Deck Vault
By default, Deck encrypts and stores credentials in Deck Vault. Credentials never leave the vault except to authenticate a session, and each set is scoped to a single connection. They are never shared across users, organizations, or sources. Deck Vault is encrypted at rest and in transit. With credentials stored, you get:- Automatic re-authentication. Expired sessions recover without user involvement.
- Persistent connections. Users link their account once and it works until they revoke access.
- Zero-friction task runs. Scheduled and on-demand tasks authenticate silently.
Removing credentials
To permanently delete credentials from Deck Vault, terminate the connection:Choosing an approach
The right choice depends on how your users interact with connected sources and how sensitive the credentials are.| Deck Vault (default) | Terminate after use | |
|---|---|---|
| User experience | Link once, use indefinitely | Re-enter credentials each session |
| Session recovery | Automatic re-authentication | Requires a new connection |
| Operational overhead | Low. Deck manages the session lifecycle. | Higher. Your app handles re-linking flows. |
| Best for | Recurring tasks, long-lived integrations | One-time operations, high-sensitivity credentials |
