Private keys stay local
The key that unwraps secret material stays with the browser, app, or runtime.
R4 is designed so identity, policy, auditability, and encrypted delivery can live in the control plane without making the control plane the place where plaintext secrets must live.
The key that unwraps secret material stays with the browser, app, or runtime.
R4 stores encrypted values, wrapped DEKs, and signed metadata instead of plaintext.
Sessions, AGENT API keys, shares, projects, and security groups scope who can request data.
Clients check trust metadata before they accept and decrypt a payload.
These materials are meant to remain with the browser, app, or runtime that needs the secret.
Private RSA key material
Unwrapped vault DEK
Plaintext secret at the moment of use
The control plane still handles identity, policy, storage, and delivery of encrypted material.
Authenticate users and runtimes
Resolve scoped permissions
Store ciphertext, wrapped keys, checkpoints, and audit events
A human signs in normally, or a runtime uses an AGENT API key with explicit permissions.
R4 checks scoped access before returning encrypted material.
The client receives ciphertext, wrapped key material, and trust metadata.
The browser, app, CLI, or SDK verifies the payload and decrypts it locally.
The platform still matters for identity, policy, auditability, and encrypted delivery. The final decryption authority stays with the device or runtime that owns the private key.