Resources
Implementation Resources
Everything your team needs to evaluate, deploy, and operate Aegis with confidence: product docs, architecture guidance, and security workflows built around user-owned encryption keys.
Product Guides
Step-by-step setup and onboarding resources for teams rolling out vault controls and master key ownership workflows across environments.
- Onboarding workflows
- Policy defaults
- Operational checklists
Developer Docs
Typed API references and integration examples for secure credential automation, scoped access, and OAuth-first MCP authentication.
- Connect APIs
- Usage patterns
- Security model reference
Security Playbooks
Recommended incident workflows for breach response, account hardening, key rotation, and audit preparation.
- Password incident response
- Account takeover containment
- Post-incident review flow
Download Center
Access extension and client setup materials for supported platforms.
- Browser extension rollout
- Desktop/mobile setup
- Environment-specific deployment notes
Password Protection Guide
A practical checklist for creating strong passwords, hardening account recovery, and reducing takeover risk.
Open guideSecurity Architecture Overview
Understand how client-side encryption and user-owned master keys protect credential data end to end.
Open guidePassword Security FAQ
Answers to common protection questions, including passkeys, breached credentials, and daily hygiene.
Open guideComparison Guides
Evaluate Aegis against other password managers with security, trust, and pricing-focused comparison pages.
Open guideExternal Research Links
Use these independent references to benchmark your password-protection policy and account security controls.