CREDENTIAL VAULT

One vault for every privileged secret. Never disclosed to the user.

Service accounts, API keys, certificates, SSH keys, and database credentials are stored in 12Port’s secured vault. Just-in-time injection through the access broker. The credential never reaches the user’s clipboard, browser, or terminal.

Eliminate credential exposure and reduce risk across every identity.

How it works

Vault, broker, and audit. One workflow.

Operators, scripts, and AI agents authenticate to 12Port with their corporate identity. 12Port retrieves the target credential from the vault, opens the privileged session through the broker, and records everything. The credential is injected by the broker. The user never sees it, the endpoint never receives it, and the device never stores it.

Every check-out, rotation, and access decision is recorded with full audit context: who requested, what target, which approval, when, from where. Split knowledge and dual control are available for the highest-sensitivity credentials.

Secured vault

Every secret. One vault. Full audit.

Service accounts & API keys

Centralized vaulting for service accounts, API keys, OAuth tokens, and machine credentials. Rotated on schedule or on event.

SSH keys & certificates

Public and private SSH keys, X.509 certificates, and signing keys. Discovered automatically. Rotated, reconciled, and never written to disk on the endpoint.

Database credentials

PostgreSQL, MySQL, SQL Server, Oracle, MongoDB. Native or AD-integrated. Brokered through a JDBC/ODBC-aware proxy with full query-level recording.

Cloud & SaaS identities

AWS, Azure, GCP root and service identities. Office 365, Salesforce, GitHub, Atlassian admin accounts. Vaulted, rotated, and brokered through SSO.

Why it’s different

A vault designed to never disclose.

JIT injection through the broker

Credentials are checked out at the moment of session establishment, used by the broker, and discarded. The user never sees the password. No copy-paste, no exposed tokens.

Split knowledge & dual control

High-sensitivity credentials can be split across two operators or require dual approval before release. Available per credential, per role, per target.

Auto-discovery

Discovers privileged accounts on Windows, Linux, Kubernetes, network devices, and databases. Brings them under management without an inventory project first.

See it in action

Inside the 12Port platform.

Scroll the row, then click any tile to zoom in.

12Port

See it in your environment.

30 minutes. Real screens. A live privileged session against a system you pick.