Use Cases

This document covers the most common use cases of the Keeper Enterprise product.

Keeper Enterprise White Paper and Use Cases

End-User Vault

Every user is provided a secure and private vault. Keeper works on all device types, platforms and operating systems to allow users to:

  • Create and manage strong passwords across all device types.

  • Securely store files and other secret information.

  • Autofill passwords across web browsers, apps and mobile devices.

  • Share confidential information between users and teams.

1. Deploy a Zero-Knowledge Vault to Employees

Keeper is a Zero-Knowledge vault that is protected with multiple layers of encryption. Each user’s vault is protected by a Master Password which is used to encrypt and decrypt data on the local device. Two-Factor Authentication protects cloud access.

Security Note 1: The Master Password is used to derive an encryption key using PBKDF2, which is used to encrypt and decrypt the vault.

Security Note 2: Each password and file stored in the vault is protected with a separate strong 256-bit AES key.

Security Note 3: Users who login with Keeper SSO Connect integration don’t require a master password, as the encryption keys are managed by the Enterprise. Biometrics (Face ID, Touch ID, Windows Hello, etc.) can be permitted as a convenience factor.

iOS Touch ID Login

2. Generate Strong Passwords

Creating unique and strong randomly generated passwords for each website and service is critical to protecting against a data breach, password stuffing and password spraying attacks. Keeper’s password generator and auditing capabilities ensure compliance company-wide.

Web Vault Password Generator

3. Protect All Platforms and Devices

Keeper protects passwords and private information on all devices and operating systems. Deployment options are available through the Keeper Security website and every popular App Store. SCCM deployments and virtual environments (e.g. Citrix) are fully supported.

Keeper® Desktop App: Fully-featured desktop application for fast and secure access to your Keeper vault.

KeeperFill®: KeeperFill® is a browser extension that lets you autofill your login credentials in your favorite websites.

Keeper® Mobile App: Fully-featured mobile application for fast and secure access to your Keeper vault.

4. Autofill Website Passwords with KeeperFill®

KeeperFill for web browsers provides a powerful and easy-to-use autofill feature. Various paths and scenarios are covered by the browser extensions, including the following:

  • Filling a login and password

  • Selecting from multiple passwords on the same website

  • Automatically filling a password (optional)

  • Prompting to fill or manual click to fill

  • Saving new passwords to the vault as you type

The ability to customize the behavior of the browser extension is covered in the Settings screen of the extension.

5. Change Passwords and Increase Security with KeeperFill

Keeper automatically detects password change forms on websites and can rotate your password to a strong auto-generated password with a single click. By using Keeper’s Security Audit screen, you can identity which accounts require an update. On the “Change Password” screen of the website, Keeper will automatically prompt you to update your password.

6. Autofill a Native Desktop Application with KeeperFill for Apps

Keeper Desktop provides a unique and powerful native app form fill capability using a simple keyboard hotkey. IT admins who are accessing remote services can make use of this capability without having to resort to “copy” and “paste”. By storing all passwords in the vault and using KeeperFill for Apps, you can be assured that your application passwords are not stored anywhere in plaintext.

KeeperFill for Apps works across Mac and PC platforms with popular native applications such as:

  • Skype, Slack, Evernote and other productivity apps

  • Custom and/or proprietary applications

  • Remote Desktop, VNC, Terminal and other command-line utilities

KeeperFill for Apps is available in the “Settings” screen inside Keeper Desktop.

7. Stay Organized and Efficient with Keeper’s Advanced User Interface Features

Sub-folders: Sub-folders (or folders within folders) provide greater control and organization over your private Keeper records and files. They increase organization across teams and accounts types.

Grid view layout: Grid view allows you to view your records in a graphical, tile format which displays beautiful, curated logos for popular websites. To enter Grid view, simply click on the grid icon.

Record History: Every change made to a record creates a backup version that can be viewed and restored at any time. Deleted records can also be recovered. There is no limit to the number of versions stored.

Creating Shortcuts: A record can exist outside of a folder, inside a folder or inside a shared folder. A record can also be linked into multiple folders or shared folders. A linked record is also referred to as a “shortcut”.

8. Protecting Confidential Files, Photos and Videos

Keeper protects confidential files with 256-bit AES encryption using record-level keys, just like our password encryption technology. You can drag-and-drop files into your vault or take pictures & videos directly from your mobile devices.

Examples of files that might be stored in the vault include:

  • Customer information

  • Financial & Banking Documents

  • Tax Returns

  • Medical photos and videos

9. Protect Secure Certificates and SSH Keys

The growing threat of trust-based attacks is opening security risks for IT organizations who rely heavily on access to critical systems via digital certificates and keys. Keeper protects certificates and keys with 256-bit AES zero-knowledge encryption. Examples of the types of certificates that can be stored include:

  • SSL Certificates

  • SSH Keys

  • RSA Key Pairs

  • Code Signing Certificates

  • API Keys

Certificates and SSH keys can be stored to any Keeper vault record as either a custom field, note, or file attachment. Below is an example of a record that has two SSH keys saved as file attachments.

In addition to storing SSH keys, they can be used to securely establish connections.

Keeper Commander, a command-line SDK and toolkit for DevOps users allows you to connect to remote systems using stored credentials or SSH keys.

For more information on establishing connections using Commander, see this link.

10. Share a Password With a Colleague or Team

Keeper uses RSA encryption to share passwords and files. You can share passwords or files directly with another Keeper user or with a team. Behind the scenes, information is encrypted with the recipient’s public key and decrypted with their private key.

Permissions can be assigned to individual users, or to teams of users.

Creating A New Shared Folder
Individual Record Sharing Permissions
Sharing a Folder With a Team

View, edit and share permission sets can be applied to individual users. Shared folder permissions can provide control over the management of the folder, users and records.

Teams are created and managed in the Keeper Admin Console. Teams can also be provisioned automatically using our Active Directory Bridge software, SCIM protocols or the Keeper Commander SDK.

11. Separate Business and Personal Info

Since Keeper Enterprise provides a mechanism for Administrators to suspend and transfer end-user vaults, Keeper Security recommends that end-users keep business and personal vaults separate. This can be done easily using Keeper’s Account Switching features. Every platform supports the ability to easily switch between business and personal vaults.

12. Login in with Existing Identity Providers

Through the use of Keeper SSO Connect technology, end-users can seamlessly log in to their Keeper vault with any existing SAML 2.0 compatible identity provider such as Okta, Centrify, Microsoft AD FS / Azure, G-Suite, JumpCloud and F5 BIG-IP APN

Once this capability is activated by the Keeper Administrator, logging in is seamless across all device types and platforms.

Alternatively, users can first log in to identity the provider and then launch their Keeper Vault.

Administration and Onboarding

Keeper Enterprise provides a web-based Admin Console application. The Admin Console allows administrators to:

  • Onboard and offboard users

  • Apply role-based enforcement policies

  • Manage two-factor authentication

  • Monitor the security score of the organization

  • Customize end-user experience

13. Monitor the Security Score of the Company

The overall security score can be monitored by delegated Keeper administrators to ensure compliance with password policies. Detailed reports identify users who need to take corrective action. The record password strength, master password strength and two-factor authentication usage is monitored.

Security Audit Report Details

14. Manage and Onboard Users

Keeper Admin Console provides several solutions to onboard users based on the size of the organization. Users can be provisioned through one of the following methods:

  • Active Directory or LDAP sync via AD Bridge

  • Single Sign-ON (SAML 2.0)

  • SCIM and Azure AD

  • Email Auto-Provisioning

  • CSV File Upload

  • Manual entry via the web interface

  • Command Line Provisioning via Keeper Commander SDK

Different organization units (nodes) can be provisioned in different ways. For example, end-users within one organizational unit can onboard via Active Directory and another group of users can be provisioned with an identity platform like Microsoft Azure or Okta.

Add or Upload Users

15. Enforce Role-based Permissions

Keeper’s role-based enforcement policies provide organizations with the most flexibility to customize their solution to meet the needs of internal controls. This includes:

  • Master password complexity rules

  • Two-Factor Authentication channels

  • Physical location, IP addresses and device platforms

  • Sharing and data export rules

  • Device biometrics

Administrative permissions are also applied at the role level. Any role with administrative permission can log in to the Keeper Admin Console and perform specific job functions.

Role-based Permissions are Fully Customizable
Admin Permissions Settings

16. Transfer Vaults When Employees Leave

Retaining critical and confidential information is important when employees leave the organization, especially users that are in some administrative or management capacity.

Through the use of Keeper’s secure “Account Transfer” feature, a user’s vault can be locked and then transferred to another user within the organization. The process of account transfer remains fully zero-knowledge, and the responsibility of performing the account transfers can be limited based on roles within the organization. For example, only the Engineering Manager can transfer the vault of an Engineer. Or the Marketing Manager can transfer the vault of the Marketing Coordinator.

Keeper’s security model is based on the least privileged access model. Administration of groups can be delegated and restricted based on job function or any other criteria.

Enabling Account Transfer From the Role Enforcements Screen
Transferring a User's Vault

Account Transfers are a one-directional action. The source account is deleted and the vault records are transferred to another user account.

17. Audit Event Logs and Perform Forensic Analysis

Recent Activity

Keeper’s “Recent Activity” section provides event logging and forensic analysis capabilities to comply with corporate governance and audit requirements. Events are tracked throughout the system while maintaining zero-knowledge. Only privileged users with sharing or ownership rights to decrypt individual vault records are capable of viewing the stored vault information.

Recent Activity Report

Advanced Reporting & Alerts Module

Keeper’s Advanced Reporting & Alerts Module (ARA Module) provides event logging and log event tracking for over 75 event types, the ability to send event based alerts and the capability to log events to an external system.

Create customized reports by specifying what criteria to filter and present in each column. Reports can now be filtered and saved based on Event types (Policy Changes, Sharing, Logins, etc), Users, and Attributes (Nodes, Devices, Location, etc).

Alerts can be triggered based upon any event criteria, such as role policy changes, privileged password access or other security events. Alerts can be sent to SMS or email and also viewed within the Admin Console interface.

ARA Module Module integrates with 3rd party Security Information and Event Management (SIEM) tools for external logging. Integrations include the following:

  • Splunk

  • Sumo Logic

  • Amazon S3

  • IBM QRadar

The ARA Module supports over 75 event types (e.g. Expired Master Password, Changed Master Password, Shared Record, Disabled Two-Factor Authentication etc. ) that can be automatically pushed to popular SIEM products such as Splunk, Sumo and QRadar.

Reporting with Sent Alert