Secretless, Identity-based Infrastructure Access
#Secretless #Identitybased #Infrastructure #Access
“Teleport”
Passwords are everywhere. Sometimes they are obvious — hardcoded in the code or laying flat in the file, but other times they take the form of API keys, tokens, cookies, or even second factors. Devs pass them in environment variables, vaults mount them on disk, teams share them over links, and…
source