I would like to highlight a security loophole in Royal TS
where credentials saved in a document can be accessed or used without password
protection or encryption. We are aware that we can have a registry key
configured to require a password when creating a credential in a document—which
is a good security measure— However, there is a security concern in the
following scenario. If a user sets a password, creates a credential, and then
removes the password (encryption) afterward, the credential remains accessible
without requiring a password. This exposes all stored credentials.
Unfortunately, as currently implemented, lockdown does not fully
address our concern: a user who knows (and has write permission for) the
original document password can still remove that password and save the document
unencrypted, exposing all stored credentials. Lockdown merely limits who
can view or edit credentials once it’s
active, but it does not prevent the act of disabling encryption itself.
To close this gap, we’d like to propose adding an administrative policy (for
example, a registry key or group‑policy setting) that enforces the following
behavior:
Scope: Only
applies to documents that contain one or more credential objects.
Behavior: When
the policy is enabled, any attempt to remove or disable the document
password on a credentials‑bearing document is blocked and the change cannot be
saved.
Exclusion: Documents
without credential objects remain unaffected—you won’t force users to set
a password on non‑sensitive files.
For instance, a registry setting could look like below:
“PolicyDoNotAllowRemovePasswordInDocumentsWithCredentialObjects”=“True”
under [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RoyalApps\RoyalTS\Default\RoyalApplicationSetting]
When set to True, trying to clear the
password/encryption on a document that stores credentials would produce an
error such as:
“This document contains credential entries and mustremain encrypted. Password removal is disabled by policy.”
This approach****ensures that no document
containing sensitive data is ever left unencrypted**,** while
maintaining a frictionless experience for ordinary, non-credential files. Weare aware of the registry key that enforces password protection on alldocuments; however, if a document does not contain credentials, it does notrequire enforced password protection.
Could your team consider implementing such a policy in a future update? We
believe it would comprehensively close the loophole without over‑restricting
users.
Thanks for considering this enhancement—happy to discuss
further!
Kind regards,
Armin