Jump to content

Comparison of secret managing schemes: Difference between revisions

m
no edit summary
imported>Lucc
imported>Pacman99
mNo edit summary
Line 3: Line 3:
== Introduction ==
== Introduction ==


Sometimes you need to use secrets in you system configuration.  Those can
Sometimes you need to use secrets in your system configuration.  Those can
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...)
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...)
to API tokens and similar things.  Normally one would store this kind of
to API tokens and similar things.  Normally one would store this kind of
Anonymous user