Skip to main content

Introduction to Secretless Workflows

Welcome to Secretless.cloud - your guide to eliminating long-lived credentials from your infrastructure and adopting secure, modern authentication practices.

What is Secretless Authentication?

Secretless authentication is an approach where systems authenticate using short-lived, automatically-rotating credentials instead of permanent secrets like API keys, access tokens, or service account credentials.

Traditional approaches store secrets like:

  • AWS access keys and secret keys
  • Service account JSON files
  • API tokens
  • Database passwords
  • SSH keys

These long-lived credentials pose significant security risks:

  • Can be accidentally committed to version control
  • Difficult to rotate regularly
  • If compromised, remain valid until manually revoked
  • Hard to audit who has access
  • Challenging to scope permissions appropriately

How Secretless Authentication Works

Modern secretless workflows use protocols like OpenID Connect (OIDC) and just-in-time authentication to:

  1. Verify identity using trusted identity providers
  2. Request temporary credentials valid for minutes or hours
  3. Automatically rotate credentials with each use
  4. Scope permissions to exactly what's needed
  5. Audit all access through centralized logging

Example Flow: GitHub Actions to AWS

No AWS access keys needed - just configuration!

Benefits of Going Secretless

Security

  • No credential storage - Nothing to leak or steal
  • Automatic rotation - Credentials expire automatically
  • Fine-grained access - Scope to specific resources and actions
  • Full audit trail - Every access is logged

Operations

  • Simplified onboarding - No credential distribution
  • Easier compliance - Meet security standards more easily
  • Reduced maintenance - No manual rotation needed
  • Better visibility - Centralized monitoring

Developer Experience

  • Faster setup - Configure once, use everywhere
  • Fewer secrets to manage - Less cognitive overhead
  • Works locally and in CI - Consistent authentication
  • Self-service - Developers can configure without security team

What You'll Learn

This site provides comprehensive guides for implementing secretless authentication across popular cloud providers and CI/CD tools.

Providers

Learn how to configure service providers to accept secretless authentication:

  • AWS - IAM roles with OIDC identity providers
  • Google Cloud Platform - Workload Identity Federation
  • Microsoft Azure - Federated identity credentials
  • Kubernetes - Service Account Token Projection (coming soon)
  • Cloudflare - API tokens with OIDC (coming soon)

Initiators

Learn how to configure services that initiate authentication:

  • GitHub Actions - OIDC tokens in workflows
  • GitLab CI/CD - ID tokens with configurable audiences
  • Buildkite - Native OIDC token generation
  • CircleCI - OIDC tokens (coming soon)
  • AWS ECS/EKS - Task/Pod identities (coming soon)
  • Kubernetes - Workload identities (coming soon)

Integration Guides

Follow step-by-step guides for specific service combinations:

Getting Started

Quick Start

Choose a guide based on your tech stack:

  1. GitHub Actions → AWS - Most popular combination (20-30 min)
  2. GitLab CI → GCP - Workload Identity Federation (20-30 min)
  3. GitLab CI → Azure - Federated credentials (20-30 min)
  4. Buildkite → AWS - Native OIDC support (20-30 min)

Each guide provides complete setup instructions to deploy without storing credentials.

Learn the Concepts

Want to understand the fundamentals first?

  1. Read about AWS OIDC Provider Setup
  2. Learn about GitHub Actions OIDC
  3. Then implement with the integration guide

Explore by Use Case

Looking for something specific?

Core Concepts

OpenID Connect (OIDC)

OIDC is an identity layer built on OAuth 2.0 that allows services to verify user identity. In secretless workflows:

  • Identity Provider (GitHub, GitLab, etc.) issues signed tokens
  • Service Provider (AWS, GCP, Azure) verifies tokens
  • Trust relationship is configured once
  • Temporary credentials are issued per request

Just-in-Time Authentication

Credentials are created exactly when needed and expire shortly after use:

  • Created on demand - Only when authentication is needed
  • Short-lived - Typically 15 minutes to 12 hours
  • Single-purpose - Scoped to specific operations
  • Automatically cleaned up - No manual revocation needed

Trust Policies

Define which external identities can assume which roles:

  • Subject claims - Identify the requesting entity (repo, branch, user)
  • Audience claims - Specify the intended recipient
  • Condition expressions - Add additional constraints
  • Least privilege - Grant minimum necessary permissions

Why This Matters

Security Incidents

Many high-profile breaches involve compromised credentials:

  • Hardcoded credentials in source code
  • Credentials leaked through CI/CD logs
  • Stolen credentials from compromised systems
  • Credentials shared too broadly

Secretless authentication eliminates these risks.

Compliance Requirements

Modern security frameworks increasingly require:

  • Regular credential rotation
  • Audit trails for all access
  • Principle of least privilege
  • Secure credential storage

Secretless authentication satisfies these requirements by design.

Industry Adoption

Major platforms now support OIDC:

  • GitHub Actions (since 2021)
  • GitLab CI/CD (since 2022)
  • Buildkite (since 2023)
  • CircleCI (since 2022)
  • AWS, GCP, Azure (all support OIDC)
  • Kubernetes (native support via service accounts)

The ecosystem has matured - now is the time to adopt.

Community and Support

This is a community-driven resource. We welcome:

  • Contributions - Add guides for new services
  • Feedback - Suggest improvements
  • Questions - Ask in discussions
  • Real-world examples - Share your implementations

Next Steps

Ready to eliminate secrets from your infrastructure?

  1. Choose your integration:
  2. Learn the details: Browse Providers and Initiators
  3. Expand your setup: Mix and match providers and initiators for your stack
  4. Share your experience: Contribute back to the community

Let's build a more secure future - one without long-lived credentials.