Comparison of secret managing schemes: Difference between revisions

imported>Lucc
imported>Pacman99
mNo edit summary
Line 3: Line 3:
== Introduction ==
== Introduction ==


Sometimes you need to use secrets in you system configuration.  Those can
Sometimes you need to use secrets in your system configuration.  Those can
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...)
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...)
to API tokens and similar things.  Normally one would store this kind of
to API tokens and similar things.  Normally one would store this kind of