Secrets in Secryn store sensitive values such as API keys, database credentials, tokens, and configuration data. Secrets belong to a vault and are governed by project-level access and optional restricted vault rules.
Secrets are versioned and immutable. Every change creates a new version while preserving history.
To create a secret:
Once created:
Secrets support full version history.
Versioning ensures:
Only the current active version is returned via API or UI by default.
When updating a secret:
There is no "in-place editing."
To restore:
Restoring:
Secrets can be enabled or disabled.
Disabling does not delete versions.
Secrets may have:
Expiration:
Secrets can be tagged for organization and filtering.
Tags:
Access to secrets is determined by:
Secrets do not support public URLs.
Secrets can be retrieved using:
By default:
If only names are required, the API supports name-only responses.
Access is fully logged.
Secrets in Secryn are designed with:
Secryn prioritizes auditability and operational safety over convenience.