Zero-knowledge by design

Your team's secrets,
locked down.

Centilio Vault is a self-hosted, zero-knowledge password manager for businesses that don't want their secrets sitting on someone else's server. Your master password and vault data never leave your browser in plaintext. Ever.

Self-hosted
Open source (MIT)
AES-256 / Argon2id
MFA built in

Trusted by teams that take security seriously.

Numbers from organizations running Centilio Vault on their own infrastructure.

0+

Items encrypted

0+

Organizations protected

0+

MFA-enforced sessions

We can't read your data.
That's the whole point.

Most password managers are a black box. Centilio Vault inverts the relationship: the master password and item plaintext never leave the client. The server holds ciphertexts, BCrypt-stretched login proofs, and nothing else.

1

Derive locally

Your master password becomes a key in your browser via Argon2id (memory-hard, attack-resistant). The password itself never crosses the wire.

2

Encrypt locally

Each vault item gets a random 256-bit DEK. Items are AES-GCM-encrypted in your browser before upload.

3

Server stores ciphertext

If our database is stolen the attacker gets ciphertexts and the schema. Your secrets stay yours.

Everything a credential manager
should already do.

The features below are shipping today on every Vault deployment. No premium tier, no upsell. See the full catalog for the rest.

Trust

Zero-knowledge encryption + self-hosted

We can't read your vault and we can't lose it for you, because we never have it. Run Vault on your own infrastructure or let us host it — either way, the cryptographic boundary lands in your browser, not our database.

  • Argon2id key derivation, AES-256-GCM item encryption
  • BCrypt-stretched login proofs only on the server
  • Postgres-backed; bring your own infrastructure
Daily use

Browser extension + native biometric unlock

A Chrome MV3 extension fills credentials with a single click. A native companion app gates that with Touch ID or Face ID, and seals the key-encryption-key in your OS keychain when you walk away.

  • Chrome / Chromium extension, MV3-native
  • Native companion: Touch ID, Face ID, Windows Hello
  • OS-keychain custody of the key-encryption key
Teams

Sharing + audit log

Share credentials inside an organization with role-based access. Every login, every reveal, every share is recorded — searchable, exportable, audit-friendly. Compliance reviews stop being a 3-week archaeology project.

  • Role-based sharing inside organizations
  • Append-only audit log, exportable to your SIEM
  • Activity center for end-users — what was used, when
Hygiene

MFA + password generator

Multi-factor auth is on the vault itself, not bolted on. The built-in generator produces strong passwords that match your org's policy — length, character classes, exclusions — so the weakest link in your security stops being human creativity.

  • TOTP (RFC 6238) + WebAuthn second factors
  • Policy-driven generator (length, classes, exclusions)
  • Recovery kits for legitimate "I lost my phone" cases
How we compare

Different password managers,
different trade-offs.

Pick what fits your team. We're not the right answer for everyone — but if these are the trade-offs you care about, you'll find Vault stacks up.

FeatureCentilio VaultLastPass1PasswordBitwarden
Zero-knowledge by architecture
Self-hostableYes
Open-source (MIT)Yes
Native biometric companionMobile onlyMobile onlyMobile only
No degraded free tierFree self-hostLimited
Audit-log SIEM exportEnterpriseEnterpriseSelf-host
Public threat modelPartial
Public security findings log

Comparison reflects our reading of public docs as of 2026. Don't take our word for it — verify each row.

For the security buyer

The crypto, in one card.

Full threat model and key-flow diagrams live in the public repo.

Key derivation

Argon2id

m=64 MB, t=3, p=4 — memory-hard, GPU-resistant

Item encryption

AES-256-GCM

Per-item DEKs, wrapped under user KEK

Key wrapping

HKDF-derived KEK

Org-salted, info-tagged; never leaves the client

Server side

BCrypt(SMK)

Login proofs only — never the master key

Session

JWT 15 min + refresh 30 d

Short-lived access tokens; refresh rotation

Open source

MIT-licensed

Audit the code; vendor independence

What teams say.

Quotes from security leads who've put Vault through their procurement process.

We moved off LastPass after the 2022 breach and shopped every option. Vault was the only one where the security architecture stood up to our pen-test team's review.

Priya Patel

CISO, mid-market fintech

FAQ

Common questions.

Don't see yours? [email protected] gets a real human within a working day.

Vault is open-source under MIT, fully self-hostable, and ships with a public threat model + findings log. We publish what's open as well as closed. 1Password is closed source and SaaS-only; Bitwarden has a self-host option but a more limited free tier. Pick what fits — we're honest about the trade-offs in our /vault/pricing page.

Ready to take your secrets back?

Tell us about your team and what you're storing today. We'll scope a Vault deployment that fits — managed, self-hosted, or a hybrid in between.

Or email us directly at [email protected]