WebCrypto-compatible client for Key Management Services like GCP KMS
-
Updated
Jun 1, 2024 - TypeScript
WebCrypto-compatible client for Key Management Services like GCP KMS
Example hybrid crypto system using KMS RSA keys and local AES cipher blocks
Supports creating a Key Protect instance, KMS Key Rings and Keys.
Module to create Key Rings in a KMS instance
Module for creation of KMS keys
Terraform module to create and work with IBM Key Protect
Create and configure an IBM Cloud Hyper Protect Crypto Services instance.
A helm plugin that help manage secrets with Git workflow and store them anywhere
Example of AWS Key Management Service encrypt/decrypt in ruby
Terraform module to provision a KMS key with alias
Terraform module to populate AWS Systems Manager (SSM) Parameter Store with values from Terraform. Works great with Chamber.
A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
Encrypt Kubernetes Secrets using Hashicorp Vault as the KMS Provider
Add a description, image, and links to the kms topic page so that developers can more easily learn about it.
To associate your repository with the kms topic, visit your repo's landing page and select "manage topics."