Dashlane security

Learn how Dashlane's security model delivers maximum protection, privacy, and peace of mind.

secure by design

Built on zero-knowledge architecture

Locally encrypted and decrypted

Dashlane vaults are encrypted and decrypted locally on user devices. Only users hold the keys to their data—Dashlane can never view or access user credentials.

Protected by confidential computing

AWS Nitro Enclaves extend our zero-knowledge protection to the cloud, providing hardware-level isolation that keeps sensitive cryptographic operations invisible to the host.

Secured across the full product

Our zero-knowledge approach applies across vaults, audit logs, integrations, and all data flows, ensuring data is protected at rest, in use, and in transit.

Patented security model

Dashlane holds 8 patents, with 6 more pending, for our innovative approach to zero-knowledge security.

How it works

Cryptographic architecture & key management

When a user logs in to Dashlane on a new device, their device generates a unique 40-byte key that requires explicit user verification—separate from the vault encryption key—to ensure only trusted endpoints can decrypt vault data.

Vault encryptioN

AES256-CBC-HMAC mode for confidentiality and integrity

Key derivation

Argon2d (3 iterations, 32 MB memory cost, 2 threads) for GPU-resistant password stretching

Key separation

Distinct secrets for vault encryption and device authentication

Enterprise-grade security features

SSO & SCIM
ACTIVITY LOGS
ROLE-BASED ACCESS
API & CLI

Confidential SSO & Provisioning

Connect Dashlane to your IdP to simplify provisioning, deprovisioning, and employee access to Dashlane. Protected by confidential computing.

Activity logs

Track admin actions, employee activity, and policy enforcement with detailed, encrypted audit trails that are exportable directly to your SIEM tool.

Dashlane Admin Console imagery showing credential risk logs.

Role-based access

Mitigate internal risk by assigning granular permissions across your organization. Define specific roles for viewing, editing, or managing credentials.

Dashlane Admin Console imagery showing role-based access controls and capabilities.

API & CLI

Empower your technical teams to integrate Dashlane directly into their existing workflows.

Admin Console imagery showing how custom integrations can be created.

Committed to compliance

We stay ahead of industry standards with proactive compliance and the latest certifications.

Dashlane security FAQs

Pushing zero-knowledge boundaries with confidential computing

Confidential computing provides us the right toolbox for processing sensitive data while maintaining our zero-knowledge architecture, which is critical for enterprise environments.

Frédéric Rivain

Chief Technology Officer, Dashlane

Security resources

Iconography of a magnifying glass representing Dashlane’s vulnerability disclosure policy and bug bounty program.

Learn about our Vulnerability Disclosure Policy

Visit our engineering blog for more technical deep dives

Graphic representing Dashlane's in-depth documentation on its zero-knowledge security.

Read Dashlane’s in-depth security documentation

Experience the Dashlane difference