Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Storing arbitrary secret data with profiles #54

Closed
coen-hyde opened this issue Nov 13, 2015 · 5 comments
Closed

Storing arbitrary secret data with profiles #54

coen-hyde opened this issue Nov 13, 2015 · 5 comments

Comments

@coen-hyde
Copy link

This is probably outside the scope of aws-vault but I would like to store other data along side the aws profile. In my use case this would be an auth token to another service related to the aws profile. I only want this token exposed once credentials have been successfully created. What are your thoughts?

@lox
Copy link
Collaborator

lox commented Nov 13, 2015

Store it in s3?

@coen-hyde
Copy link
Author

That's not a bad idea. With the appropriate policies and acl it should be safe. But it doesn't feel right, let me think about this :). Cheers.

@lox
Copy link
Collaborator

lox commented Nov 14, 2015

Alternately, KMS + S3: https://github.com/codahale/sneaker

@lox
Copy link
Collaborator

lox commented Nov 14, 2015

https://github.com/fugue/credstash is another alternative that uses DynamoDB. It looks like the best fit for what you are looking for.

@coen-hyde
Copy link
Author

I'm just going to pgp encrypt the data. Thanks for the links

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants