Comparison of secret managing schemes: Difference between revisions
imported>Lucc |
imported>Pacman99 mNo edit summary |
||
Line 3: | Line 3: | ||
== Introduction == | == Introduction == | ||
Sometimes you need to use secrets in | Sometimes you need to use secrets in your system configuration. Those can | ||
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | ||
to API tokens and similar things. Normally one would store this kind of | to API tokens and similar things. Normally one would store this kind of |