Getting Started

First Steps

Learn the essential tasks to complete immediately after installation.

Once Secryn is installed and the setup wizard is complete, you are ready to start organizing and securing your data. This guide walks through the recommended first actions to help you get productive quickly and understand how Secryn is structured.

Create Your First Project

Projects are the top-level organizational unit in Secryn. They group related vaults, users, and resources together and define access boundaries. Start by creating a project that represents an application, environment, or team. Users added to a project inherit access based on their role and the vaults they are permitted to use.

Create a Vault

Vaults live inside projects and store secrets, cryptographic keys, and certificates. A project can contain multiple vaults to separate concerns such as environments, services, or security levels. By default, project members can access vaults unless a vault is marked as restricted. Restricted vaults require users to be explicitly added, providing an additional layer of control.

Add Secrets, Keys, and Certificates

Within a vault, you can create three types of resources:

  • Secrets for sensitive values such as API keys, tokens, and credentials.
  • Keys for cryptographic operations, encryption, signing, or SSH usage.
  • Certificates for TLS, internal PKI, or application authentication.

All resources support versioning, allowing you to view history and restore previous versions when needed.

Invite Users and Assign Roles

Invite users to your project and assign them appropriate roles such as Admin, Project Manager, Contributor, or Read-only. Roles define what users can view or modify across projects, vaults, and resources. Review role capabilities within User Management to ensure access aligns with your security requirements.

Access Vault Data

Vault data can be accessed in multiple ways:

  • through the Secryn web interface
  • via the REST API using a vault access key
  • via public URLs for keys and certificates when visibility is set to public
  • through MCP for agent-based and automated access

Secrets can be fetched with full values or as name-only listings, depending on your use case.

Configure Notifications and Monitoring

Secryn can notify administrators, project managers, and resource owners about expiring secrets, keys, and certificates. Review email and scheduling settings to ensure alerts and digest emails are delivered at the right time. Audit logs, request logs, and user logs provide full visibility into changes and access across the system.

Next Steps

After completing these steps, consider the following:

  • set up API or MCP access for automation
  • define restricted vaults for sensitive workloads
  • review backup and restore options
  • customize branding and application settings

Secryn is now ready to securely manage secrets, keys, and certificates across your organization.