Locally, it works with start/dev scripts to pull and inject environment variables into local environments automatically and supports git-like pull/push commands to sync and share .env files manually via CLI if needed.
It also supports a range of other options for accessing secrets: SDKs, CLI, API.
Website: Infisical Documentation: Infisical Docs. - Source: dev.to / 22 days ago
Do you know that OpenBao is actually funded by IBM? I'm biased (co-founder) but you should take a look at Infisical for secret management: https://infisical.com. - Source: Hacker News / about 2 months ago
Check out Infisical: https://infisical.com We help developers manage API keys, DB access tokens, certificates, and other types of secrets across all of their infrastructure β providing smooth native integrations with k8s, terraform, github actions, any local development setup, and much more. Disclaimer: I'm one of the founders. - Source: Hacker News / 4 months ago
Infisical β Open source platform that lets you manage developer secrets across your team and infrastructure: everywhere from local development to staging/production 3rd-party services. Free for up to 5 developers. - Source: dev.to / 4 months ago
Infisical is an open-source, end-to-end encrypted secret management platform for storing, managing, and syncing application configuration and secrets like API keys, database credentials, and environment variables across applications and infrastructure. It is an alternative to HashiCorp Vault and AWS Secrets Manager. - Source: dev.to / 4 months ago
Infisical- Open source, end-to-end encrypted platform that lets you securely manage secrets and configs across your team, devices, and infrastructure. - Source: dev.to / 6 months ago
You should check out Infisical for secret management: https://infisical.com. Source: 11 months ago
Similar to https://infisical.com too (but Infisical is open source and end-to-end encrypted). Source: 12 months ago
Check out Infisical (https://infisical.com). Source: about 1 year ago
Data security is paramount in modern applications. PURISTA v1.7 introduces the Infisical Secret Store feature, providing a secure vault for storing and accessing sensitive information. Safeguard your API keys, authentication tokens, and other confidential data with ease. Rest easy knowing your application's secrets are protected by PURISTA's robust security measures. - Source: dev.to / about 1 year ago
You should check out https://infisical.com. It has native integrations with both Kubernetes and Docker, and works very well for local development setups. Plus, itβs open source. Source: about 1 year ago
Check out Infisical for blocking commits that have detected secrets in them: https://infisical.com. Source: about 1 year ago
Thanks for mentioning Infisical (I'm one of the founders)! We indeed help devs prevent leaking secrets to git and manage them across the whole infra. Check it out at https://infisical.com. - Source: Hacker News / about 1 year ago
This is pretty much what Infisical is doing. Disclaimer: Iβm one of the founders, happy to answer any questions. Source: about 1 year ago
Yeah you can checkout Infisical it helps you to store your secrets in different server/place so in this case you don't have your secretes on your machine rather on another place. Source: about 1 year ago
I am on a self-hosting spree and use portainer for my container management. I want to version my docker-compose files and am using a Git Repo for that. I want to have a single source of truth for secrets/passwords/keys/etc. As well and was looking at something like Doppler or Infisical. But they do not seem to work with portainer as I intended. Both need some kind of manual command line stuff to manipulate the... Source: about 1 year ago
I think a secrets manager like https://infisical.com/ can help with that. It makes sure your secrets are in Sync across local dev, CI/CD and production. Source: over 1 year ago
Check out Infisical! Https://infisical.com. Source: over 1 year ago
Add your environment variables to Infisical. - Source: dev.to / over 1 year ago
While Bitwarden is also end to end encrypted, it is more of a one size fits for many types of credentials such as notes, login, cards, etc. As a result, the mental model when managing these secrets is quite different from the way we think about secrets in Infisical. The idea that secrets reside in projects and further segmented into environments (dev, staging, prod) fits more closley with how developers like... Source: over 1 year ago
I just made a tool that solves this exact issue! https://infisical.com/ The security is comparable to Vault in that it is also end to end ecrypted but it is a lot less overwheleming when comapred to vault. Check it out and feel free to DM, happy to chat to see if this can be useful for you. Source: over 1 year ago
Do you know an article comparing Infisical to other products?
Suggest a link to a post with product alternatives.
This is an informative page about Infisical. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.