Resources

Implementation Resources

Everything your team needs to evaluate, deploy, and operate Aegis with confidence: product docs, architecture guidance, and security workflows built around user-owned encryption keys.

GuidesAPI docsSecurity patternsPassword protection
Core Sections

Product Guides

Step-by-step setup and onboarding resources for teams rolling out vault controls and master key ownership workflows across environments.

  • Onboarding workflows
  • Policy defaults
  • Operational checklists

Developer Docs

Typed API references and integration examples for secure credential automation, scoped access, and OAuth-first MCP authentication.

  • Connect APIs
  • Usage patterns
  • Security model reference

Security Playbooks

Recommended incident workflows for breach response, account hardening, key rotation, and audit preparation.

  • Password incident response
  • Account takeover containment
  • Post-incident review flow

Download Center

Access extension and client setup materials for supported platforms.

  • Browser extension rollout
  • Desktop/mobile setup
  • Environment-specific deployment notes
Password Protection Hub

Password Protection Guide

A practical checklist for creating strong passwords, hardening account recovery, and reducing takeover risk.

Open guide

Security Architecture Overview

Understand how client-side encryption and user-owned master keys protect credential data end to end.

Open guide

Password Security FAQ

Answers to common protection questions, including passkeys, breached credentials, and daily hygiene.

Open guide

Comparison Guides

Evaluate Aegis against other password managers with security, trust, and pricing-focused comparison pages.

Open guide