What is Secrets Management?

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 13

  • @mycotina6438
    @mycotina6438 ปีที่แล้ว +6

    I'm still confused. How does this "request" process to the secret manager happens? In my understanding, the secret manager will only approve the "request" if the requestor can somehow prove that he/she is who he/she claims to be. But, isn't that means we are still dealing with user credentials here? So what does the secret manager really achieve? Is it just adding a centralized layer so that we can easily "revoke" a permission from a particular user to particular service?

  • @stanleysoman5179
    @stanleysoman5179 4 ปีที่แล้ว +3

    Thanks for this. Kudos to the PM who thought of this. This feels like a much needed product. Thank you and kudos to the teams for making this happen.

    • @IBMTechnology
      @IBMTechnology  4 ปีที่แล้ว

      Thank you for watching, Stanley! 🙌

  • @shayberkovich8104
    @shayberkovich8104 4 ปีที่แล้ว +2

    The title of the video is somewhat confusing. It mostly goes over the usages of secret management and doesnt even scratch the surface of HOW this is implemented (i.e. HSM). I'd love to see more of latter.

  • @rickharold7884
    @rickharold7884 4 ปีที่แล้ว +1

    That just kicks the ball down the street one level of indirection. It’s better and you can using the centralized mechanism fix a breach but the client still is the weak link. Thx for the videos. They are all interesting.

  • @chadsexinton
    @chadsexinton 8 วันที่ผ่านมา

    Why not use certificates?

  • @MBlessing
    @MBlessing 3 ปีที่แล้ว

    I needed this. Does anyone knows a similar secret store manager like the IBM DCM and google secret manager?

  • @dasaribrahmanaidu6536
    @dasaribrahmanaidu6536 7 หลายเดือนก่อน

    Requester - AD/Cloiud permission under IAM Policies and protocols - Gaining level of acesss - 9 Minutes Clip ?

  • @truthexclusive9769
    @truthexclusive9769 4 ปีที่แล้ว +1

    I need to login via single sign on Application.
    Prompts network credentials on this single sign on Page.
    What if I create synthetic ID(user/pwd)?
    Store them in Secret Mgr.
    I still would need user and password to login to SSO App for Automated Testing .
    Only difference is I now get the credentials calling SMS?
    🤔
    Is this ok Data Breach ?

    • @IBMTechnology
      @IBMTechnology  4 ปีที่แล้ว +1

      Hey there! Depends on the secrets service you use. Ideally, if it is integrated with that SSO app then the app can ask that secrets manager service to confirm that user (based on ID) has the right access to these credentials without having to ever expose them outside of your secrets store. Some sort of abstracted value like a key could supplement for any value exposure, reduces exposure for data breach.

  • @hamdansajid
    @hamdansajid 4 ปีที่แล้ว +1

    awesome

  • @hamdansajid
    @hamdansajid 4 ปีที่แล้ว

    what is microservices

    • @IBMTechnology
      @IBMTechnology  4 ปีที่แล้ว

      Hey Hamdan! 😃 This video might answer your question 👉 ibm.co/338sNtT
      You can also learn more about microservices in this guide: ibm.co/3l6Jqwz