How it works
Security
Vault Access
By:
Léon van Leeuwen
Last updated:
December 3, 2025
You've filled your Veault with what's important to you: documents, passwords, personal messages, and digital files. That brings peace of mind because everything about your digital legacy is safely in one place. But what if your loved ones need that information at a time when you can no longer handle it yourself?
Veault Access offers a secure solution. It allows you to designate one or more trusted individuals who can later access your encrypted vault, while you maintain full control.
Imagine this: your loved ones urgently need access to your Veault, but you are no longer there to help. With Veault Access, there’s a clear, reliable path for them — and for you as the owner.
What is Veault Access?
Veault Access is a built-in feature that lets you appoint one or more trusted individuals. These are people you trust (like a partner, child, or good friend) who can access your Vault in an emergency.
The unique aspect of this system is the balance between security, user-friendliness, and control. You're not handing over your keys directly. Instead, you set up a process that only kicks in when it’s truly needed. As long as you have control, your vault remains closed to everyone else.
A trusted individual is someone you designate to access your Veault in an emergency. This is not permanent access; your vault remains closed as long as you are alive or no emergency has been identified.
Why Veault Access is better than sharing a password:
Your password stays secret: You don't have to share your vault password with anyone.
Full control: You can cancel any request as long as the release procedure is still ongoing.
Secure procedure: Access is only granted after a verified process with dual authentication.
Traceable: Each step is recorded and transparent for both you and your trusted individual.
In short, directly sharing your vault password with loved ones is an option, but Veault Access is safer, more reliable, and simpler. It provides peace of mind for you and clear instructions for your heirs.
How does the process work?
The system is designed so that your data remains encrypted until the moment of release. Here's how it works step by step.
1. You appoint a trusted individual
Through your Veault dashboard, you invite someone. You decide under what conditions this person may gain access later.
2. The Access Document
After inviting your trusted individual, the system generates a special access document (a PDF). This is literally and figuratively the key to the process. It includes:
A unique secret key in the form of a QR code and a sequence of letters.
Instructions for the trusted individual.
It is crucial that your trusted individual keeps this document safe. Without this document, access is impossible. If your trusted individual loses this document, you can always generate a new key for them, and the old key will automatically be invalidated.
3. Requesting Access
If something happens, the trusted individual can submit an access request through a special page. Two things are required: the access document and a verification code sent via email to the trusted individual.
4. The Release (With Built-in Security)
As soon as someone tries to access your vault, you, as the owner, receive an immediate notification. Depending on the policy you've chosen, a security step follows:
Automatic release (with waiting period): A waiting period, for example, 7 days, begins. If you are still alive and the request is unwarranted, you can simply cancel the request during this period. If the system hears nothing from you, the release takes place.
Release after verification of death certificate: Here, the trusted individual must upload an official death certificate and a copy of their ID. Veault's support team manually verifies these documents before access is granted.
5. Unlocking
After the release, the trusted individual can finally unlock your Veault and securely download the contents.
The benefits of Veault Access
The main advantage of this feature is that you are prepared for the unexpected without compromising your daily security.
You stay in control: Because you can cancel the request during the waiting period, you don’t have to worry about someone snooping into your data without you knowing. Plus, you can revoke your trusted individuals' access at any time, automatically invalidating their key.
Zero-Knowledge: Just like our vault security, this process is based on 'zero-knowledge' architecture. This means Veault has no insight into the secret keys of your trusted individuals, and these keys are not stored on our servers.
No maintenance: Because the trusted individual has their own unique key, you don’t have to provide new information when changing your password. The access remains valid.
It's a comforting thought that your loved ones won't have to search for login details or documents during a difficult time. With Veault Access, everything is set for them, in a safe and respectful manner.
Already have a Veault? Setting up a trusted individual only takes a few minutes.
Blogs and articles




