www.conjur.org Open in urlscan Pro
2606:4700::6812:b3ec  Public Scan

URL: https://www.conjur.org/get-started/interactive/
Submission: On May 22 via manual from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Skip to content
 * Solutions
   * DevOps Security
   * Secrets Management
   * Role Based Access Control
   * Secretless Applications
   * Remove Secrets from Code
 * Use Cases
   * Secure CI/CD Pipelines
   * Kubernetes Security
   * Container Security
   * Application Security
   * Security Automation
 * Learn
   * Quick Start
     * Setup a Conjur OSS Environment
     * Define Policy
     * Store a Secret
     * Run the Demo App
   * Interactive
     * Secure Ansible Automation
     * Secure CI/CD Pipelines
     * Secure Kubernetes Secrets
   * Tutorials
     * Enrolling an Application
     * Delegating Policy Management
     * Ruby API
     * Securing Jenkins
     * Cloud Foundry Integration
   * Why Conjur
 * API
   * REST API
   * CLI
   * SDK
   * Inject Secrets
   * Secretless Broker
 * Docs
 * Blog
 * 

 * Solutions
   * DevOps Security
   * Secrets Management
   * Role Based Access Control
   * Secretless Applications
   * Remove Secrets from Code
 * Use Cases
   * Secure CI/CD Pipelines
   * Kubernetes Security
   * Container Security
   * Application Security
   * Security Automation
 * Learn
   * Quick Start
   * Interactive
   * Tutorials
   * Why Conjur
 * API
   * REST API
   * CLI
   * SDK
   * Inject Secrets
   * Secretless Broker
 * Docs
 * Blog
 * 

Learn

 * Quick Start
   * Setup a Conjur OSS Environment
   * Define Policy
   * Store a Secret
   * Run the Demo App
 * Interactive
   * Secure Ansible Automation
   * Secure CI/CD Pipelines
   * Secure Kubernetes Secrets
 * Tutorials
   * Enrolling an Application
   * Delegating Policy Management
   * Ruby API
   * Securing Jenkins
   * Cloud Foundry Integration
 * Why Conjur
   * Using Conjur
   * How Conjur Works
   * Concepts


SECRETS MANAGEMENT HOSTED TUTORIALS

Quickly learn and demo real world secrets management scenarios with cloud hosted
tutorials.


SECURE ANSIBLE SSH KEYS AND SECRETS IN ANSIBLE PLAYBOOKS

Ansible is an agentless configuration management tool for provisioning,
configuring, and deploying applications. Ansible is great, but it’s not designed
as a secrets management solution that manages secrets across different tools and
cloud environments.

Learn how you can use Conjur open source secrets management provider to secure
secrets within Ansible and keep unsecured secrets out of Ansible Playbooks with
this hosted tutorial.

SECURE ANSIBLE >


SECURE CI/CD PIPELINES BY REMOVING AND SECURING SECRETS WITHIN JENKINS

Jenkins is one of the most popular CI/CD build systems for DevOps pipelines.
Jenkins and other CI/CD tools are designed to build and deliver applications,
but they also have access to a many sensitive secrets across the entire DevOps
environment. This is especially risky when secrets are exposed in Jenkinsfiles
and other configuration files that are checked into code repositories like
GitHub.

Learn how Conjur open source secrets management can secure Jenkins secrets
across all tools and cloud environments with this hosted tutorial.

SECURE CI/CD >


SECURE KUBERNETES SECRETS WITH RBAC, NATIVE AUTHENTICATION, AND SECRETLESS
BROKER

Kubernetes is one of the most popular open source container orchestration
platforms. Kubernetes provides an open source framework for automating the
deployment and management of container-based applications. Kubernetes is
relatively new and quickly evolving, but it is very important to use security
best practices for managing secrets.

Learn how Conjur open source secrets management can secure Kubernetes secrets
across all tools and cloud environments with this hosted tutorial.

SECURE KUBERNETES >




JOIN OUR GROWING COMMUNITY




 * Solutions
   * DevOps Security
   * Secrets Management
   * Role Based Access Control
   * Secretless Applications
   * Remove Secrets from Code

 * Use Cases
   * Secure CI/CD Pipelines
   * Kubernetes Security
   * Container Security
   * Application Security
   * Security Automation

 * LEARN
   * Secure Ansible Automation
   * Secure Jenkins CI/CD Pipelines
   * Secure Kubernetes Secrets
   * Quick Start
   * Why Conjur

 * CYBERARK
   * About
   * Careers
   * Enterprise

FOLLOW US

Asset 33 Asset 34 Asset 28

Copyright © 2023 CyberArk Software Ltd. All rights reserved. Terms and
Conditions | Privacy Policy | Cookie Preferences