Skip to content

Feature Request: Persist Local Vault Secrets Per Account Instead of Deleting on Logout #14025

@PauloSantos-JalaSoft

Description

@PauloSantos-JalaSoft

Is there an existing request for this feature?

  • I have searched the existing issues for this feature request and I know that duplicates will be closed

Is your feature request related to a problem?

Yes.

Postman currently deletes all secrets stored in the local vault when a user signs out of the application. This behavior appears intentional and is documented, but it creates significant friction for developers who legitimately switch between multiple Postman accounts on the same workstation.

A typical workflow looks like this:

  1. Log into Postman
  2. Create secrets in the local vault
  3. Sign out (for example due to switching organizations or accounts)
  4. Sign back in
  5. The vault is empty and all secrets must be recreated

This becomes especially problematic when developers:

  • Switch between corporate and personal Postman accounts
  • Work with multiple organizations
  • Must log out due to SSO or credential refresh policies

This behavior has also been observed by other users (see related discussions such as Issue #13361: "Postman vault empty after Sign Out and Sign In").

Because vault contents are destroyed on logout, users are forced to repeatedly recreate secrets or rely on temporary external storage, which defeats part of the purpose of the vault.

Describe the solution you'd like

Instead of deleting vault contents on logout, Postman could maintain separate encrypted local vaults per Postman account on the same machine.

Under this model:

  • Each Postman account would have its own encrypted local vault
  • When a user logs in, Postman automatically loads the vault associated with that account
  • Logging out does not delete the vault; it simply unmounts it
  • Logging back into the same account restores the vault

Example behavior:

Current behavior:

  1. Login with Account A
  2. Create vault secrets
  3. Logout
  4. Login again
  5. Vault is empty

Proposed behavior:

  1. Login with Account A → Vault A loads
  2. Logout
  3. Login with Account B → Vault B loads
  4. Login again with Account A → Vault A is restored

Each vault would remain completely isolated and encrypted locally.

This preserves the security model while improving usability for multi-account workflows.

Describe alternatives you've considered

Current alternatives are limited and inconvenient:

  • Re-enter all vault secrets every time a logout occurs
  • Store secrets temporarily outside Postman
  • Export and re-import vault data manually

There is also a related feature request (Issue #13317) proposing vault export/import, which could help mitigate the issue but still requires manual steps and does not solve the root workflow friction.

Maintaining separate local vaults per account would eliminate the need for these workarounds.

Additional context

This request is not intended to weaken Postman's security model.

Suggested safeguards could include:

  • Vaults remain locally encrypted
  • Vaults are strictly scoped to a specific Postman account
  • No cross-account access to vault contents
  • Optional auto-lock after inactivity
  • Optional enterprise policy allowing administrators to enforce the current delete-on-logout behavior

In other words, the current behavior could remain the default or enterprise-enforced option, while developers working on trusted machines could benefit from account-scoped vault persistence.

Treating the vault as a locally encrypted resource attached to both the device and the active Postman account would better reflect real-world development workflows while preserving the intended security boundaries.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions