AWS Secrets Manager
Push secrets into AWS Secrets Manager. EC2, Lambda, ECS and other workloads read with IAM.
Cloud and CI/CD platforms with native authentication.
Push secrets into AWS Secrets Manager. EC2, Lambda, ECS and other workloads read with IAM.
Push secrets into Azure Key Vault. Functions, App Service and AKS workloads read through Azure AD.
Push secrets into Google Cloud Secret Manager. Cloud Run, Cloud Build and Vertex AI read with IAM.
Push values into repository, environment and organization secrets. Workflows pick them up automatically.
Push values into project, group and instance variables. Masking and scoping carry over.
Push values into Production, Preview and Development. Branch-scoped values land before the build runs.
Push values into Bitbucket repository and workspace variables. Pipelines pick them up on the next run.
Push secrets to every Fly Machine and region. No more fly secrets set after each rotation.
Container runtimes and orchestrators.
Sync into Kubernetes Secrets and ExternalSecrets. Pods refresh through the operator without sidecars.
Inject values into Compose, Swarm and standalone containers. Mount as files or env vars via the CLI.
For platforms without a native integration.
Build your own destination on the Enkryptify API. Token auth, webhooks on every rotation.
Export to .env, .env.production or any custom file shape. For migrating off legacy systems.
Authenticate the destination with an IAM role, OAuth app, or fine-grained token. Scope it tight to what Enkryptify needs.
Pick which Enkryptify environment's values to push. The mapping shows up in your audit log.
Edits and rotations propagate automatically. Your workloads keep reading from the same place they always have.