Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655
Brian Vallelunga
And the way that's working is through cryptography. You have like a fingerprint that leads to a cryptographic signature that can be used to authenticate yourself. And that that thing that's happening in passwords is now starting to happen in secrets with identity based authentication.
0
💬
0
Comments
Log in to comment.
There are no comments yet.