All articles

The road to Passbolt version 5 - Getting started with the new resource types (beta)

5 min. read

CA

Cedric Alfonsi

16 July, 2025

Getting started with the new resource types

  • Passbolt API >= version 5.3.0
  • Passbolt API self hosted
Important: Like any major upgrade, we recommend testing the new resource types first. These initial tests should only be conducted in a non-production environment to prevent potential issues.
  • Streamline administrator onboarding and guidance. Improve the first‑time experience and give administrators clearer steps for turning on the new resource types.
  • KeePass (KDBX) import and export. Add support for icons, multiple URIs, and custom fields when exchanging data with KeePass. Many community members rely on KeePass as a backup or complementary tool, so this integration is essential.
  • Fix latest performance hurdles. Most importantly we need to fix a bug in the cache system, when the cache becomes corrupted, in order for clients not to experience performance degradation.
  • Zero‑knowledge mode. Offer an option to keep metadata fully confidential and not accessible to the server, for organisations that favour confidentiality over auditability. Read more about it here.
  • Metadata key rotation. Provide an administrative mechanism for rotating the key used to encrypt shared resources metadata.
  • Cryptographic verification of metadata origin. A signature mechanism is planned to confirm who encrypted each piece of metadata. Cure53 flagged this as an outstanding risk. A mitigation is in the work, see the proposal for details.
  • Limited auditability. Organisations that rely on syslog or custom SIEM integrations will lose visibility into operations on v5 content because metadata remains encrypted.
  • Passbolt  CLI compatibility. The command‑line utility is still being updated for the new resource types. If you have automations that depend on it, consider waiting.
  • Custom integrations. Any bespoke integrations that call the API will need to handle the additional encryption layer and therefore will break if not adapted prior to the migration of the existing content. Updated SDKs are planned but not yet scheduled for release.
  1. Navigate to Administration > Metadata key.
  2. In the Shared metadata keys section, click on Generate key.
  3. Save the settings.
Important: If for some reasons this step fails, this may be because you have some issues with some users' keys. It is best to resolve these problems before moving on to the next steps. The healthcheck and datachecks commands should provide some pointers on why this is not working for your setup. Of course, you can ask for help on the community forum or [email protected] if you are a paying customer, we’ll help you sort any issue out.
  1. Navigate to Administration > Encrypted metadata.
  2. In the Support metadata section, toggle on the “Enable encrypted metadata” setting to make v5 resource types available to all users.
  3. In the Default metadata type section, enable the “Encrypted metadata” setting. This ensures that client applications (web and mobile) will create resources using the v5 format by default.
  4. In the Self served migration section, enable the “Allow users to upgrade their content” if you want all the users to be able to update their existing content manually to the new resource types and benefit from the new capabilities.
Important: If you have any custom integrations that rely on metadata such as resource names or URLs, they may stop working if you migrate to the new format. In these cases, it’s recommended to first create new v5-format secrets and update your integrations to point to them.
  1. Navigate to Administration > Migrate metadata.
  2. In Items to migrate, switch on Resource to include every resource.
  3. In Migration scope, switch on All content so resources from all users are covered.
  4. Click Migrate and wait for the process to finish. How long it takes depends on the size of your workspace.

Continue reading

Passbolt 5.3 Introduces Custom Fields and Performance Improvements

4 min. read

Passbolt 5.3 Introduces Custom Fields and Performance Improvements

Passbolt 5.3 introduces custom fields, allowing structured key-value data alongside credentials and includes performance enhancements.

Passbolt team

Passbolt team

16 July, 2025

How to Set-Up a Highly-Available Passbolt Environment

8 min. read

How to Set-Up a Highly-Available Passbolt Environment

Learn to set up a robust, highly-available Passbolt environment using Galera on Debian 12, ensuring reliable password management with minimal downtime.

LV

Louis Vallat

3 July, 2025

Flag of European UnionMade in Europe. Privacy by default.