All Projects → adobe → Cryptr

adobe / Cryptr

Licence: apache-2.0
Cryptr: a GUI for Hashicorp's Vault

Projects that are alternatives of or similar to Cryptr

T Vault
Simplified secrets management solution
Stars: ✭ 316 (-2.47%)
Mutual labels:  hashicorp, password-manager, vault, secrets
teller
Cloud native secrets management for developers - never leave your command line for secrets.
Stars: ✭ 998 (+208.02%)
Mutual labels:  vault, secret-management, secrets, hashicorp
k8s-vault-webhook
A k8s vault webhook is a Kubernetes webhook that can inject secrets into Kubernetes resources by connecting to multiple secret managers
Stars: ✭ 107 (-66.98%)
Mutual labels:  vault, secret-management, secrets
Helm Secrets
Successor of zendesk/helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere
Stars: ✭ 165 (-49.07%)
Mutual labels:  vault, secrets, secret-management
Secretserver
Secret Server PowerShell Module
Stars: ✭ 82 (-74.69%)
Mutual labels:  password-manager, secrets, secret-management
secrets-proxy
🔑 A secure proxy service for managing OneOps secrets.
Stars: ✭ 12 (-96.3%)
Mutual labels:  vault, secret-management, secrets
Hashicorp Vault Plugin
Jenkins plugin to populate environment variables from secrets stored in HashiCorp's Vault.
Stars: ✭ 191 (-41.05%)
Mutual labels:  vault, secrets, secret-management
Node Vault
Client for HashiCorp's Vault
Stars: ✭ 391 (+20.68%)
Mutual labels:  hashicorp, vault, secrets
Vaulted
nodejs based wrapper for HashiCorp's Vault HTTP API
Stars: ✭ 47 (-85.49%)
Mutual labels:  hashicorp, vault, secret-management
Vault.net
.NET API client for vault
Stars: ✭ 74 (-77.16%)
Mutual labels:  hashicorp, vault, secret-management
thycotic.secretserver
PowerShell module for automating with Thycotic Secret Server REST API
Stars: ✭ 41 (-87.35%)
Mutual labels:  vault, secret-management, secrets
secrets cli
CLI for storing and reading your secrets via vault
Stars: ✭ 24 (-92.59%)
Mutual labels:  vault, secret-management, secrets
vault-token-helper-osx-keychain
An example @hashicorp Vault token helper for Mac OS X Keychain.
Stars: ✭ 64 (-80.25%)
Mutual labels:  vault, hashicorp
vim-hcl
Syntax highlighting for HashiCorp Configuration Language (HCL)
Stars: ✭ 83 (-74.38%)
Mutual labels:  vault, hashicorp
polymerase
A tool for populating templates with environment variables and Vault values
Stars: ✭ 84 (-74.07%)
Mutual labels:  vault, secrets
cli
The official CLI for interacting with your Doppler secrets and configuration.
Stars: ✭ 96 (-70.37%)
Mutual labels:  secret-management, secrets
terraform-provider-lastpass
Terraform Lastpass provider
Stars: ✭ 55 (-83.02%)
Mutual labels:  secret-management, secrets
envy
Use envy to manage environment variables with your OS keychain
Stars: ✭ 23 (-92.9%)
Mutual labels:  secrets, passwords
envkeygo
EnvKey's official Go client library
Stars: ✭ 36 (-88.89%)
Mutual labels:  secret-management, secrets
argocd-vault-plugin
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
Stars: ✭ 404 (+24.69%)
Mutual labels:  vault, secret-management

Cryptr

Cryptr is a GUI for Hashicorp's Vault.

Using Cryptr, a user may manage secrets in their Vault instance: reading, creating, and modifying secrets with ease.

alt text

Download Binaries

The current release can be downloaded here.

Cryptr supports Windows, Linux and macOS. It has been tested on Windows 10, Ubuntu 17.04 Desktop, and macOS 10.15 Catalina.

On macOS, you may be warned about untrusted developers when you first attempt to launch Cryptr. To resolve this, open Finder, navigate to Applications, right-click on Cryptr.app and click Open. You can then confirm you want to allow Cryptr to be opened.

For Linux, use the .AppImage files. They are self-contained binaries that run on every major linux distro. Just make it executable and run it. AppImage information here!

Install using Homebrew

Cryptr can be installed via Homebrew where Cryptr is available as a cask. Just type

brew cask install cryptr

Building from Source

You only need to do this if you want to contribute code, or run Cryptr in developer mode. (For Linux binaries, see above).

git clone https://github.com/jcrowthe/cryptr.git
cd cryptr
npm install
npm run dev

Unique Features

In addition to the default feature-set of Vault, Cryptr adds some things that are "nice to have". Some of these include:

  • Files can be uploaded and downloaded directly to and from the filesystem. This includes both text and binary files.
  • A "share secret" features allows one user to send another user a time-limited self-destructing secret. This can be useful to send a secret to a friend without needing to change the receiving party's access in Vault.
  • Underscores in key names show as whitespace. ie. secret/My_cool_Secret shows up in the folder structure as My cool Secret
  • Secrets can be easily moved or renamed using a friendly UI.

License

Apache 2.0 License

Auth backends

Currently LDAP, UserPass and Token auth backends are accepted. Most others are not useful for a GUI, but if you feel otherwise, submit a pull request or open an issue.

Important Notes about Policies

Secret Discovery

Cryptr requires that policies associated with a token to be readable by that token. The purpose for this is to discover what secrets are available to the token. An example ACL for a policy found at sys/policy/demo would be as follows:

path "secret/mysecrets/*" {
  policy = "write"
}

path "sys/policy/demo" {
    policy = "read"
}

Only the permission to read is advised for the policy. NOTE: This policy addition is critical to discovering available secrets. Without this, there is no programatic way for Cryptr to know what secrets it can query to show the user. (Also, for that matter, there is no way for a human using the CLI to discover secrets, except for blindly attempting to list potential folders). As such, it is highly recommended to do this for all policies. All policies without this ability must necessarily be ignored by Cryptr.

Globs and Secret Discovery

Cryptr currently only supports glob characters at the folder level (ie. secret/*), and not as a suffix (ie. secret/group*). This is due to the lack of any ability to list based on a prefix. As noted here, list command outputs are not filtered by policy. You are welcome to add list permissions on the containing folder, but know that this is not recommended.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].