Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log. | Surge makes it easy for developers to deploy projects to a production-quality CDN through Grunt, Gulp, npm. |
Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.;Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.;Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.;Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.;Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion. | - |
Statistics | |
GitHub Stars 33.4K | GitHub Stars - |
GitHub Forks 4.5K | GitHub Forks - |
Stacks 808 | Stacks 93 |
Followers 802 | Followers 176 |
Votes 71 | Votes 60 |
Pros & Cons | |
Pros
| Pros
Cons
|

Public webpages hosted directly from your GitHub repository. Just edit, push, and your changes are live.

It is a blazing fast hosting solution that provides Customer Satisfaction driven Web Hosting services since 2016.

Netlify is smart enough to process your site and make sure all assets gets optimized and served with perfect caching-headers from a cookie-less domain. We make sure your HTML is served straight from our CDN edge nodes without any round-trip to our backend servers and are the only ones to give you instant cache invalidation when you push a new deploy. Netlify is also the only static hosting service with integrated continuous deployment.

A cloud platform for serverless deployment. It enables developers to host websites and web services that deploy instantly, scale automatically, and require no supervision, all with minimal configuration.

Webflow is a responsive design tool that lets you design, build, and publish websites in an intuitive interface. Clean code included!

Divshot makes building and hosting front-end web applications simple. Build locally and deploy using a simple command-line interface. Divshot supports multiple environments, pushState routing, atomic deploys, and more.

Doppler’s developer-first security platform empowers teams to seamlessly manage, orchestrate, and govern secrets at scale.

Host your static websites on GitLab.com for free, or on your own GitLab Enterprise Edition instance. Use any static website generator: Jekyll, Middleman, Hexo, Hugo, Pelican, and more

It is production-grade web content hosting for developers. With a single command, you can quickly deploy web apps and serve both static and dynamic content to a global CDN (content delivery network). You can also pair it with Cloud Functions or Cloud Run to build and host microservices.
It centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for IBM and non-IBM storage solutions using the OASIS Key Management Interoperability Protocol (KMIP).