Skip to content

Safer Methods for API Key Storage and Retrieval #4998

Closed Answered by CouleeApps
utkonos asked this question in Q&A
Discussion options

You must be logged in to vote

There are a few options for storing secrets, each with advantages and disadvantages:

  • There is a SecretsProvider api which is designed for storage of actual secrets, with no UI but with a couple of standard implementations:
    • SecretsProvider["SystemSecretsProvider"] uses the rust keyring crate to store secrets in a system-defined manner. This is probably what you want to use.
    • SecretsProvider["AESFileSecretsProvider"] stores secrets in a file encrypted with AES and some magic key nonsense. The key is based on a per-machine hwid, so it's not settable by the user or enforced by any os protections.
  • Settings (as of dev) has an option for hidden password-like entries with the key "hidden": true

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by utkonos
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants