Secrets Management
Logins, passwords, tokens, private URLs. We usually need a few of those to connect to the database, connect to a 3rd party service that handles the incoming e-mails, an application monitoring service running on a different server, or reliable cloud storage. Since we need to keep secrets private, we usually don't include them inside the application source code, and so they don't get deployed when our application does. Handling this runtime configuration, private or not, becomes another piece to the puzzle.
Table of Contents
Keeping Secrets
Environment Variables
Rails Encrypted Credentials
Summary
Buy now
Book with code for $65 + local tax
Not ready to buy? Sign up for updates