Multi-user secrets vaults
with permission templates.

Permission templates, authored once and assigned to many
Author capability templates in the dashboard and assign them to members. A template bundles a name, a set of capabilities across the matrix (Machines, Audit log, Alerts, IP allowlist, Integrations, Templates, Support, Projects), and a project scope. The same template can be assigned to many members, keeping their permissions in sync. Adjust a template once and every member who holds it picks up the change on their next request, with no re-login or publish step.

Global access or a specific project list
Project-scoped capabilities apply only to projects in the member's scope. Choose global access (every project in the vault) or a specific list, on a per-member basis without touching their template. Scope changes are recorded in the audit log alongside the assignment that triggered them.

One identity, multiple vaults
Members sign in with their own SikkerKey credentials and pick which vault to act inside for the session, whether that's their personal vault or any organization they're a member of. Switching vaults is two clicks. Owners never see members' passwords or 2FA factors, and members never share credentials to act on your vault.

Every action attributed by username
When a member reads a secret, edits a policy, or invites a teammate, the audit log records it with their username. Members with Audit log: View see their own actions only. Audit log: View others expands the view to every actor in the vault, including other members, machines, and AI agents, so an owner gets a single trail of who did what across the org.

Invite, suspend, remove, leave
Invite teammates by email. The recipient must already have a SikkerKey account, and the response never reveals whether they do, so your dashboard can't be used to enumerate customers. Suspension cuts the member's session immediately and bars them from the vault until you unsuspend; their audit entries stay intact. Removal drops the membership. A member who wants to leave on their own opens Settings → Leave organization from inside your vault.

Built for teams that share a vault
The details that make multi-user vaults workable.
Email invitations
Pre-assign a template and project scope at invite time. Invites expire after seven days and never disclose whether the recipient is a SikkerKey customer.
Owner-only template editing
Three cells stay locked to the owner: editing templates, assigning templates to members, and changing member project scope. Closes off the privilege-escalation path that delegated admins would otherwise have.
Self-service leave
Members can end their own membership from Settings → Leave organization inside your vault. Their personal vault and SikkerKey account remain in place; your roster updates in real time.
Plan-based member limits
Plans cap the number of members per organization. The cap is enforced at invite-send time with a clear error pointing at your billing page.
Real-time propagation
Template edits propagate on the next request from every member who holds the template. Suspensions and removals take effect immediately on the next request.
Trust separation
Dashboard membership decides what humans can do in the editor. Machine identity decides what workloads can read at runtime. The two planes are deliberately independent.
Stop sharing one set of credentials.
Convert your vault to an organization in two clicks. No credit card required.
Start for Free