What is dotgpg

Clevis is a pluggable framework for automated decryption.

dotgpg: A Tool for Securely Backing Up and Versioning Secrets

dotgpg is a tool designed for securely and easily backing up and versioning your production secrets or shared passwords. Getting Started: If you are a Ruby developer, you are likely familiar with the process. You can either run 'gem install dotgpg' or add 'gem "dotgpg"' to your Gemfile.

Instructions for Use Without Ruby

To install GPG on different operating systems, use the following commands: Mac OS X: $ brew install gpg $ sudo gem install dotgpg Ubuntu: $ sudo apt-get install ruby1.9 $ sudo gem install dotgpg RedHat/CentOS: $ sudo yum install ruby ruby-devel $ sudo gem install dotgpg ### Usage To get started, run the command: $ dotgpg init If you haven't used GPG before, you will be prompted to create a new passphrase. It is important to make this passphrase as secure as your SSH passphrase, which should be between 12 to 20 characters and not just letters. Example: $ dotgpg init Creating a new GPG key: Conrad Irwin Passphrase: Passphrase confirmation: ### Editing Files To create or edit files, use the command: $ dotgpg edit It is recommended to use the .gpg suffix so that other tools can easily recognize these files. Example: $ dotgpg edit production.gpg [ opens your $EDITOR ] ### Creating Encrypted Files To create an encrypted file from piped input, use the command: $ dotgpg create Again, it is advisable to use the .gpg suffix for file recognition. Example: $ echo foo | dotgpg create
 

dotgpg Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with dotgpg tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

Zama
Free

Zama View Zama

Zama is pioneering the future of privacy with homomorphic encryption, making privacy a non-issue by design. Our community is dedicated to solving complex privacy and security challenges across cloud applications and public blockchain smart contracts. By enabling end-to-end encryption wherever applications run, Zama aims to make secure, private online interactions a mainstream reality.

Pioneering Homomorphic Encryption Technology
End-to-End Data Encryption Solutions
Enhanced Cloud Application Security
Tenzir
Free

Tenzir View Tenzir

Tenzir empowers cybersecurity teams with next-generation network forensics, leveraging big data analytics to systematically investigate cyber attacks. Our platform provides intelligent decision support and automated forensic capabilities, enabling proactive defense against today's complex threat landscape and significantly improving an organization's security posture and ROI.

Advanced Network Forensics
Big Data Analytics for Security
Real-time Threat Investigation
Kriptos
Free

Kriptos View Kriptos

Kriptos is an AI-powered platform designed to elevate your organization's cybersecurity, risk, and compliance posture. By automatically classifying and labeling sensitive documents based on content and context, Kriptos provides unparalleled visibility into your critical information assets. Gain actionable insights into data usage, identify potential risks, and streamline compliance with regulatory requirements by understanding where your most sensitive information resides and who has access to it.

AI-driven automatic document classification and labeling
Multi-level sensitivity assessment (Confidential, Restricted, Internal Use, Public)
Advanced analytics for information usage and anomaly detection
Kiteworks
Free

Kiteworks View Kiteworks

Kiteworks offers a Private Content Network (PCN) that provides zero-trust security and compliance for an organization's sensitive digital communications. It empowers businesses to manage risks associated with sending, sharing, receiving, and storing critical data, ensuring robust content governance and regulatory adherence. The platform unifies, tracks, controls, and secures all sensitive content flows, significantly enhancing risk management and bolstering compliance.

Private Content Network (PCN)
Zero-Trust Security Architecture
End-to-End Content Protection
Cyera
Free

Cyera View Cyera

Cyera is the leading Data Security Posture Management (DSPM) platform, empowering organizations to gain complete context and control over their sensitive data. By providing instant visibility into all data assets, nuanced risk assessment, and automated remediation, Cyera significantly reduces attack surfaces and strengthens operational resilience. We are fundamentally transforming how businesses approach data security, offering a holistic solution for comprehensive data protection.

Comprehensive Data Discovery and Classification
Real-time Data Risk and Exposure Assessment
Automated Remediation and Security Posture Improvement