Keywhiz

Keywhiz

Keywhiz is a robust privileged access management software designed for secure secret management and distribution within service-oriented architectures. It encrypts secrets in a clustered database, enabling clients to retrieve them via mutually authenticated TLS. Keywhiz's user-friendly CLI and automation APIs streamline workflows, while its design ensures high reliability and performance in production environments.

Top Keywhiz Alternatives

1

Confidant

Confidant is an open-source secret management service designed to securely store and access secrets.

By: Ventas
2

Paralus

Paralus is a free, open-source tool designed for secure, audited access to Kubernetes infrastructure.

3

k9 Security

K9 Security revolutionizes cloud access governance by streamlining IAM management for non-experts.

By: k9 Security From United States
4

Krontech Single Connect

Krontech Single Connect is an advanced Privileged Access Management software designed to secure digital identities across diverse environments, including on-premises, cloud, and endpoint devices.

By: Krontech From United States
5

Iraje Privileged Access Manager

Iraje Privileged Access Manager is an advanced Privileged Access Management software designed to secure and monitor accounts with elevated permissions across on-premises and cloud environments.

By: Iraje Software From India
6

M4PAM

M4PAM offers a modern zero trust solution for privileged access management, enabling users to securely access RDP, SSH, and databases with a single multi-factor login.

By: mamori.io From Australia
7

Indicio Proven

Users benefit from seamless Single Sign-On, biometric authentication, and an integrated digital identity wallet...

From United States
8

Millennium Ultra

Businesses can monitor and secure their premises from anywhere, with features like robust encryption and...

By: Millennium Group Inc. From United States
9

Ignimission Protec

This software automates onboarding, enhances security posture, and optimizes budget management...

By: Ignimission From France
10

Detexian

By aligning with trusted standards like CIS Controls and NIST 800-53, Detexian empowers users to...

By: Detexian From Australia
11

IG Security Tracker

It offers a user access matrix for clear visibility of permissions, simplifies onboarding and offboarding...

By: InfiniGlobe LLC From United States
12

OT-Access

With seamless integration, it allows organizations to oversee which technicians access specific subsystems globally, ensuring...

By: ioTium From United States
13

Entitle

With automated request resolutions and zero-touch provisioning, it minimizes the attack surface while enhancing productivity...

By: BeyondTrust From United States
14

Password Sentry

Utilizing advanced PS::GeoTracking technology, it analyzes user locations and determines the distance of logins, suspending...

By: Password Sentry From Canada
15

Dispel

Its Zero Trust architecture ensures every user and device is authenticated, while customizable access controls...

From United States

Top Keywhiz Features

  • Central secret storage
  • Secure secret retrieval
  • Configurable client authentication
  • Immutable secret versions
  • Local secret caching
  • JSON API for secrets
  • CLI for administration
  • mTLS for encryption
  • Group-based access control
  • Automated secret rotation
  • Extensible metadata support
  • PKI integration support
  • Supports multiple secret types
  • Reliable production use
  • Source code availability
  • Development-friendly trust store
  • Secrets stored in memory
  • LDAP authentication support
  • Client certificate validation
  • Clear documentation and examples