Skip to main content
Skip table of contents

Secure Notes

Overview

Secure Notes is a secure vault within the Nexus platform designed for storing sensitive information such as passwords, API keys, credentials, and other confidential data. This feature provides enterprise-level security for your organization's most critical information, functioning as an integrated credential management system within Nexus.

This guide provides comprehensive instructions for using Secure Notes effectively and securely.


Getting Started

How to Access Secure Notes

  1. Log into Nexus

  2. Navigate to the left-side navigation menu and hover over Settings

  3. Click on Secure Notes from the submenu that appears

You will now see your Secure Notes dashboard.

image-20251205-175138.png

Nexus - Secure Notes Dashboard

Access Permissions

Access to Secure Notes is restricted to authorized users only. If the Secure Notes option does not appear in your Settings menu, contact your administrator to request access.

Updated Access Model

Initially, only Account Admin members will have access to Secure Notes. Admin members may grant these permissions to other roles as needed.

Secure Notes Permissions

The following permissions are used to control Secure Notes capabilities:

Permission

Description

View Secure Notes List

View the list of all Secure Notes

View Secure Note Details

View the contents of a specific Secure Note

Create Secure Note

Create new Secure Notes

Update Secure Note information

Edit existing Secure Notes

Delete Secure Note

Delete Secure Notes

Reveal Secure Note

Reveal the hidden credentials in a Secure Note


Understanding Your Secure Notes Dashboard

Upon opening Secure Notes, you will see an organized table view displaying all accessible notes. The following sections explain the dashboard components.

Filter Tools

Two filter options are available at the top of the Secure Notes page to help you locate specific notes efficiently:

Filter

Function

Usage

Search Box

Searches notes by name or description

Enter keywords to filter your list (e.g., AWS, database, production)

Ownership Filter

Filters by creator

Select All, Account Member (your organization), or Armor Support (Armor team)

Understanding the Ownership Filter

The Ownership filter is particularly useful when Armor Support creates secure notes on your behalf containing important credentials or configuration details. This filter enables you to distinguish between notes created by your team and those created by Armor Support.


Secure Notes Table Structure

Your secure notes are displayed in a table with five columns:

Column

Information Displayed

Guidelines and Details

Name

The title of the secure note

Use descriptive names such as Production Database Password or AWS Root Account Credentials

Description

A summary of the note's purpose

Critical: Never include sensitive data in this field. It is not encrypted and is visible to all users who can see the note list.

Owner

The creator of the note

Displays either Account Member (your organization) or Armor Support (Armor team)

Created On

Date and time of creation

Useful for tracking credential age and determining when rotation may be needed

Access

Users authorized to view the note's contents

Visibility in the list does not guarantee access to note details. Permissions are controlled individually

Description Field Guidelines

The description field should help identify notes without revealing sensitive information. Consider it a reference label rather than a secure storage location.

Appropriate Description Examples

Inappropriate Description Examples

Login credentials for the production environment

Password is Admin123!

API keys for the billing system integration

API key: sk_live_12345...

SSH keys for server access

Any actual passwords, keys, or sensitive data

Database connection string for reporting server

Username: admin, Password: secret


Viewing Secure Note Details

Step-by-Step: Accessing and Viewing Credentials

  1. Click on any note in the table. A detailed view window will open displaying the note's information.

  2. Click the Show Credentials button. The hidden sensitive information will become visible in the credentials field.

  3. View or copy your credentials. You can also use the Copy All Credentials button to copy everything in the credentials field.

Updated Editing Behavior

Secure Notes cannot be edited unless you first choose Reveal Credentials.

  • When credentials are hidden, Secure Note fields are read-only.

  • After you click Reveal Credentials, and if you have the required permission, the Secure Note fields become editable.

This requirement ensures that any update to sensitive information is deliberate and performed with full awareness of the revealed data.

image-20251205-175232.png

Nexus - Secure Note Detail

Key Features for Credential Management

Feature

Purpose

How It Helps

Auto Hide Security Feature

Automatically hides credentials after a short period

Reduces risk of exposure if you step away

Copy All Credentials

Copies all credential content in a single action

Ensures quick and accurate transfer into approved tools

Activity Logging

Records Create, Update, Delete, and Reveal actions

Provides an audit trail for compliance and security monitoring

Auto Hide Security Feature

Credentials auto hide after a short interval.
Click Show Credentials again to reveal them.

Using Copy All Credentials Safely

When you click Copy All Credentials, the entire contents of the credentials field are copied to your clipboard.

Best Practices

Security Risks to Avoid

Ensure you are in a secure environment before copying

Copying credentials in shared or public spaces

Paste immediately into the intended secure application

Leaving sensitive data in the clipboard for extended periods

Clear clipboard after use when possible

Accidentally pasting credentials into chats or documents

Be aware of screen visibility

Screen sharing or shoulder surfing


Best Practices

Creating and Organizing Notes

Best Practice

Rationale

Example

Use clear, descriptive names

Ensures easy identification over time

AWS Prod Root Account

Write descriptions without sensitive data

Allows users to identify notes safely

SSH keys for web servers

Review notes regularly

Identifies outdated or unnecessary credentials

Quarterly credential audits

Security Best Practices

Security Measure

Importance

Close notes immediately after use

Prevents unauthorized viewing

Never share Nexus login credentials

Ensures each user maintains accountability

Maintain situational awareness

Prevents visual exposure of credentials

Track credential age

Supports credential rotation schedules


Activity Tracking

Nexus logs Secure Notes activity under Settings > Activity.

Logged actions include:

  • Create

  • Update

  • Delete

  • Reveal

Each entry includes timestamp and user details to maintain strong oversight and security.


Troubleshooting

Issue

Explanation

Resolution

Cannot locate Secure Notes

Access not granted

Contact your administrator

Can see a note but cannot open it

Insufficient permissions

Contact the note owner for access

Credentials disappeared while viewing

Auto hide activated

Click Show Credentials again

Cannot filter or search notes

Active filter might be applied

Clear filter or refresh


User Roles and Access Levels

User Type

Visibility

Capabilities

Account Member (Your Organization)

Notes with granted access, plus list view of all notes

Create, view, and manage notes based on assigned permissions

Armor Support (Armor Team)

Internal view

Create notes on your behalf, provide support credentials and configurations


Support Contacts

For Assistance With

Contact

Access permissions and user roles

Your organization's Nexus administrator

Technical issues or feature questions

Armor Support

Adding users to Secure Notes

Your organization's Nexus administrator

Security concerns or suspicious activity

Armor Support immediately


Key Reminders

Important Considerations

Rationale

Never include sensitive data in the Description field

This field is not encrypted

Utilize auto hide

Protects credentials if left idle

Use Copy All Credentials with caution

Clipboard contains sensitive data until overwritten

Always close notes after use

Prevents unauthorized access

List visibility does not equal credential access

Permissions determine access to note contents


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.