/console

Application secrets and configuration management for developers.

Primary LanguageTypeScriptOtherNOASSERTION

Phase

Website | Documentation | Security | Contributing | Join Slack


Open source platform for fast-moving engineering teams to secure and deploy application secrets — from development to production.

A developer-friendly alternative to HashiCorp Vault and AWS Secrets Manager that works with your whole team 🧑‍💻.


Phase Console

console-ui.mp4
Features
📈 Phase Console: Dashboard for seamlessly creating, managing, rotating secrets, and environment variables
⌨️ CLI: Import existing secrets from .env files, encrypt them, and securely inject them in your application at runtime
🤫 Secret management: Secret Diffs, version control, and recovery
🙋 RBAC: Fine-grained, role-based, and cryptographic access control, per application, per environment.
🔌 Integrations: Automatically sync secrets to GitHub, Cloudflare Pages, GitLab CI, Railway, AWS Secrets Manager, etc.
Kubernetes Kubernetes: Automatically deploy secrets to your Kubernetes Cluster with End-to-End encryption via Phase Secrets Operator
⛓️ Secret referencing & overrides: Create personal secrets. Inherit values from other secrets
🌐 REST API: Access and manage secrets programmatically
📦 SDKs: SDKs for integrating Phase with various programming languages and frameworks
🥡 Self Hosting: Run Phase on your own infrastructure
🔍 Audit Logs: Complete visibility into every change and access event

Explore Phase Console


CLI - Import, Encrypt and Inject secrets

Phase CI

λ phase
Securely manage application secrets and environment variables with Phase.

                     @@@             
              @@@@@@@@@@     
          @@@@@@@@@@@@@@@@
       P@@@@@&@@@?&@@&@@@@@P
     P@@@@#        @&@    @P@@@
    &@@@#         *@&      #@@@&
   &@@@5          &@?       5@@@&
  Y@@@#          ^@@         #@@@J
  #@@@7          B@5         7@@@#
  #@@@?         .@@.         ?@@@#
  @@@@&         5@G          &@@@7
   #@@@B        @@^         #@@@B
    B@@@@      .@#        7@@@@B
     @@@@@@    &.@       P@@@@@7
       @@@@@@@@@@@@@@@@@@@@@
          @@@@@@@@@@@@@@@
             @@@@@@@@
             @@@   

options:
  -h, --help   show this help message and exit
  --version, -v
               show program's version number and exit

Commands:
    auth             💻 Authenticate with Phase
    init             🔗 Link your project with your Phase app
    run              🚀 Run and inject secrets to your app
    secrets          🗝️ Manage your secrets
    secrets list     📇 List all the secrets
    secrets get      🔍 Get a specific secret by key
    secrets create   💳 Create a new secret
    secrets update   📝 Update an existing secret
    secrets delete   🗑️ Delete a secret
    secrets import   📩 Import secrets from a .env file
    secrets export   🥡 Export secrets in a dotenv format
    users            👥 Manage users and accounts
    users whoami     🙋 See details of the current user
    users logout     🏃 Logout from phase-cli
    users keyring    🔐 Display information about the Phase keyring
    docs             📖 Open the Phase CLI Docs in your browser
    console          🖥️ Open the Phase Console in your browser
    update           🆙 Update the Phase CLI to the latest version

Explore Phase CLI


Getting started

Check out the Quickstart Guides

Use Phase Cloud

The quickest and most reliable way to get started is by signing up on the Phase Console.

Self-host Phase

Deploy Phase Console on your infrastructure
Docker Docker Compose
AWS AWS
GCP Google Cloud Platform
Azure Azure
DigitalOcean DigitalOcean
🥡 Self-hosting Phase

SDKs

More coming soon!


Community vs Enterprise edition

Phase operates on an open-core model, similar to that of GitLab.

This repo is available under the MIT expat license, with the exception of the ee directory which will contain Pro or Enterprise features requiring a Phase license.


Security

For more information on how Phase encryption works, please see the Security Docs

Please do not file GitHub issues or post on our public forum for security vulnerabilities, as they are public!

For more information see: SECURITY.md


Contributing

We love contributions. See CONTRIBUTING.md

You can join our Slack if you have any questions!