APM Documentation¶
APM is a Go-based password manager with two binaries:
pmfor personal vaultspm-teamfor shared organizational vaults
The source tree implements more than a basic password CLI. It includes sessions, recovery, cloud sync, plugins, MCP access, Windows autofill, shell injection, and a TUI alongside the core encrypted vault.
What APM currently does¶
- Stores 25 personal secret types in one encrypted vault.
- Uses explicit unlock sessions with expiry and inactivity controls.
- Supports delegated ephemeral sessions for automation and AI-agent access.
- Syncs encrypted vault blobs to Google Drive, GitHub, and Dropbox.
- Exposes a built-in MCP server with scoped tokens and mutation previews.
- Runs a manifest-based plugin system with hooks and runtime-added commands.
- Offers Windows autofill and autocomplete support plus shell-side secret injection.
- Provides a separate team edition with departments, approvals, roles, and shared entries.
Quick start¶
Team edition:
Documentation map¶
Getting Started¶
Guides¶
- Vault management
- Cloud synchronization
- Using
.apmignore - Injecting secrets into your shell
- Generating TOTP codes
- Managing sessions
- Using plugins
- MCP integration
- Team edition
- Import and export
- Windows autofill
Concepts¶
- Architecture
- Encryption
- Vault format
- Secret types
- Security profiles
- Policy engine
- Sessions
- Cloud sync
- Plugins
- MCP
- Recovery
Reference¶
Team¶
Important implementation notes¶
- The current personal vault format is
APMVAULTv4. - Built-in profiles are
standard,hardened,paranoid, andlegacy. - Personal
pm addsupports 25 entry types; teampm-team addcurrently supports 22 shared entry types. - Plugin commands can extend the
pmcommand surface at runtime.