Keys in Secryn represent immutable cryptographic assets used for signing, encryption, authentication, and secure system access. Keys are created once and cannot be edited after creation. This immutability ensures cryptographic integrity and prevents accidental or unauthorized changes.
Every key belongs to a vault, and access is enforced through project membership, vault access rules, and user roles.
Keys are commonly used for:
Secryn stores and distributes keys safely—it does not mutate or regenerate keys after creation.
SSH-compatible formats are supported via output format selection rather than separate key types.
You can either generate a new key in Secryn or upload an existing key (PEM/PKCS). When generating a key, you choose:
Once saved, the key configuration is locked and cannot be modified.
Keys cannot be edited or versioned. If a key needs to change, rotate, or be replaced, create a new key and disable or expire the old one. The original data remains unchanged for audit consistency, enforcing explicit rotation workflows.
Format selection controls how the key material is generated and downloaded.
Each key supports lifecycle controls:
Disabling a key preserves history and does not remove it from the vault.
Keys can optionally be marked as publicly accessible:
Use public visibility cautiously and only when external systems explicitly require it.
Attach tags to help identify services, environments, or compliance classifications. Tags improve discoverability but do not affect access control.
Key access depends on:
Depending on role, users may create keys, download them, disable or expire them, or view metadata only.
Keys are intentionally rigid in Secryn. This immutability and explicit lifecycle model reduces risk, improves auditability, and encourages safe cryptographic practices across teams and infrastructure.