Scaleway’s Secret Manager allows you to conveniently store, access and share sensitive data such as passwords, API keys and certificates. With Secret Manager you can manage secrets which are logical containers made up of zero or more immutable versions, that hold sensitive data. Your data is encrypted both in transit and at rest and it is automatically replicated to multiple zones within your region of choice.
Refer to our dedicated concepts page to find definitions of the different terms referring to Secret Manager.
Requirements: To perform the following steps, you must first ensure that:
curl
1. Configure your environment variables.
Note: This is an optional step that seeks to simplify your usage of the Secret Manager API.
2. Create a secret. Run the following command to create a secret:
3. Create a secret version. Run the following command to create a version of your secret:
4. Access data from your latest secret version. Run the following command to access the data of your most recent secret version:
Note: Requests can either target a specific version or the latest.
For more information about Secret Manager, you can check out the following pages:
Secrets are logical containers made up of zero or more immutable versions, that contain sensitive data.
Retrieve the list of secrets created within an Organization and/or Project. You must specify either the organization_id
or the project_id
and the region
.
name_asc
, name_desc
, created_at_asc
, created_at_desc
, updated_at_asc
and updated_at_desc
. The default value is name_asc
.You must sepcify the region
to create a secret.
ready
and locked
. The default value is ready
.Retrieve the metadata of a secret specified by the region
and the secret_id
parameters.
ready
and locked
. The default value is ready
.Retrieve the metadata of a secret specified by the region
and the secret_name
parameters.
ready
and locked
. The default value is ready
.Edit a secret's metadata such as name, tag(s) and description. The secret to update is specified by the secret_id
and region
parameters.
ready
and locked
. The default value is ready
.Delete a given secret specified by the region
and secret_id
parameters.
Versions store the sensitive data contained in your secrets (API keys, passwords, or certificates).
Retrieve the list of a given secret's versions specified by the secret_name
and region
parameters.
Retrieve the metadata of a secret's given version specified by the region
, secret_name
and revision
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Access sensitive data in a secret's version specified by the region
, secret_name
and revision
parameters.
Retrieve the list of a given secret's versions specified by the secret_id
and region
parameters.
Create a version of a given secret specified by the region
and secret_id
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Retrieve the metadata of a secret's given version specified by the region
, secret_id
and revision
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Edit the metadata of a secret's given version, specified by the region
, secret_id
and revision
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Access sensitive data in a secret's version specified by the region
, secret_id
and revision
parameters.
Delete a secret's version and the sensitive data contained in it. Deleting a version is permanent and cannot be undone.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Make a specific version inaccessible. You must specify the region
, secret_id
and revision
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.Make a specific version accessible. You must specify the region
, secret_id
and revision
parameters.
unknown
, enabled
, disabled
and destroyed
. The default value is unknown
.