Posted by George Wainblat
October 26, 2020
Intro to tags
In information systems, a tag is a keyword or term assigned to a piece of information, like a digital record. This kind of metadata helps describe an item and allows it to be found again by browsing or searching. People use tags to aid classification, mark ownership, note boundaries, and indicate identity. Tagging gained popularity due to the growth of social bookmarking, image sharing, and social networking websites.
Akeyless Vault tags
We’ve recently added the ability to assign tags to any type of secret, such as encryption keys, static and dynamic secrets, and PKI & SSH certificates issuers. Each tag consists of a user defined case-sensitive string of an unlimited length. You can add the same tag to multiple Akeyless resources, or you can add the same item to a number of tags.
There are no limitations on the number of user-created tags each item can have. With Akeyless Vault secrets management, you can add tags to an item when you create it, or edit an existing item. Tags are shared per Akeyless Vault account, but the favorites (pin tags) are local per user.
Tags help you do the following
Identify and organize your Akeyless Vault items. You can assign the same tag to resources from different folders to indicate that these items are related. You can also use tags via API to enhance automation.
Akeyless customers with an extensive number of secrets can use tags to designate certain items within Akeyless Vault, as personal favorites across multiple folders, sharing commonly used secrets between different team members, for projects currently in works.
DevOps SecurityThe Akeyless gateway serves as protection between your private network and the cloud. Equipped with caching and zero-knowledge encryption capabilities, the Akeyless gateway is the powerhouse of the Akeyless SaaS platform.
Using GitHub Securely: Best Practices & What to Watch Out ForDevelopers on public GitHub leak over 5,000 API keys or credentials every day. Learn best practices to avoid credential breaches on GitHub.
What’s in a Secret? Best Practices for Static, Rotated and Dynamic SecretsSecrets are ranked as the leading cause of data breaches. Combat this by learning how to best use static, rotated, and dynamic secrets.