accordingly.
VAUL-6438: Standard records now appear in the top section and custom record types in the bottom section, each sorted independently with numerical first, followed by alphabetical.
VAUL-6436: Resolved an issue where the letter 'g' was cut off in custom templates.
VAUL-6758: Fixed an issue where the default password complexity wasn't saved during the initial rotation setup.
VAUL-6972: Fixed an issue where restored records did not update security scores until the user logged out and back in.
VAUL-5949: Fixed an issue where the Save button in Secrets Manager remained disabled after deleting a Gateway.
VAUL-5862: Fixed an issue preventing users from deleting a Gateway in Secrets Manager if multiple Gateways existed.
VAUL-5847: Fixed an issue where the sort header within the Secrets Manager did not reflect the selected sort option.
VAUL-6635: Fixed an issue where the tooltip did not describe the cron format, adding an explanation and examples for proper usage.
VAUL-6988: Fixed the update with the Login Buttons
VAUL-6983: Fixed an issue that restricted Unlimited, FP, and Trial users from accessing offline mode via the login page.
VAUL-6941: Fixed an issue where unreferenced records weren't deleted during sync down.
VAUL-6911: Fixed an issue where removing a record link deleted the linked record despite other existing references.
VAUL-6961: Resolved an issue where removing direct access to an owned record unintentionally removed ownership.
VAUL-6990: We've resolved an issue where uploading a file larger than 100MB would block the upload of other selected files.
VAUL-6977: We fixed the 'Internal Error' issue during offline logins.
VAUL-6995: We fixed the issues where discard changes are generated twice.
VAUL-6998: We fixed an issue where gateways were displayed randomly. They are now sorted numerically and alphabetically.
VAUL-6947: We've resolved an issue where records were unintentionally removed from shared folders during the sync-down process.
VAUL-7012: We fixed an issue with incorrect toast messages when trying to create duplicates without permission.
VAUL-6881: We've fixed an issue where breach watch results were only sometimes being returned when expected.
VAUL-6534: We've resolved an issue causing "bad request" errors during security data updates specifically for the vault client.
VAUL-6962: We've resolved an issue where records created in the BE weren't appearing in the BW.
VAUL-7019: We have fixed the issue with the secrets manager not showing up in SF/Records
VAUL-6750: Vault now uses the encrypted session token returned by accept_enterprise_invite instead of the previous session token.
VAUL-7025: We've fixed an issue where records with the password "hasOwnProperty" were causing various client crashes.
VAUL-7018: We fixed an issue where selecting "all" in an empty shared folder incorrectly showed "1 selected." Now, it correctly shows "0 selected" and unselecting the box removes the message.
VAUL-7036: We've fixed an issue where the Grid View Record Context Menu button was incorrectly positioned when focused.
VAUL-7039: We fixed an issue where the file_attachment_uploaded audit event was incorrectly triggered for file removals.
VAUL-7045: We've fixed an issue where vertical dividers were missing from the Security Audit.
VAUL-7053: We've fixed an issue where the UI didn't display throttle messages when entering incorrect passwords multiple times in offline mode.
VAUL-7059: We've fixed an issue where the cursor focus was incorrect after entering a password in the MP entry modal.
VAUL-7060: We've fixed an issue where the Offline Duration Setting required a browser refresh to take effect.
VAUL-7050: We've fixed an issue preventing MSPs from logging in offline.
VAUL-7058: We've fixed an issue where Free Trial users without a BW subscription encountered a "bad request" error when scanning records with strong passwords.
VAUL-7057: We've fixed an issue where the last scan date was incorrectly displayed as "N/A" in BW.
VAUL-7065: We've fixed an issue causing incorrect font display on the web vault.
VAUL-7068: We resolved an issue where the "Work Offline" button was incorrectly displayed for users without offline access, even after clearing the browser cache or logging out
VAUL-7076: We've fixed an issue causing the error "No key for encryption of security data" in Vault.
VAUL-7074: Sharing invitations can now be sent without errors.
VAUL-7080: We've fixed an issue preventing update_security_data from working on ECC-only enterprises.
VAUL-7079: We've fixed an issue causing several missing key warnings.
KDE-1346: We've fixed an issue with misaligned edit icons for KFFA hotkeys.
KDE-1423: We've fixed an issue where the Topsite list wasn't narrowing correctly as users typed in the title field
KDE-1428: We've fixed an issue preventing users from moving owned records into shared folders.
KDE-1500: We've fixed an issue where incorrect notifications were displayed for oversized file uploads
KDE-1048: We've fixed an issue where the Region Selector was cut off at the bottom in KFFA.
KDE-1538: We've fixed an issue where resetting Keeper from the Help Menu didn't clear the desktop app cache
KDE-1539: We've fixed an issue with the localization of the access expiration banner.
KDE-1544: We've fixed an issue preventing password re-entry in KFFA.
KDE-1545: We've fixed an issue where the offline edit indicator persisted after reconnecting to the server and logging.
KDE-1540: We've fixed an issue preventing users from downloading large file attachments, which caused the app to stall
KDE-1549: We've fixed an issue preventing Direct Import from LastPass due to a JavaScript error.
KDE-1551: We've fixed an issue preventing the import of simple phone data from LastPass for non-address records.
KDE-1552: We've fixed an issue that prevented new Enterprise Admin accounts from using a fresh install of KDE.
KDE-1478: We've fixed an issue where the "Securely Upload to My Vault" option did not clear after a drag-and-drop operation.
KDE-1553: We updated the macOS build environment from macOS 12 to macOS 13 in the build-desktop-vault.yml workflow.
KDE-1556: We updated the download links for the desktop app to point to the new CloudFront distribution.
KDE-1559: Fixed QA download page: now shows versions and directs users to the latest build.
KDE-1565: We've fixed an issue preventing KSM device configurations from being generated.
Get started by setting up your KeeperPAM sandbox! Visit to begin.
- instantly and securely access assets within your target infrastructure
- Available with Keeper Desktop
The 16.11.0 release contains several new features, including , , and .
If you installed Keeper Desktop from the website, this version will not auto-update and you'll need to install it manually from the Keeper website. If you installed Keeper Desktop from the Apple or Microsoft app stores, it will update automatically.
Released on Sep 29, 2023
KDE-1425: CVE-2023-5217 Heap buffer overflow vulnerability in the libvpx library. Updated Electron framework.
Released September 20, 2024
VAUL-6966: Updated the vault login screen animations to stop after 30 seconds
VAUL-6606: Updated the remaining router API endpoints to enhance performance and security.
VAUL-6785: Adjusted the location of the visibility "eyeball" icon for long passwords, ensuring consistent UI across all record views.
VAUL-6821: Introduced a new dialog that users are required to accept when being invited to a managed enterprise. Letting users know the enterprise administrator has the ability to manage their vault in accordance with company policies.
VAUL-6866: Updated URL handling to restrict it to standard HTTP/HTTPS protocols, improving security and validation.
VAUL-6869: Updated the title and meta description of the settings page to enhance SEO and search engine visibility.
VAUL-5853: Addressed formatting inconsistencies within custom record types for Security Q&A fields.
VAUL-5898:Fixed an issue where using the search and location filter together resulted in invalid or unexpected search results.
VAUL-6051: Fixed an issue where the UI adjusted incorrectly after closing an error message generated by an invalid value in the native app filler.
VAUL-6247: Fixed a bug where the "Success" message was missing after successfully removing users from shared records.
VAUL-6312: Resolved a security issue where creating a duplicate record allowed shared users to access the full history, including previous sensitive information.
VAUL-6385: Updated privacy screen for Teams / Owners, ensuring compliance with privacy requirements.
VAUL-6403: Fixed an issue where users with role-based enforcements preventing record creation in shared folders were not receiving feedback when using "Create Duplicate" on a V2 General record.
VAUL-6424: Fixed visual artifacts in the left navigation bar that appeared as unexpected white pixels.
VAUL-6598: Fixed an issue where dropdown menus opened via the enter key couldn't be navigated using arrow or tab keys, improving screen reader accessibility.
VAUL-6599: Resolved an issue where users needed to press the arrow key twice to focus on both icons and text when navigating the "Create New" menu or filter dropdowns via the Enter key.
VAUL-6609: Addressed an issue where attachments in the detail pane of V3 shared records were not being displayed properly after edit or sync.
VAUL-6652: Resolved UI issue where the PAM script model was cut off, improving the user experience.
VAUL-6806: Fixed an issue where security data updates were not occurring as expected, improving data reliability.
VAUL-6827: Resolved an issue where extra white space appeared in custom fields, improving layout consistency.
VAUL-6839: Addressed issues related to missing or bad security data being propagated in certain scenarios.
VAUL-6865: Removed the deprecated asmcrypto.js dependency, improving app performance and security.
VAUL-6882: Fixed a password complexity error that occurred during save, when using the password rotation setting in certain scenarios.
VAUL-6912: Resolved overlapping text issues on Mac/Chrome browsers when displaying tabs.
VAUL-6964: Fixed an issue where the logout timer enforcement was not working as intended.
VAUL-6967: Applied updates to sync timeline, loading vault records and then updating BreachWatch & Security Audit scores.
Released June 17th, 2024
VAUL-6523: Added pin code generator to "Pin Code" custom field
VAUL-6595: Improved 508 compliance for "Record Types" default actions
Escape key closes "Record Types"
VAUL-6596: Enhanced 508 compliance for "More Filters" default actions
Escape key closes "More Filters"
VAUL-6597: Fixed issues with 508 compliance regarding possible actions. Dropdown lists out of focus are automatically closed
VAUL-6648: Updated support information that appears in the vault directing users to: https://www.keepersecurity.com/support.html
VAUL-6550: Implemented a modal warning for trials expiring within 24 hours
VAUL-6747: Removed offensive words from the word list
VAUL-6613: Updated strength indicator to prevent it from turning green erroneously
VAUL-6721: Fixed the default passphrase separator issue
VAUL-6719: Corrected domain conflict alerts to display the appropriate text
VAUL-6519: Fixed issue with Chrome displaying a break in the password generator
VAUL-6728: Prevented users from saving passwords with domain conflicts
VAUL-6729: Ensured that users with privacy screens cannot view PIN codes
VAUL-6732: Introduced new alerts for different domain conflicts
VAUL-6737: Added missing strings for various languages
VAUL-6741: Improved vault UI responsiveness when saving new passwords
VAUL-6736: Resolved issues with the PIN-CODE and PIN Generator not working
VAUL-6740: Added missing translation for 'Your password has been saved'
VAUL-6754: Implemented in-app popup for expired trial warnings
VAUL-6753: Fixed issue with the privacy screen feature
VAUL-6759: Fixed the issue preventing saving passphrases with domain conflicts
VAUL-6761: Resolved incorrect display of consumer/enterprise settings
VAUL-6770: Ensured default configuration is correctly applied when new fields are unchecked
VAUL-6776: Fixed GUI issues in the password complexity feature
VAUL-6723: Fixed issues with losing ownership of a record in a shared folder
VAUL-6693: Corrected tooltip hover text display issues in shared folders
VAUL-6653: Fixed time selection issues in the date picker configuration
VAUL-6726: Resolved a white screen crash issue
VAUL-6688: Resolved UI issues with the new shared folder modal
VAUL-6733: Addressed issues with configuration records not being viewable
VAUL-6731: Fixed time picker for 24-hour time format in One-Time Share
VAUL-6734: Fixed file upload issues
VAUL-6738: Corrected viewing link display issues in One-Time Share
Released on Jan 15, 2024
VAUL-6001: Security Key can be set up as the only 2FA method
VAUL-6097: Support for Security Key and PIN enforcement policies
VAUL-6129: Users can now control if FIDO2 WebAuthn user verification (PIN) is required
VAUL-6395: KeeperPAM Router/Gateway connection issue in GovCloud environment
Released on Nov 16, 2023
VAUL-6175: Added thousands of popular website logos to the Vault user interface.
The implementation of website logos preserves full zero knowledge encryption and privacy. The entire library of logo files are embedded within the vault application.
KDE-1403: Optional SSO login method through default web browser
If the new "Use Default Browser for SSO" option is enabled from the desktop application menu, the user will be routed to their default web browser on the device in order to login with their configured identity provider.
The primary reason for implementing this feature is to support SSO identity providers who support FIDO2 security keys or other authentication methods that are not technically supported from the Keeper Desktop embedded browser.
For Admins who would like to enforce this to all desktops, a new Enterprise Configuration item called UseDefaultBrowserSSO is available.
DR-265: Ability to specify time zone and hour of day for scheduled password rotations
VAUL-5620: Enhancements for Recently Deleted page
VAUL-5686: Security Audit screen now has a "Last Change" column
VAUL-6138: New "Advanced" settings menu which contains the following features:
Search overlay controls
Syncing delay to improve overall performance in high volume enterprise tenants
Showing numbering in the record list view
VAUL-6135: Currently only owner and share admin can update permissions, add/remove users, set/update expiration timers. User with can_share right should be also able to manage users up to its own level of privilege.
VAUL-5659: Multiple Record Selection is not working in Deleted Items
KDE-1421: Records created while in offline mode are not syncing properly when going online
KDE-1373: KeeperFill for Apps Window opens in wrong location when tray is not in visible dock
KDE-1395: Memory leak on Mac App from repeat launching through cmd+tab, clicking the dock item, etc. This leads to unintended event handlers being enabled.
VAUL-5675: User is not able to delete forever a Lost Record shared via Shared folder from Lost Access
VAUL-5737: Missing 'Add to My Vault' button for records details panel in Lost Access tab
VAUL-6009: If you have a role enforcement set to restrict all record types in the vault, the import option during onboarding is now hidden.
VAUL-6083: Filename not being added to title when drag-and-drop attachment in Chrome/Edge
VAUL-6204: Import from Thycotic / Delinea Secret Server missing notes field and SecretTemplates section
VAUL-6213: Record title auto-suggestion not working when there are multiple words
VAUL-6214: Date formatting error when Arabic language selected
KDE-1411: On Mac, keyboard layout is cached on first use. When filling a password with KeeperFill for Apps on Mac, a map of key codes to character mappings is generated and cached. This cache is not released when the keyboard layout changed with the app running, resulting in incorrect key codes being sent for some characters.
KDE-1422: The "Create Record" hot key is turned on when the app is initially not in focus, preventing that hotkey from being used by other apps.
KDE-1385: KeeperFill for Apps is not able to detect secure fields when a record uses the "native app filler" field type.
KDE-1426: After importing files, KeeperFill for Apps doesn’t show the records. This leads to assertion failures with BreachWatch data which require record keys to decrypt the data.
VAUL-6170: Security improvements using CryptoKey storage on Firefox browsers for device keys
VAUL-6179: Convert ECIES-encrypted Record Keys to Data Key-encrypted Record Keys upon login.
KDE-1406: New desktop app installs will now store device private keys in the Apple Keychain or Windows Credential Locker instead of Chrome CryptoKey local storage, for improved security for native app installation. Existing keys will not be transferred until a reset takes place.
KDE-1412: Upgraded Electron platform to v26.2.4. This was actually released to production already in version 16.10.9 on a standalone basis.
KDE-1417: When filling into a remote desktop session using mstsc.exe, incorrect characters are used with a different keyboard layout than the host machine.
VAUL-6219: Improved the automatic team-user approvals upon logging in. This new method handles a large number of pending users.
VAUL-6200: When viewing a deleted record, file attachments cannot be downloaded until the record is restored.
DR-348: Hide or gray out "Rotate now" button on modifying rotation settings
VAUL-5926: Shared Folder and Direct Share screens will only list those Share Admins who are explicitly shared to the object, to reduce confusion.
VAUL-5738: Allow free trial users to view record history
VAUL-6128: Show long folder names on-hover
KDE-1399: Return focus to previous app/window when KeeperFill for Apps is closed
508 Compliance: Over 20 tickets related to 508 compliance / ergonomics improvements
VAUL-5875: Create Duplicate UI changes to support various use cases:
If privacy screen is enabled, do not allow duplication
If a user duplicates a record that has linked records such as address or payment records, allow duplication of the record, disallow duplication of linked records, and present a notification: “The record you are duplicating contains links to other records. The linked records will not duplicated.”
If a user duplicates a record that has attachments, allow duplication of the record, disallow duplication of the attachment, and present a notification: “The record you are duplicating contains attachments. Attachments will not be duplicated. In order to duplicate attachments, download the attachment from the original record and re-upload to the newly created record.”
KDE-1414: New font type "Outfit" to replace "Overpass". This is Keeper's new font that is being slow-rolled across all platforms and interfaces.
Migrating from LastPass using Okta SSO saying "Import Error"
In the Okta Admin portal under Applications, locate your "LastPass Okta Login" application. Under the "Sign-in redirect URIs" section, add the following URI: http://localhost/
then click "Save".
Released on May 2, 2023
VAUL-5652: Recovery Phrase. We have upgraded our account recovery process with a new and more secure 24-word “recovery phrase” feature. Read more on the .
KDE-1418: Heap buffer overflow vulnerability in the WebP Codec. Updated Electron framework.
Released on Nov 29, 2022
VAUL-5551: Extension not auto-logged in if installed while Web Vault currently logged in
VAUL-5547: Right-click menu is showing different options when in different areas of the vault
VAUL-5529: Shared Folder "Add User" search/suggest list includes people already in the folder
VAUL-5563: Vault crashes when a user with "Prevent sharing records with file attachments" enforcement deletes a record.
VAUL-5565, VAUL-5327, VAUL-5458, VAUL-5325, VAUL-5404: 508 Compliance items
VAUL-4772: Removed all legacy jquery/jquieryui references
VAUL-5559: Roboform import issues
VAUL-5090: Auto-select custom field title when clicking Edit
KDE-1308: Update Electron to latest v20 patch version
KDE-1314: Remove legacy Windows installers
Releases notes older than last 10 releases
Older release note content is still available, but anything older than the last 10 updates is placed here.
Released on August 10, 2023
VAUL-5688: Support for Passkey record fields. Managing passkeys requires browser extension 16.6.0 which was released on Aug 7, 2023. Learn more about passkeys here.
VAUL-5977: Support for RESTRICT_IMPORT_SHARED_FOLDERS enforcement policy which will prevent users from importing shared folders from LastPass. See the Admin Console role enforcement policies to enable this setting.
VAUL-5502: Support for new paginated sync system on the backend API
VAUL-5999: Support for Swedish and Finnish languages
VAUL-5628: Date fields are searchable
VAUL-5580: Email addresses are auto-sanitized when pasting into sharing screens
KDE-1376: Desktop app can get stuck when the main app is closed too quickly
KDE-1381: Offline records not syncing up properly in Linux
KDE-1382: RPM desktop installer not compatible with RHEL9
VAUL-5726: Deleted items is missing right-click option
VAUL-5761: Remove RSA SecurID from GovCloud environment
VAUL-5960: Right Click New Shared Folder - Records are not being added to folder
VAUL-5945: After changing master password, user can login offline with old master password
VAUL-5981: TOTP URIs with leading white space are not parsed correctly by the vault
VAUL-5899: Large vault search speed is causing delays
VAUL-5986: Advanced search needs to dismiss results upon hitting <enter> key
VAUL-5983: The record owner is restricted from viewing the password on a V2 record that utilizes the enterprise domain enforcement
VAUL-5933: 508 compliance items (ensure image tags have alt attributes)
VAUL-5957: Drag/Drop file in the vault is adding to the prior record created
VAUL-5966: Drop target incorrect when file is dropped into the vault
VAUL-5968, VAUL-5969: Additional 508 compliance items
VAUL-5994: Select a shared folder and select a record not in the shared folder, right click and delete both. Vault will white screen.
VAUL-6053: Vault scrolls unexpectedly when clicking a folder
VAUL-6105: Security Audit: "reused" count includes owned records w/ the same password as a non-owned record
VAUL-6094: Multiple Share Relationship Invites are being sent after acceptance
VAUL-5899: Improved loading and search speed for large vaults
KDE-1343: Remove the deprecated browser extension for Safari users, point users to the new App Store version of the Safari extension
VAUL-6110: Removed the manual on/off toggle for logout timer. Users must specify a time (in minutes).
VAUL-5947: Account recovery setup is removed during the onboarding for SSO users.
VAUL-6143: If onboarding is disabled through role policy, disable any browser extension popup messages that lead to an installation.
Released on May 4, 2022
VAUL-5029: Introducing One-Time Share. See the Admin Guide and End-User guide for more details.
KDE-1214: Support for M1-based Macs. Our download page provides install links for the .dmg file and the Mac App Store. The .dmg file contains both Intel and M1 Mac binary builds.
VAUL-5021: Additional support for 508 compliance in Secrets Manager and other functional areas.
VAUL-5228: Unable to recover account with WebAuthn as the 2FA method
VAUL-5233, VAUL-4958, VAUL-5232: Several issues with File Upload failures
VAUL-5164: Support for Dashlane import with Argon2D and PBKDF2 200k iterations
KDE-1233: Crash on Windows Server 2012 R2 on SSO Login
KDE-1237: Tab key not being sent to Citrix client use Native App Fill
Released July 17, 2022
Multiple Tickets: Several UI bugs, translations and visual fixes
VAUL-5307: SMS support for Trinidad and Tobago
VAUL-5260: Payment card phone number saves incorrectly
VAUL-5344: Removed Duplicate detection button for now due to inconsistencies
KDE-1255: Touch ID setting turns off when signing in with the Laptop lid open
KDE-1228: Canceling the Yubikey setup and login flow gives error
KDE-1254: Filling from KeeperFill for Apps with German keyboard issues
KDS-1244: Filling from KeeperFill for Apps with French keyboard issues
KDE-1269: After logout, KeeperFill for Apps not selecting proper region (Govcloud)
KDE-1274: KeeperFill for Apps with Privacy Screen not working in Microsoft Edge
VAUL-5320: Additional confirmation upon deletion of a Shared Folder
KDE-1266: Added ability to delete account for Mac Store consumer version
Released on July 29, 2022
KDE-1273: Touch ID shows as "enabled" for users after an app reset
KDS-1277: Custom Record Template showing "Discard Changes?" on save
VAUL-4849: Showing content security policy error in console on login
VAUL-5362: EU data center BreachWatch errors for users on a free trial
Added support for Password Manager Pro import
Added support for generic .xls or .xlsx file import
Released April 6, 2023
Keeper is proud to announce our release of version 16.9.0 of our Web Vault and Desktop App. This new version includes a new design with a user interface refresh along with some new features and bug fixes.
See our blog post for additional details:
Keeper Desktop App now supports Import SSO LastPass vaults from Okta SSO and Azure SSO federated accounts
Advanced Search: Recently viewed records, search filters and more
Onboarding: New user onboarding has been improved
UI Refresh: Look and feel of the vault has been improved
MFA: When signing in with 2FA for the first time, there are now additional options. The Web Vault now offers 12-hour and 24-hour in addition to the previous options (every login, every 30 days, and don’t ask again on this device.)
Support for Google Authenticator QR code export format
Security Scores: "Security Data Sync" in the diagnostics menu will refresh your security scores
Lost Records: Shared records that have been removed from your vault, but are owned by you, can be recovered from the Deleted Items screen. The tab will only show if you have relevant records.
Note: There has been a change on our Privacy Screen feature. If you are the owner of the record, you will now be able to see the password even if there is a privacy screen applied and you couldn’t see the password previously. The privacy screen is still working and in effect for users who do not own the record. This change is being made across all platforms.
We truncated the view of super long URLs in the record detail screen
Released on June 21, 2022
VAUL-5165: Offline Create/Edit Record capability
VAUL-5181: New UI for login screens
VAUL-5031: Hundreds of new website logos added
VAUL-5208: Additional 508 compliance / accessibility updates
KDE-1253: Enterprise enforcements for Desktop App distribution defaults. This allows the Admin to define the default SSO Domain and Data Center location. Detailed instructions available at this link: https://docs.keeper.io/enterprise-guide/deploying-keeper-to-end-users/desktop-application#enterprise-configuration
VAUL-5295: CSV Import GUI fixes
VAUL-5095: Unable to ignore BreachWatch record which has edit rights
VAUL-5045: BreachWatch can indefinitely alert about a breached record
VAUL-5257: Second login required to send security audit data to the Admin Console.
VAUL-5251: Unable to export records with the Login record type restricted by admin.
VAUL-5248: Create Duplicate feature appearing for records that have Privacy Screen enabled.
VAUL-5270: Processing pending team members can sometimes cause the vault to display no data.
KDE-1220: KeeperFill for Apps compatibility issues with Apache Guacamole / Keeper Connection Manager running on a Mac host.
Several small UI bug fixes
KDE-1246: Upgrade Electron framework
KDE-1261: 10x speed improvement on file uploads for large file attachments.
Released on Oct 20, 2022
Share Admin Keeper's Share Admin feature is a role-based permission that gives administrators elevated access rights over your organization's shared folders and shared records. Share Admins have full user and record privileges for any shared record that they have access to. See: https://docs.keeper.io/enterprise-guide/share-admin
MSP to Managed Company Team Sharing Directly share folders to Managed Company teams
General to Record Type Conversion You can now right-click to change the type of any record, including migration from the legacy "General" record types. Multi-select + right click allows migration of multiple records at once.
Default Record Permissions Quickly set permissions during the creation of a Shared Folder
Default Folder Settings moved into the "Settings" tab In addition, you can now apply permission changes recursively and retroactively.
Shared Folder UI improved visibility Several enhancements to the UI which improve the visibility and management of Shared Folders.
Team Visibility There is now a "View Team" function in several locations so that you can see who you're sharing to.
Collapsed View of Records When a folder contains subfolders and records within subfolders, you can now collapse the view, in order to apply changes recursively. Select "Show subfolder records" to collapse the list.
Retroactively apply permissions When "Show subfolder records" is selected, the Settings tab will display a checkbox called "Apply permissions to all subfolders" which will apply the default folder settings to all existing records within folders and subfolders.
Released on March 10, 2022
KDE-1090: Upgraded Electron framework to 17.x
KDE-1203: Added a new Hot Key for filling TOTP codes (Ctrl/Cmd+Shift+T)
KDE-1206: Added {SPACE} keystroke for KeeperFill for Apps typer feature
VAUL-5047: Added Passportal Import tool
VAUL-4597: Added Record UID to BreachWatch events for Advanced Reporting & Alerts module.
VAUL-5140: Improved speed for large vaults
VAUL-5160: Improved 1Password import which includes TOTP codes
VAUL-5184: Improved MyKi import to support TOTP codes
KDE-1200: Crash when running Keeper Desktop on Fedora 35
KDE-1207: KeeperFill hotkey filling improvements over VMWare, Datto RMM and other remote desktop tools.
KDE-1065: KeeperFill for Apps not working over RDP with french keyboard
KDE-1117: Touch ID with IP restriction and offline access not working
KDE-1087: "Unable to connect" error when using KeeperFill for Apps
KDE-1118: KeeperFill for Apps with Touch ID and Webauthn hangs on login
KDE-1181: Whichever method signed in last (master password or biometric) is only able to be used offline. So if you last signed in with master password, signing in offline with master password works. But if you last signed in with touch id, signing in with touch id offline works.
KDE-1132: KeeperFill for Apps using "Generate password" has issues when loading the main desktop app.
KDE-1183: Native App Filler clicking tray changes focus
KDE-1099: Offline mode not working with IP restriction is activated
KDE-1186: SSO user logging in with Biometric is logged out to the wrong screen
KDE-1209, KDE-1210: LastPass import improvements and error handling
KDE-1213: Crash when setting up the OnlyKey security key hardware device
KDE-1217: Searching for Typed records within Shared Folder paths fails
VAUL-5092: Copying UID from Safari 15 user interface fails
VAUL-5102: Switching to Keeper DNA push method not showing correct screen
VAUL-5113: Secrets Manager app details GUI not showing correct permissions
VAUL-5107: Allow viewing and copying of Notes if the masking and privacy settings are activated.
VAUL-5098: After deleting a security key, toggle of 2FA doesn't visually show the action
VAUL-5114: Enforcement policy of re-authentication when revealing password was not working properly
VAUL-5153: Web Vault is saving phone number fields with formatting, which caused other client apps to crash.
VAUL-5155: Automatically fixes formatting issues from Android record data
VAUL-5156: Re-sharing a shared Record Type record that contains file attachments fails
VAUL-5154: UI issues when linking to Emergency Access screens
VAUL-5144: Multi-select and bulk edit not working properly in List View
VAUL-4933: Repaired Avast import
VAUL-5157: Import from legacy records missing TOTP field
VAUL-5163: QR codes from Okta Verify are showing empty fields
VAUL-4949: Can't type spaces when searching through the country names
VAUL-5185: Searching not matching on general record types with custom field values
Released on Feb 2, 2022
KDE-1193: Include TOTP fields in LastPass automated import
KDE-1178: Include file attachments in LastPass automated import
VAUL-5133: Add checkbox to make LastPass shared folder imports optional
VAUL-5143: Error message first time you drag-and-drop a file attachment into a record
Released on Oct 8, 2021
Support for Safari 15 automated password import
Released on June 28, 2021
Keeper has been making UI changes across all web-applications and browser extensions to comply with Section 508 of the Rehabilitation Act (29 U.S.C. § 794d). The Keeper Web Vault and Desktop App now supports keyboard navigation and they are compatible with popular screen readers and other assistive technology.
KDE-1079: Packaged an all new Safari browser extension with the latest features as Chrome, Firefox and Edge extension.
KDE-1080: Added support for Windows Hello role enforcement policy
KDE-1081: Upgraded the Electron framework to v12.0.9
VAUL-4692: Add clarification around the minimum security answer length requirements
VAUL-4588: Initial Support for 508 Compliance across Web Vault and Desktop Application
VAUL-4694: Unless disabled by role enforcement policies, users will be required to configure Account Recovery instead of indefinitely delaying
VAUL-4750: Simplified the new customer experience when purchasing Keeper prior to creating free Vault account.
VAUL-4822: Improved the embedded image viewer
VAUL-4092: Added Bitwarden to the available import formats
KDE-1092: LastPass automated import broken for certain users due to iterations settings.
VAUL-4830: 2FA enforcement with SSO user causes extension and vault to be out of sync during login.
VAUL-4836: Auto-suggestion drop-down fills the entire screen when there are very long URLs stored in the vault.
VAUL-4838: "Ghost" records in vault when deleting a shared folder containing an owned record
VAUL-4840: Gracefully handle scenarios where team keys cannot be decrypted
KDE-1073: UI issues caused when the vault logs out while push notifications are in front.
KDE-1085: Denying the password importer prompts can lead to a frozen Keeper Desktop app.
Released on March 31, 2022
VAUL-5035: Ability to convert "general" to new Record Types
VAUL-4879: Role enforcement to activate Stay Logged In
VAUL-4893: Role enforcement to enable Self Destruct
VAUL-5201: Improved performance of uploads and downloads
VAUL-5187: QR Code upload fails for certain formats
VAUL-5202: MyKi and 1Password TOTP record imports are not autofilling*
VAUL-5191: TOTP and custom fields not available in CSV export
VAUL-5195: Field validation on custom field Phone Number not working properly
KDE-1224: Linux app shows blank screen when using Yubikey
KDE-1222: Login on desktop app with Touch ID and Yubikey not working properly
KDE-1218: Default password generator in KeeperFill for Apps not including symbols
KDE-1223: Desktop App not maintaining disabled logout timer setting
(*) To resolve existing records, run the verify-records
command in .
Release ETA on Oct 18, 2021
VAUL-5024: Record Type records not syncing after activating Record Types
VAUL-5018: Showing "unexpected error" when creating account with a pending transfer acceptance
VAUL-4578: Account recovery failure on a new device
VAUL-5000: Prevent record copy when record type is restricted by role enforcement
VAUL-4978: When sharing is restricted, user receives no visible error when sharing and it fails silently
VAUL-4906: Unknown Sharing Error when email is not verified
VAUL-5023, VAUL-5017: Record type errors with Bank Account and Payment Cards
VAUL-5030: Browser Extension causes forced logout after importing records
Released on Nov 5, 2021
VAUL-4710: Secrets Manager user interface is now generally available on the Keeper Web Vault and Desktop App. For more information about Keeper Secrets Manager, see:
VAUL-4904: Visual improvements and workflow improvements for Record Types template creation.
VAUL-5062: Added MyKi password manager to Keeper Import screen
VAUL-5038: Migrated from webpack4 to webpack5
KDE-1163: Additional changes to ensure that logout clears all memory. User-initiated logout performs full restart of the Keeper Desktop application.
KDE-1164: KeeperFill for Apps will only process hotkeys when a record has been selected. This prevents conflicts between existing hotkeys and KeeperFill.
KDE-1169: Sync errors after deleting a Shared Folder
KDE-1168: "Object no longer exists" error when switching between KFFA and Desktop App
VAUL-5039: Record Type fields saving the translated label
VAUL-5041: Importing CSV with limited columns can throw an error
VAUL-5042: Can't view notes when Privacy Screen is ON and Masking is ON
VAUL-5049: Can't change the record type (causes crash)
Released on Oct 22, 2021
KDE-1150: Support for CCH Axcess native app autofill
VAUL-4991: Changed Software License Number to a hidden field
KDE-1157: Improved support for Azure Conditional Access
KDE-1156: Remove use of legacy windows registry key which generates a report in Cybereason
VAUL-5036: Restore of Record Type records
VAUL-5018: Showing "unexpected error" when creating user accounts with a pending transfer acceptance
VAUL-5000: Prevent record copy when Record Type is restricted by role enforcement
VAUL-4978: When sharing is disabled, the action silently fails when adding a user to a shared folder.
VAUL-5014: Edit and Delete actions in the Grid View don't work
VAUL-4964: "Unknown sharing error" when the user's email has never been verified.
VAUL-4999: Error when trying to edit a custom Record Type when the type is restricted.
VAUL-5030: Importing records can generate an app crash
VAUL-4869: Import column selections don't persist when there are many fields to map
VAUL-5001: During import of CSV, column changes are lost when scrolling horizontally
VAUL-4934: Large number of image attachments in a record can generate errors when loading thumbnails.
Released April 26, 2021
Introducing Record Types for Web Vault & Desktop App (Limited Release) This release introduces a powerful new feature called "Record Types", which gives users the ability to create records of various template types, grouped into categories, each containing a unique collection of field types and functionality fields within the record. Record templates can be created by Admins that are custom to the needs of the business. This feature is only available for Enterprise customers, activated on an individual basis at this time, because the Browser Extension, iOS and Android apps are still under development. If you are interested in being an early adopter of Record Types, please contact your customer success team member at Keeper and we'll activate the feature.
Generate a Password in KeeperFill for Apps Keeper's password generator is now within easy reach in the KeeperFill for Apps toolbar landing screen. Users can generate and copy the secure password or use it to create a new record.
Comprehensive Keyboard Command Functionality for KeeperFill for Apps
Support for NTLM Authentication for Microsoft Windows Customers
KDE-959: The "Session Timed Out" dialogue appears when logging into a different account after a session timeout occurs
KDE-1034: When a user attempts to switch from US to EU region at login, an Uncaught TypeError is returned
KDE-977: Selecting "Create an Account" in KFFA opens the login page on Keeper Desktop
VAUL-4721: The "Admin Console" button in the Vault fails to redirect Enterprise users to the console
VAUL-4516: Users are prompted for their 2FA code twice when logging into EU SSO Cloud account