You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When someone is out - just delete their public key, reencrypt the files, and they won’t be able to decrypt secrets anymore.
My question is that whether the re-encryption applies to the secrets' past history?
My understanding from the above statement is that the revocation will only applies to the commits right after the re-encryption happens, therefore a user who has access rights revoked will still be able to decrypt the data from past history.
The text was updated successfully, but these errors were encountered:
When someone's permission is revoked, secrets do not need to be changed with git-secret - just remove their key from the keychain using git secret killperson their@email.com, re-encrypt the files, and they won't be able to decrypt secrets anymore. If you think the user might have copied the contents of the keys when they had access, then you should also change the secrets.
The documentation states:
My question is that whether the re-encryption applies to the secrets' past history?
My understanding from the above statement is that the revocation will only applies to the commits right after the re-encryption happens, therefore a user who has access rights revoked will still be able to decrypt the data from past history.
The text was updated successfully, but these errors were encountered: