The Ansible Tower integration with CyberArk Conjur allows users and administrators to map sensitive credentials (like passwords, SSH private keys,…
Category: Ansible
Technical Deep Dive: Using Conjur Secrets in VM-Deployed Ansible Tower Applications
Secrets management assists organizations in authenticating applications and checking clients before allowing them to access sensitive information, systems, and services….
Security Automation with Red Hat Ansible Tower Introduction
No matter their occupation, nobody likes to do the same set of tasks repetitively — especially when automation is an…
Learning Secrets Management With Hands-on Interactive Tutorials
Learning is fun, and the best way to learn is through hands-on exercises. That’s why Conjur provides some tutorials to…
Security Automation: Best Practices for Secrets Management in a Configuration-as-Code Environment
Software and infrastructure architecture are quickly evolving into cloud environments. With this migration, Infrastructure as Code (IaC) is melding with…
Managing Secrets in Red Hat Ansible Automation Playbooks
Ansible is an agentless management tool that can manage provisioning, configuration, and deployment of applications. RedHat acquired Ansible in 2015…