Sealed Secrets Logo

Sealed Secrets

0
Free
Visit Website

Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret. Overview: - SealedSecrets as templates for secrets - Public key / Certificate Scopes Installation: - Controller - Kustomize - Helm Chart - Kubeseal - Homebrew - MacPorts - Linux Installation from source Upgrade Usage: - Managing existing secrets - Patching existing secrets - Update existing secrets - Raw mode (experimental) Validate a Sealed Secret Secret Rotation: - Sealing key renewal - User secret rotation - Early key renewal Common misconceptions about key renewal Manual key management (advanced) Re-encryption (advanced) Details (advanced) Crypto Developing FAQ: - Will you still be able to decrypt if you no longer have access to your cluster? - How can I do a backup of my SealedSecrets? - Can I decrypt my secrets offline with a backup key? - What flags are available for kubeseal? - How do I update parts of JSON/YAML/TOML/.. file

FEATURES

ALTERNATIVES

Provision, manage, and renew SSL/TLS certificates for your AWS resources with AWS Certificate Manager.

Free

Centralized workforce identity management for AWS applications.

Free

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Free

CLI for generating AWS IAM policy documents, SAM policy templates or SAM Connectors

Free

Tool for generating AWS IAM policy statements with a fluent interface.

Free

A library utilizing Z3 prover to analyze AWS IAM policies.

Free

A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.

Commercial

Safely store secrets in version control repositories with GPG encryption support.

Free