You can transfer access to VPNs, password managers, 2FA systems, and self-hosted security tools by documenting credentials, enabling emergency access features, provisioning SSH keys, and creating management runbooks for family members. This guide covers technical steps for preparing WireGuard configurations, Bitwarden/1Password/KeePassXC vaults, TOTP seeds, YubiKey backup registration, and self-hosted infrastructure access—ensuring continuity and security when family members need to take over.
Documenting VPN Access
When preparing VPN credentials for transfer, you need to consider whether you’re using a commercial VPN service or a self-hosted solution like WireGuard, OpenVPN, or Outline.
Commercial VPN Services
For commercial VPNs like Mullvad, Proton VPN, or IVPN, the account credentials are typically tied to an email address and payment method. Document the following:
- Email address used for the VPN account
- Account ID or username
- Payment method on file (for renewal purposes)
- Subscription status and renewal date
Most modern privacy-focused VPNs support account recovery through email. Make sure your family member knows which email address receives the VPN invoices and account communications.
Self-Hosted WireGuard Configurations
If you run your own WireGuard VPN on a VPS, the configuration is more complex. Each WireGuard client needs a private key and corresponding public key registered on the server. Here’s how to export and document a client configuration:
# On the WireGuard server, list active peers
sudo wg show wg0 peers
# Export a specific client's configuration
sudo wg show wg0 peer <public-key>
Create a configuration file for your family member:
# family-member-vpn.conf
[Interface]
PrivateKey = <your-family-members-private-key>
Address = 10.0.0.5/24
DNS = 1.1.1.1
[Peer]
PublicKey = <servers-public-key>
Endpoint = your-vpn-server.com:51820
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25
Store this configuration securely—preferably in a password manager or encrypted storage that your family member can access.
Password Manager Emergency Access
Most password managers have built-in emergency access or vault inheritance features. This is the single most important security tool to prepare for transfer.
Bitwarden Emergency Access
Bitwarden offers a native emergency access feature. Your designated family member can request access to your vault, and you’ll have a waiting period (you configure 1-7 days) to deny the request before automatic release:
# Bitwarden CLI command to set up emergency access (requires web vault for initial setup)
# In the web vault:
# 1. Go to Settings > Emergency Access
# 2. Enter your family member's Bitwarden email
# 3. Set the waiting period (recommended: 3-7 days)
# 4. Confirm the invitation
The family member must also have a Bitwarden account and enable emergency access from their own account settings.
KeePassXC Database Transfer
For KeePassXC users, the database file itself needs to be transferred along with the master password. Unlike cloud-based managers, KeePassXC offers no automatic inheritance mechanism. You’ll need to:
- Store the KeePassXC database file in a secure, accessible location (encrypted USB drive, safe deposit box, or encrypted cloud storage)
- Document the master password separately—ideally in a sealed envelope or with an attorney
- Consider splitting the password using Shamir’s Secret Sharing if you want multiple family members to collaborate on access
1Password Families
1Password offers a built-in families plan where you can add family members directly. They inherit access to shared vaults automatically. If you’re on an individual plan, convert to a families plan and add your family member as an adult member:
# 1Password Families structure:
- Family Organizer (you): Full access, can manage other members
- Adult Member (family member): Access to shared vaults
- Optional: Children can have restricted access
Two-Factor Authentication Backup Transfer
2FA is critical for security, but it creates a single point of failure if not properly documented. When transferring 2FA access, you have several options depending on the authenticator app used.
TOTP Seed Transfer
Time-based one-time passwords (TOTP) are generated from a shared secret seed. If your family member needs to receive codes from the same accounts, you must transfer the TOTP seeds, not just the screenshots of QR codes.
# Extract TOTP seeds from various authenticator apps
# For andotp (Android):
# Export encrypted backup, decrypt with your password
# Seeds are stored in JSON format
# For 2FAS (iOS/Android):
# Export to JSON, look for "secret" fields
Document each TOTP seed in a structured format:
{
"service": "GitHub",
"account": "your-email@example.com",
"totp_seed": "JBSWY3DPEHPK3PXP",
"issuer": "GitHub",
"algorithm": "SHA1",
"digits": 6,
"period": 30
}
Store this file encrypted, separate from where you store the decryption key.
YubiKey Configuration
If you use hardware security keys like YubiKeys for 2FA, you need to register a second key with your accounts. Not all services support multiple security keys, but many do:
- GitHub: Settings > Security > Security keys > Add
- Google: Settings > Security > How you sign in > 2-Step Verification > Add security key
- Password managers: Most support multiple hardware tokens
Register a backup YubiKey to your important accounts and document its location separately from your primary key.
Self-Hosted Security Tools
If you run security tools on your own infrastructure—Pi-hole for DNS filtering, a self-hosted VPN, or a firewall configuration—document the administrative access thoroughly.
SSH Key Administration
For servers accessed via SSH, ensure your family member has their own SSH key provisioned:
# Generate a new SSH key for your family member
ssh-keygen -t ed25519 -C "family-member@email.com"
# Add their public key to the server
ssh-copy-id -i ~/.ssh/family_member_key.pub user@your-server.com
# On the server, restrict their key to specific commands if needed
# In ~/.ssh/authorized_keys:
command="/usr/bin/sudo /usr/bin/systemctl status vpn-service",no-agent-forwarding,no-port-forwarding ssh-ed25519 AAAA...
Firewall and VPN Server Documentation
Create a runbook for your family member that includes:
#!/bin/bash
# family-vpn-management.sh
# Common commands for managing the family VPN
# Check VPN service status
sudo systemctl status wg-quick@wg0
# View active connections
sudo wg show
# Restart the VPN service
sudo systemctl restart wg-quick@wg0
# Check firewall rules
sudo iptables -L -n -v
# View recent connection logs
sudo journalctl -u wg-quick@wg0 -n 50 --no-pager
Store this runbook alongside your other documentation, and walk your family member through the basics before they need to use it.
Structured Credential Handoff
Rather than scattering credentials across password managers, text files, and USB drives, create a structured handoff document. Use age-encryption or GPG to encrypt the document, then store it in a location your family member can access:
# Encrypt credentials using age (modern GPG alternative)
age -p -o credentials.age <<EOF
VPN Configuration:
- Server: vpn.yourdomain.com
- Username: admin
- WireGuard Config: See attached file
Password Manager:
- Service: Bitwarden
- Emergency Contact: family-member@email.com
2FA Backup:
- TOTP Seeds: See encrypted seeds.json
- Backup YubiKey: Safe deposit box, Box #3
Server Access:
- SSH Key Location: USB drive in filing cabinet
- Management Script: See family-vpn-management.sh
EOF
Testing the Handoff
Before you need the transfer to work, test it. Have your family member attempt to:
- Log into the password manager using emergency access
- Connect to the VPN using the documented configuration
- Access one server via SSH using their provisioned key
- Generate a TOTP code from the transferred seed
Document any friction points and refine your documentation accordingly. The goal is a smooth transition when it becomes necessary.
Related Articles
- Vpn Authentication Methods Compared Certificate Vs.
- VPN Provider Annual Audit Results: Independent Security.
- Vpn Shared Ip Vs Dedicated Ip Privacy Security Tradeoffs Exp
- How To Create Sealed Envelope With Digital Credentials For E
- Set Up a Dead Man’s Switch Email That Sends Credentials If
Built by theluckystrike — More at zovo.one