A Flutter plugin to securely store sensitive data in a key-value pair format using platform-specific secure storage solutions. It supports Android, iOS, macOS, Windows, and Linux.
- Secure Data Storage: Uses Keychain for iOS/macOS, custom secure ciphers with optional biometric authentication for Android, and platform-specific secure mechanisms for Windows, Linux, and Web.
- Encryption: Encrypts data before storing it using platform-specific encryption (RSA OAEP + AES-GCM on Android by default).
- Cross-Platform: Works seamlessly across Android, iOS, macOS, Windows, Linux, and Web.
- Biometric Authentication: Optional biometric authentication support on Android (API 23+) and iOS/macOS.
- Customizable Options: Configure encryption algorithms, accessibility attributes, biometric requirements, and more.
Version 10.0.0 introduces a major security update with custom cipher implementations. The deprecated Jetpack Security library's encryptedSharedPreferences is no longer recommended.
Key Changes:
- New default ciphers: RSA OAEP (key cipher) + AES-GCM (storage cipher)
- New
AndroidOptions()andAndroidOptions.biometric()constructors - Automatic migration from old ciphers via
migrateOnAlgorithmChange(enabled by default) - Minimum Android SDK is now 23 (Android 6.0+)
- Enhanced biometric authentication with graceful degradation
flutter_secure_storage only works on HTTPS or localhost environments. Please see this issue for more information.
If not present already, please call WidgetsFlutterBinding.ensureInitialized() in your main before you do anything with the MethodChannel. Please see this issue for more info.
Add the dependency in your pubspec.yaml file:
dependencies:
flutter_secure_storage: ^<latest_version>
Then run:
flutter pub get
import 'package:flutter_secure_storage/flutter_secure_storage.dart';
// Default secure storage - Uses RSA OAEP + AES-GCM (recommended)
final storage = FlutterSecureStorage();
// Or with explicit Android options
final storage = FlutterSecureStorage(
aOptions: AndroidOptions(),
);
// Biometric storage with graceful degradation
final storage = FlutterSecureStorage(
aOptions: AndroidOptions.biometric(
enforceBiometrics: false, // Works without biometrics
biometricPromptTitle: 'Authenticate to access data',
),
);
// Strict biometric enforcement (requires device security)
final storage = FlutterSecureStorage(
aOptions: AndroidOptions.biometric(
enforceBiometrics: true, // Requires biometric/PIN/pattern
biometricPromptTitle: 'Authentication Required',
),
);await storage.write(key: 'username', value: 'flutter_user');
String? username = await storage.read(key: 'username');
await storage.delete(key: 'username');
await storage.deleteAll();
bool containsKey = await storage.containsKey(key: 'username');
Each platform provides its own set of configuration options to tailor secure storage behavior. For example, on iOS, the IOSOptions class includes an accessibility option that determines when the app can access secure values stored in the Keychain.
The accessibility option allows you to specify conditions under which secure values are accessible. For instance:
first_unlock: Enables access to secure values after the device is unlocked for the first time after a reboot.first_unlock_this_device: Allows access to secure values only after the device is unlocked for the first time since installation on this device.unlocked(default): Values are accessible only when the device is unlocked.
Here’s an example of configuring the accessibility option on iOS:
final options = IOSOptions(accessibility: KeychainAccessibility.first_unlock);
await storage.write(key: key, value: value, iOptions: options);By setting accessibility, you can control when secure values are accessible, enhancing security and usability for your app on iOS. Similar platform-specific options are available for other platforms as well.
Note By default Android backups data on Google Drive. It can cause exception java.security.InvalidKeyException: Failed to unwrap key.
You need to:
- Disable autobackup, details
- Exclude sharedprefs used by
FlutterSecureStorage, details
Add the following to your android/app/src/main/AndroidManifest.xml:
<application
android:allowBackup="false"
...>
</application>Version 10 introduces new cipher options and biometric support. Choose the configuration that fits your security requirements:
| Constructor | Key Cipher | Storage Cipher | Biometric Support | Description |
|---|---|---|---|---|
AndroidOptions() |
RSA/ECB/OAEPWithSHA-256AndMGF1Padding | AES/GCM/NoPadding | No | Default. Standard secure storage with RSA OAEP key wrapping. Strong authenticated encryption without biometrics. Recommended for most use cases. |
AndroidOptions.biometric(enforceBiometrics: false) |
AES/GCM/NoPadding | AES/GCM/NoPadding | Optional | KeyStore-based with optional biometric authentication. Gracefully degrades if biometrics unavailable. |
AndroidOptions.biometric(enforceBiometrics: true) |
AES/GCM/NoPadding | AES/GCM/NoPadding | Required | KeyStore-based requiring biometric/PIN authentication. Throws error if device security not available. Requires API 28+ for biometric enforcement. |
For advanced users, all combinations below are supported using the AndroidOptions() constructor with custom parameters:
| Key Cipher Algorithm | Storage Cipher Algorithm | Implementation | Biometric Support |
|---|---|---|---|
RSA_ECB_PKCS1Padding |
AES_CBC_PKCS7Padding |
RSA-wrapped AES | No |
RSA_ECB_PKCS1Padding |
AES_GCM_NoPadding |
RSA-wrapped AES | No |
RSA_ECB_OAEPwithSHA_256andMGF1Padding |
AES_CBC_PKCS7Padding |
RSA-wrapped AES | No |
RSA_ECB_OAEPwithSHA_256andMGF1Padding |
AES_GCM_NoPadding |
RSA-wrapped AES | No |
AES_GCM_NoPadding |
AES_CBC_PKCS7Padding |
KeyStore AES | Optional (via enforceBiometrics) |
AES_GCM_NoPadding |
AES_GCM_NoPadding |
KeyStore AES | Optional (via enforceBiometrics) |
Notes:
- RSA key ciphers wrap the AES encryption key with RSA. No biometric support.
- AES key cipher stores the key directly in Android KeyStore. Supports optional biometric authentication.
enforceBiometricsparameter (default:false):false: Gracefully degrades if biometrics unavailabletrue: Strictly requires device security (PIN/pattern/biometric), throws exception if unavailable
Flutter Secure Storage supports biometric authentication (fingerprint, face recognition, etc.) on Android API 23+.
To use biometric authentication, add the following permission to your android/app/src/main/AndroidManifest.xml:
<uses-permission android:name="android.permission.USE_BIOMETRIC"/>For devices running Android 9.0 (API 28) and above, USE_BIOMETRIC is the recommended permission.
For backward compatibility with devices running Android 6.0 - 8.1 (API 23-27), you may also need:
<uses-permission android:name="android.permission.USE_FINGERPRINT"/>You can enable biometric authentication using the AndroidOptions.biometric() constructor:
// Optional biometric authentication (graceful degradation)
final storage = FlutterSecureStorage(
aOptions: AndroidOptions.biometric(
enforceBiometrics: false, // Default - works without biometrics
biometricPromptTitle: 'Unlock to access your data',
biometricPromptSubtitle: 'Use fingerprint or face unlock',
),
);
// Strict biometric enforcement (requires device security)
final storage = FlutterSecureStorage(
aOptions: AndroidOptions.biometric(
enforceBiometrics: true, // Requires biometric/PIN/pattern
biometricPromptTitle: 'Biometric authentication required',
),
);Note: When enforceBiometrics: true, the app will throw an exception if the device has no PIN, pattern, password, or biometric enrolled.
- API Level: Android 6.0 (API 23) minimum for basic encryption
- API Level: Android 9.0 (API 28) minimum for enforced biometric authentication
- Device Security: Device must have a PIN, pattern, password, or biometric enrolled (when using
enforceBiometrics: true) - Permissions:
USE_BIOMETRICpermission in AndroidManifest.xml
Version 10 automatically migrates data from older cipher algorithms when migrateOnAlgorithmChange: true (enabled by default). If you were using encryptedSharedPreferences in version 9, the data will be automatically migrated to the new cipher implementation.
To disable automatic migration:
final storage = FlutterSecureStorage(
aOptions: AndroidOptions(
migrateOnAlgorithmChange: false,
),
);You also need to add Keychain Sharing as capability to your macOS runner. To achieve this, please add the following in both your macos/Runner/DebugProfile.entitlements and macos/Runner/Release.entitlements for macOS or for iOS ios/Runner/DebugProfile.entitlements and ios/Runner/Release.entitlements.
<key>keychain-access-groups</key>
<array/>
If you have set your application up to use App Groups then you will need to add the name of the App Group to the keychain-access-groups argument above. Failure to do so will result in values appearing to be written successfully but never actually being written at all. For example if your app has an App Group named "aoeu" then your value for above would instead read:
<key>keychain-access-groups</key>
<array>
<string>$(AppIdentifierPrefix)aoeu</string>
</array>
If you are configuring this value through XCode then the string you set in the Keychain Sharing section would simply read "aoeu" with XCode appending the $(AppIdentifierPrefix) when it saves the configuration.
Flutter Secure Storage uses an experimental implementation using WebCrypto. Use at your own risk at this time. Feedback welcome to improve it. The intent is that the browser is creating the private key, and as a result, the encrypted strings in local_storage are not portable to other browsers or other machines and will only work on the same domain.
It is VERY important that you have HTTP Strict Forward Secrecy enabled and the proper headers applied to your responses or you could be subject to a javascript hijack.
Please see:
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
- https://www.netsparker.com/blog/web-security/http-security-headers/
On the web, all keys are stored in LocalStorage. flutter_secure_storage has an option for the web to wrap this stored key with an application-specific key to make it more difficult to analyze.
final _storage = const FlutterSecureStorage(
webOptions: WebOptions(
wrapKey: '${your_application_specific_key}',
wrapKeyIv: '${your_application_specific_iv}',
),
);You need the C++ ATL libraries installed along with the rest of Visual Studio Build Tools. Download them from here and make sure the C++ ATL under optional is installed as well.
You need libsecret-1-dev on your machine to build the project, and libsecret-1-0 to run the application (add it as a dependency after packaging your app). If you using snapcraft to build the project use the following
parts:
uet-lms:
source: .
plugin: flutter
flutter-target: lib/main.dart
build-packages:
- libsecret-1-dev
stage-packages:
- libsecret-1-0Apart from libsecret you also need a keyring service, for that you need either gnome-keyring (for Gnome users) or kwalletmanager (for KDE users) or other light provider like secret-service.
To run the integration tests, navigate to the example directory and execute the following command:
flutter drive --target=test_driver/app.dart
This will launch the integration tests specified in the test_driver directory.
We welcome contributions to this project! To set up your workspace after cloning the repository, follow these steps:
-
Fetch the Flutter dependencies:
flutter pub get -
Activate
melos:dart pub global activate melos -
(Optional) Add pub executables to your path:
export PATH="$PATH":"$HOME/.pub-cache/bin" -
Bootstrap the workspace with
melos:melos bootstrap
This will prepare the project for development by linking and configuring all required dependencies.
For a complete list of available methods and configuration options, refer to the API documentation.
This project is licensed under the BSD 3 License. See the LICENSE file for details.