Skip to main content
Indiana Wesleyan University Support Knowledge Base

Keeper Security Password Vault - IWU Employees

Summary

The IWU Information Security Office (ISO) has contracted with cloud security vendor, Keeper Security, to host all system and application passwords.   Keeper is not meant for general use but employees who steward multiple privileged account passwords.

To request a KeeperSecurity account please email IWU-ITSecurity@indwes.edu.   Upon approval you will receive an invite email from the KeeperSecurity app as shown below.
 



After you receive the email you can click on the 'Set Up Your Account Now' to begin the process.  Please ensure you follow the Preparation and Logging Into Keeper & Set-Up sections below.

Preparing for your Keeper Account (MFA)

Multi-factor authentication (MFA) has been enabled as a requirement to access the vault.   Please ensure you have Microsoft Authenticator downloaded to your mobile phone so that you can configure MFA at the appointed step below.  

To download the app for your smart phone go to either the Google Store, Apple App store or Microsoft store depending on your phone type. 

 

Logging into Keeper & Set-Up Steps

After you click on  the 'Set Up Your Account Now' button in the invite email it will redirect you to begin the process by setting up a master password. 

Click Next under your email address.  If your email address is not present please enter it first.

You will then be prompted to enter a password.  

The password must follow the complexity requirements below: (similar to your IWU password but longer). This password must be unique and not match your IWU credentials.

  • 16 characters long
  • (1) upper-case letter
  • (1) lower-case letter
  • (1) special character
  • (1) number



Setting up Multi-Factor Authentication

  1. After you enter your password and confirm it successfully you will be prompted with a notification to set up Multi-Factor Authentication (MFA).  Click OK to proceed.
     
  2. Toggle the slider next to Authenticator App and be prepared to use your Microsoft Authenticator to set up the MFA.
     
  3. Click Next to proceed [below]

  4. After clicking next a QR code will appear. (image below)
     
  5. Open your Microsoft Authenticator app.
     
  6. Click the '+' in the upper right hand corner of the app
     
  7. Select 'Work or School Account'
     
  8. A pop up on your phone will appear - Select 'Scan QR Code'
     
  9. Your camera will be activated - proceed to line up the camera over the code below on your screen [not the one below but the one presented to you in Keeper]
     
  10.  Once scanned Microsoft Authenticator will add a new item called Keeper at the bottom of the app.  Find the 6 digit code that is generated at that entry and enter it in the Verification Code box below.



After successfully inputting the code above and clicking 'Next' a box will appear (image below) with a series of codes.  These codes can be used if you lose your password so it is critical you copy these down, or cut/paste into a file you can recover.  

At the prompt below Accept.  This will allow us to transfer any data to another party in case your account is compromised or we need to recover if you do not have your password and cannot recover your account on your own.  The admins 'cannot' recover passwords.

You will prompted then to copy down a recovery phrase that can assist you if you cannot get into your account.  Please download this file or copy the data as shown below.

Additional Tools (Browser Extension Use)

Like most password managers, Keeper Security has browser extensions to assist in auto-populating credentials for sites/services used on a reoccurring basis. 

Installs for the various extensions can be found here:

Note:  We have noticed via testing that a few sites function oddly with the auto-populate feature so be aware.  Your admin can further explain.  The auto populate feature can be turned off temporarily by deselecting DISPLAY LOCK in your browser extension.

The application can also be downloaded to your mobile device via the Google Play store or Apple app store.
    

Next Steps

Ownership and Administration
Each IWU business group has a designated vault administrator responsible for maintaining all passwords for their respective areas. 

  • Keeper Security Global Admin - Michael Madl 

Team Admins

  • Data Center and Networking  - Matthew Huskey
  • Enterprise Applications - Josh Hall, Stephen Swan
  • IT Support Center - Paul DeLavergne
  • Marketing - Aaron Cawthorn
  • Health Center - Karen Aaron
  • Alumni - Joel Hunt
  • Business Affairs - Tiffany Lewis, Liz Clark
  • OAI - Mike Truong
     

Shared and Personal Vaults in Keeper Security

Admins have been granted early access to Keeper Security, so you may already see records in your shared folder. Any records created within a shared folder are visible to all team members with access to that folder. Your admin will provide a walkthrough during team meetings to discuss their approach to managing team folders.

When creating a new record, you can choose to store it in either:

  • The shared team folder – Accessible to all authorized team members.
  • Your personal vault – Private and only visible to you. This is ideal for storing personal IWU credentials, third-party support site logins, and other sensitive records you prefer to keep secure.
     

General Information and Restrictions

IWU will use Keeper Security as the centralized, secure repository for all IWU system passwords, service account credentials, and shared system email accounts.
To maintain security and consistency, all other password storage methods—including spreadsheets, third-party on-prem apps (e.g., KeePass), or external cloud-based managers (e.g., LastPass)—must be discontinued.
 

Support/Training Material

The application is fairly self explanatory but more advanced features like sharing and transferring ownership are more thoroughly detailed out in the following reference guide:

Keeper Security User Reference Guide

Please refer to this guide for additional questions on use or contact your Team Admin or the ISO. 

 

 

 

 

  • Was this article helpful?