Anonymous user
Comparison of secret managing schemes: Difference between revisions
Comparison of secret managing schemes (view source)
Revision as of 00:09, 26 March 2021
, 26 March 2021no edit summary
imported>Lucc |
imported>Pacman99 mNo edit summary |
||
Line 3: | Line 3: | ||
== Introduction == | == Introduction == | ||
Sometimes you need to use secrets in | Sometimes you need to use secrets in your system configuration. Those can | ||
range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | range from user passwords and Wifi passwords over private keys (ssh, ssl, ...) | ||
to API tokens and similar things. Normally one would store this kind of | to API tokens and similar things. Normally one would store this kind of |