Skip to main content

Overview

PassAgent can import your existing credentials from other password managers. All imported passwords are encrypted client-side with your vault key before being sent to the server — the same zero-trust model used for manually created entries.

Supported sources

SourceExport formatNotes
ChromeCSVExport from chrome://settings/passwords
1PasswordCSVExport from 1Password desktop app
LastPassCSVExport from LastPass vault settings
BitwardenJSON or CSVExport from Bitwarden web vault
DashlaneCSVExport from Dashlane settings
GenericCSVAny CSV with name, url, username, password headers

Import process

1

Export from your current manager

Follow your current password manager’s export instructions to download a CSV or JSON file.
Export files contain plaintext passwords. Delete the export file from your computer after importing.
2

Open the import tool

Navigate to Dashboard > Settings > Import and select your source format.
3

Upload your file

Select or drag-and-drop your export file. PassAgent parses the file client-side — the raw file is never uploaded to the server.
4

Review and confirm

Preview the parsed entries. You can deselect entries you don’t want to import.
5

Import

Click Import. Each entry is:
  1. Encrypted with a unique per-item key (AES-256-GCM)
  2. The item key is wrapped with your vault key
  3. Blind indexes are computed for search functionality
  4. Batch-uploaded to the server (50 entries per batch)

Limits

  • Maximum 5,000 passwords per import
  • Entries are processed in batches of 50
  • Failed batches are reported in the response without blocking the rest

Deduplication

Use the Idempotency-Key header to prevent duplicate imports if the request is retried. The key is cached for 1 hour in Redis.

After importing

After a successful import:
  1. Review your vault to verify entries imported correctly
  2. Delete the export file from your computer
  3. Consider rotating passwords for critical accounts, especially if the export file was stored unencrypted
  4. Enable 2FA on entries that support it
Use the Security Center (Dashboard > Security) to identify weak, reused, or breached passwords among your imported entries.