Keywhiz

Keywhiz

Keywhiz is a robust privileged access management software designed for secure secret management and distribution within service-oriented architectures. It encrypts secrets in a clustered database, enabling clients to retrieve them via mutually authenticated TLS. Keywhiz's user-friendly CLI and automation APIs streamline workflows, while its design ensures high reliability and performance in production environments.

Top Keywhiz Alternatives

1

Confidant

Confidant is an open-source secret management service designed to securely store and access secrets.

2

Paralus

Paralus is a free, open-source tool designed for secure, audited access to Kubernetes infrastructure.

3

k9 Security

K9 Security revolutionizes cloud access governance by streamlining IAM management for non-experts.

4

Krontech Single Connect

Krontech Single Connect is an advanced Privileged Access Management software designed to secure digital identities across diverse environments, including on-premises, cloud, and endpoint devices.

5

Iraje Privileged Access Manager

Iraje Privileged Access Manager is an advanced Privileged Access Management software designed to secure and monitor accounts with elevated permissions across on-premises and cloud environments.

6

M4PAM

M4PAM offers a modern zero trust solution for privileged access management, enabling users to securely access RDP, SSH, and databases with a single multi-factor login.

7

Indicio Proven

Users benefit from seamless Single Sign-On, biometric authentication, and an integrated digital identity wallet...

8

Millennium Ultra

Businesses can monitor and secure their premises from anywhere, with features like robust encryption and...

9

Ignimission Protec

This software automates onboarding, enhances security posture, and optimizes budget management...

10

Detexian

By aligning with trusted standards like CIS Controls and NIST 800-53, Detexian empowers users to...

11

IG Security Tracker

It offers a user access matrix for clear visibility of permissions, simplifies onboarding and offboarding...

12

OT-Access

With seamless integration, it allows organizations to oversee which technicians access specific subsystems globally, ensuring...

13

Entitle

With automated request resolutions and zero-touch provisioning, it minimizes the attack surface while enhancing productivity...

14

Password Sentry

Utilizing advanced PS::GeoTracking technology, it analyzes user locations and determines the distance of logins, suspending...

15

Dispel

Its Zero Trust architecture ensures every user and device is authenticated, while customizable access controls...

Top Keywhiz Features

  • Central secret storage
  • Secure secret retrieval
  • Configurable client authentication
  • Immutable secret versions
  • Local secret caching
  • JSON API for secrets
  • CLI for administration
  • mTLS for encryption
  • Group-based access control
  • Automated secret rotation
  • Extensible metadata support
  • PKI integration support
  • Supports multiple secret types
  • Reliable production use
  • Source code availability
  • Development-friendly trust store
  • Secrets stored in memory
  • LDAP authentication support
  • Client certificate validation
  • Clear documentation and examples