Skip to main content

Keeper Secrets Manager for Python 3

Project description

1. Obtain you One-Time Secret Key

Keeper Secrets Manager (KSM) authenticates your API requests using advanced encryption that used locally stored private key, device id and client id. To register your device and generate private key you will need to generate a One-Time Secret Key via Web Vault or Keeper Commander CLI.

Via Web Vault

TBD:

Via Keeper Commander CLI

Login to Keeper Commander CLI and perform following:

  1. Create Application

    $ app-share --app [NAME] --secret [UID]
    
    • --app - Name of the Application.
    • --secret - Record UID or Shared Folder UID
  2. Create client

    $ app-client [NAME]
    

Install

TBD

Quick Start

# Import Secrets Manager
from keeper_secrets_manager_core import SecretsManager

# Establish connection
# One time secrets generated via Web Vault or Commander CLI
secrets_manager = SecretsManager(token='MmzGdls - rDG39vgqgFD1HL70h0_L_sKQOdI0qwXU3JI')

# Retrieve all password records
all_records = secrets_manager.get_secrets()

# Get password from first record:
password = all_records[0].password

# Print password (WARNING: Never ever do this at home! Never print password like this 😉)
print("My password from Keeper: %s" % password)

Samples

File Download

TBD

Update record

TBD

Configuration

Types

Listed in priority order

  1. Environment variable
  2. Configuration store
  3. Code

Available configurations:

  • secret_key -
  • server - Keeper Backend server. Available values:
    • Server name
      • https://keepersecurity.com
      • keepersecurity.com
    • Server Abbreviation
      • US - resolve to keepersecurity.com
      • EU - resolve to keepersecurity.eu
      • AU - resolve to keepersecurity.com.au
      • US_GOV - resolve to TBD

Adding more records or share folders to the Application

Via Web Vault

TBD

Via Commander CLI

app-share --app [NAME] --secret [UID2]

Configuration storage

Storage is managed in ...

Types of storages

  • File storage - Default
  • Cloud Storages
    • AWS
      Import TBD pip install keepercommanderintegration-aws
    • Azure
      Import TBD pip install keepercommanderintegration-azure
    • GCP
      Import TBD pip install keepercommanderintegration-gcp
    • GitHub Actions
      Import TBD pip install keepercommanderintegration-gha
    • Custom
      Implement your own KeyValueStorage class

Available operations

Retrieve secret(s)

from keeper_secrets_manager_core import SecretsManager

secrets_manager = SecretsManager()
all_secrets = secrets_manager.get_secrets()

Update secret

secret_to_update = all_secrets[0]

secret_to_update.password = 'NewPassword123$'

secrets_manager.save(secret_to_update)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

keeper-secrets-manager-core-16.1.6.tar.gz (24.6 kB view details)

Uploaded Source

File details

Details for the file keeper-secrets-manager-core-16.1.6.tar.gz.

File metadata

  • Download URL: keeper-secrets-manager-core-16.1.6.tar.gz
  • Upload date:
  • Size: 24.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.6.3 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.0

File hashes

Hashes for keeper-secrets-manager-core-16.1.6.tar.gz
Algorithm Hash digest
SHA256 729f43161b136ad6e9ece3488bd1e59671b9fd33bb72ceeca8a607005b2b974d
MD5 f1762136480f3e0c62d498f3a4f0e09c
BLAKE2b-256 ddf098c795f609ffa125f85055e85d9b43124999efd71525f3fe3dd06a88735e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page