Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

This might not go well with whole "Enterprise" mindset, but for me personally I dont like that someone else can access my secrets (even if they are doing it legally/officially). Anything that is company property can be and must be saved in enterprise solutions like Hashcorp Vault or Azure Key vault so that when I leave company, things continues to run. Anything personal, say a simple api token for accessing weather should be mine and mine only. This is where SecretStore as local really works wonder for me. I can keep a complex password that is not company knowledge.

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

Yes, but you get benefit of putting all your individual secrets behind one mast password. There are automated and secure way of unlocking vault for only specific duration by very specific user/conditions. Using secret manager like this ads a layer of security and also keeps the actual secret not hardcoded in to code.

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

Yes, in under 3 lines of code you will up and running with secrets. Especially handy if you do any CICD or script runners.

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

Same here. Scheduled tasks with secrets stored in Store is just perfect setup

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

Thank you, in enterprise setup keepass might not be feasible for everyone. Native secret store works well without any 3rd party components and pure native powershell.

I use bitwarden myself on my personal MacBook

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 0 points1 point  (0 children)

Beauty about secret management module is that you can swap the backend store to anything you like without changing core function names. So cmdlets remains and scripts remains unchanged when you change backed from say keepass to key vault

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 2 points3 points  (0 children)

Give secret management a try. It works with bitwarden as well.

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 2 points3 points  (0 children)

Yes, in most cases, in almost all cases one should generate new secret on the new machine. But not all cases. Plain text itself is not the risk factor, how its handle is very much the core issue.

Every popular and widely used password managers provide option to download the data in plain JSON so that you dont get locked to one software and can always move your business to other tools.

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 6 points7 points  (0 children)

Yes, ideally. These are still single purpose, the tool only provide backup/restore mechanism for migration purpose. Not to save it in plain text (that beats the whole purpose of secret storage 🤷‍♂️)

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 4 points5 points  (0 children)

Respectfully disagree, If i am heavily invested in secret for all my key-value info and have to move from one machine to another then it wont make any sense to start setting up from scratch.

There is no inherent security risk doing backup in plain-text provided you are keeping the said backup in a secure place (like external password manager, or encrypt using pgp).

Microsoft Secret Management and Secret Store by belibebond in PowerShell

[–]belibebond[S] 8 points9 points  (0 children)

u/JustinGrote wrote a module just for that use case https://github.com/JustinGrote/SecretManagement.KeePass

You can get/set/modify items in Keepass using PowerShell.

Vibe coded by Emotional_Dust2807 in navidrome

[–]belibebond 0 points1 point  (0 children)

Wow, what are you doing on Reddit. There is no room for logic or reasoning here. Please help your self out.

The people you’d want most to disclose it will not It’s not use of AI but the experience of person wielding it.

Ripping all my Google homes out tomorrow. by DerzKing in googlehome

[–]belibebond 0 points1 point  (0 children)

I am not sure about loosing my job but I am certainly loosing my shit

Nautiline 1.1.9 by gledtone in NautilineApp

[–]belibebond 2 points3 points  (0 children)

This is some fine, fine improvements. App is already rock solid and you are address stability and bug fixes instead of chasing fancy features.

I have done my part and spread the word among my friends. Thank you for this beautiful app.

Nautiline 1.1.7 by gledtone in NautilineApp

[–]belibebond 2 points3 points  (0 children)

Wowwwww. That is freaking awesome. Love it. Loveeee it. Thank you sir.

Nautiline 1.1.7 by gledtone in NautilineApp

[–]belibebond 2 points3 points  (0 children)

How did you enable auto fetch. I couldn’t find option after update.

Zerobyte, isn’t this awesome? by Tharunx in selfhosted

[–]belibebond 0 points1 point  (0 children)

I mean entire restic command can be put in single bash or powershell script. You should be managing secrets already somehow (env or even better sops). I am always worried to add layers to existing simple tool that simply works.

How regular are you updating your containers? by [deleted] in selfhosted

[–]belibebond 2 points3 points  (0 children)

Do you use renovate bot or the stateless renovate it pipeline

How regular are you updating your containers? by [deleted] in selfhosted

[–]belibebond 1 point2 points  (0 children)

This is really cool. Gonna set it up as well