Frequently asked questions for the Keyra WPF desktop application.
The deletion process removes:
keys/ folderIf the vault has a Git remote configured, a second confirmation dialog asks whether to also delete the remote repository. You must type the vault name to confirm remote deletion.
Warning: Vault deletion cannot be undone. Ensure you have exported or backed up the vault before deleting.
Keyra supports cross-vault secret transfer via clipboard. The secret is re-encrypted with the target vault’s key during paste.
This copies the encrypted secret and its metadata to the clipboard as a SecretTransferData package. The ciphertext remains encrypted with the source vault’s key.
Keyra automatically:
If the source key cannot be found (e.g., the source vault was deleted), the paste will fail with a “Key not found” error.
There are three copy options for secrets:
| Action | Shortcut | Description |
|---|---|---|
| Copy Plaintext | Ctrl+C | Decrypts the secret and copies the plaintext value to the clipboard |
| Copy Secret | Ctrl+Shift+C | Copies the full encrypted secret package for cross-vault transfer |
| Copy Raw Secret | Context menu (advanced) | Copies the secret transfer data as raw JSON (for developer use) |
To copy just the decrypted password or value, select the secret and press Ctrl+C. The plaintext is placed on the clipboard and can be pasted into any application.
Integrating a vault with the Internal Master Vault enables automatic unlocking – when Keyra starts and unlocks the Master Vault, all integrated vaults are unlocked automatically without any password prompts.
The vault key is protected with a randomly generated password that is stored encrypted inside the Internal Master Vault. You never see or manage this password.
If you already have a vault and want to integrate it later:
Keyra generates a new random password, re-protects the vault key with it, and stores the password in the Internal Master Vault. From that point on, the vault unlocks automatically at startup.
To make all new vaults integrate with the Master Key by default:
This setting can also be enforced via Group Policy (CreateVaultsAsMasterKeyIntegrated DWORD under HKLM\Software\Policies\PenguinConverters\Keyra).
On Active Directory domain-joined machines, Keyra can protect vault keys using DPAPI-NG with AD security principals (users and groups). This binds the key to specific AD identities so that only authorized domain accounts can decrypt it.
When sharing vaults on a domain-joined machine, always export with AD protection enabled. This eliminates the need for an initial password exchange between parties:
This is especially important when onboarding new team members who do not yet have access to a shared vault for secure password exchange.
When creating a new vault with the DPAPI-NG provider, you can add AD principals (SIDs) directly during creation:
The vault key is then protected with both the authenticator chain and the AD descriptor.
Keyra supports per-vault Git integration for syncing encrypted secrets across machines. Global Git settings define defaults that are applied to every new vault.
| Setting | Description |
|---|---|
| Enabled | Master switch for Git integration |
| Remote Name | Default remote name (default: origin) |
| Default Branch | Branch name for new repos (default: main) |
| Auto-commit on save | Automatically commit when secrets are saved |
| Auto-push on save | Automatically push after each commit |
| Auto-pull on load | Pull latest changes when a vault is opened |
| Server Base URL | Git server URL for automatic repository creation |
| Author Name | Git commit author name |
| Author Email | Git commit author email |
The settings are stored in {repository}/git.json.
The Git PAT is stored in the Internal Master Vault (encrypted) rather than in the git.json file. If you previously stored the PAT in git.json, Keyra automatically migrates it to the Internal Master Vault on startup.
When creating a new vault with Git enabled, you have three options:
When global Git settings are enabled, the auto-commit, auto-push, and auto-pull settings are propagated to the new vault automatically.
Each vault can override the global Git settings. Right-click a vault and select Git Settings to configure vault-specific Git behavior. By default, vaults inherit from the global configuration.
Proprietary – Penguin Converters AG