|esell 728a304704 also broke dump, this fixes it||3 months ago|
|cmd||3 months ago|
|util||3 months ago|
|.gitignore||3 months ago|
|Gopkg.lock||3 months ago|
|Gopkg.toml||3 months ago|
|README.md||3 months ago|
|main.go||3 months ago|
This is a toy password manager that uses Azure Key Vault as the backend to store your secrets/passwords. It supports the basic CRUD features.
kvpm also supports the ability to dump secrets to a local file where all values are encrypted. This would be used in situations where internet access was not available.
go get github.com/esell/kvpm :)
You first need to set four environment variables before using the app:
AZURE_TENANT_ID: Your Azure tenant ID
AZURE_CLIENT_ID: Your Azure client ID. This will be an app ID from your AAD.
AZURE_CLIENT_SECRET: The secret for the client ID above.
KVAULT: The name of your vault (just the name, not the full URL/path)
List the secrets currently in the vault (not the values though):
Get the value for a secret in the vault:
kvpm show YOUR_SECRETS_NAME
Get the value for a secret from local dump:
kvpm show -l YOUR_SECRETS_NAME
Add or Update a secret in the vault:
kvpm add YOUR_SECRETS_NAME YOUR_NEW_VALUE
Delete a secret in the vault:
kvpm delete YOUR_SECRETS_NAME
Dump secrets from Key Vault to local disk (encrypted)
If you want to hack on this, you’ll need to clone/fork the repo and then use dep to install the dependencies.