Efficient password management in distributed teams

Secure Transfer


The example in this article used an encrypted store for secret information in an ordinary directory. This directory can be distributed like source code (e.g., by checking into version control).

Thanks to Pass, entries and exits by team members can largely be treated automatically without compromising security. Access is easy to automate, too, because you can use a simple command at the command line to output any secret directly to standard output.

The Author

Jakob Holderbaum works as a consultant and software developer at Thoughtworks in Munich, Germany. He supports companies with agile transformation, continuous delivery, embedded software, and IT security.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Automatic data encryption and decryption with Clevis and Tang
    Encrypting hard disk partitions during the installation of an operating system is standard procedure. When booting the computer, you then need to enter a matching passphrase to unlock the hard drive. We show you how to automate this process and link it to a policy.
  • Secrets and certificate management
    Vault is a highly secure, trusted place to keep your secrets and certificates.
  • Version 5.2 of the Ruby framework
    Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions for new ones.
  • Credential management with HashiCorp Vault
    Admin teams can use secret sharing to centrally manage shared access to user accounts and services. HashiCorp Vault is one of the few tools that has proven effective when it comes to implementing this solution. Here's how to use this open source tool and keep important credentials safe.
  • Hardware-enhanced security
    Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
comments powered by Disqus