Keeper Secrets Manager for Python 3
Project description
1. Obtain you One-Time Secret Key
Keeper Secrets Manager (KSM) authenticates your API requests using advanced encryption that used locally stored private key, device id and client id. To register your device and generate private key you will need to generate a One-Time Secret Key via Web Vault or Keeper Commander CLI.
Via Web Vault
TBD:
Via Keeper Commander CLI
Login to Keeper Commander CLI and perform following:
-
Create Application
$ app-share --app [NAME] --secret [UID]
--app
- Name of the Application.--secret
- Record UID or Shared Folder UID
-
Create client
$ app-client [NAME]
Install
TBD
Quick Start
# Import Secrets Manager
from keeper_secrets_manager_core import SecretsManager
# Establish connection
# One time secrets generated via Web Vault or Commander CLI
secrets_manager = SecretsManager(token='MmzGdls - rDG39vgqgFD1HL70h0_L_sKQOdI0qwXU3JI')
# Retrieve all password records
all_records = secrets_manager.get_secrets()
# Get password from first record:
password = all_records[0].password
# Print password (WARNING: Never ever do this at home! Never print password like this 😉)
print("My password from Keeper: %s" % password)
Samples
File Download
TBD
Update record
TBD
Configuration
Types
Listed in priority order
- Environment variable
- Configuration store
- Code
Available configurations:
secret_key
-server
- Keeper Backend server. Available values:- Server name
https://keepersecurity.com
keepersecurity.com
- Server Abbreviation
US
- resolve tokeepersecurity.com
EU
- resolve tokeepersecurity.eu
AU
- resolve tokeepersecurity.com.au
US_GOV
- resolve toTBD
- Server name
Adding more records or share folders to the Application
Via Web Vault
TBD
Via Commander CLI
app-share --app [NAME] --secret [UID2]
Configuration storage
Storage is managed in ...
Types of storages
- File storage - Default
- Cloud Storages
- AWS
Import TBDpip install keepercommanderintegration-aws
- Azure
Import TBDpip install keepercommanderintegration-azure
- GCP
Import TBDpip install keepercommanderintegration-gcp
- GitHub Actions
Import TBDpip install keepercommanderintegration-gha
- Custom
Implement your ownKeyValueStorage
class
- AWS
Available operations
Retrieve secret(s)
from keeper_secrets_manager_core import SecretsManager
secrets_manager = SecretsManager()
all_secrets = secrets_manager.get_secrets()
Update secret
secret_to_update = all_secrets[0]
secret_to_update.password = 'NewPassword123$'
secrets_manager.save(secret_to_update)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file keeper-secrets-manager-core-16.1.1.tar.gz
.
File metadata
- Download URL: keeper-secrets-manager-core-16.1.1.tar.gz
- Upload date:
- Size: 22.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.2 importlib_metadata/4.6.3 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5580e59277bc5c4dc0fc1a35ba7de240cc912791c5228cea562bad2eb51df553 |
|
MD5 | 002a063643147c3f20d263adb91633bf |
|
BLAKE2b-256 | 1604190d3be872fc1b8eae86f9165e48ee97e24e30c9245a29ab990f174a136b |