Keys in Secryn represent cryptographic material used for encryption, signing, authentication, and secure integrations. Keys belong to a vault and are governed by project-level access and optional restricted vault rules.
Unlike secrets, keys are immutable and non-versioned. Once created, a key cannot be edited.
Secryn currently supports:
Each key is generated or uploaded based on its algorithm and configuration.
To create a key:
Once created:
Keys in Secryn are immutable.
This means:
If a key must be changed:
This design prevents silent mutation of cryptographic material.
Keys may be marked as public.
In Secryn, "public" refers only to visibility and access behavior.
When enabled:
Important:
Public visibility should be used cautiously.
Keys can be enabled or disabled.
Disabling does not delete the key.
Keys may have an expiration date.
Expiration:
Administrators are responsible for rotating expired keys.
Keys can be tagged for organization.
Tags:
Access to keys is determined by:
Admins and Project Managers typically manage keys. Contributors may create keys if permitted by vault rules.
Keys can be accessed using:
All access is logged in request logs.
Keys in Secryn follow these principles:
Secryn prioritizes cryptographic integrity and traceability.