With Cerby, you have a secure way to save and share your important corporate information through Secrets. This feature helps you write, edit, view, and share text-based information and attachments with other users and teams in Cerby.
Currently, Cerby supports the following secret items:
Secret: It is the equivalent of a secure note in a password management platform. A secret contains sensitive and valuable information to which you want to restrict access.
WiFi: It contains information about your WiFi network.
SSH keys: They contain the Secure Shell (SSH) key pairs and details such as passphrases for secure remote access to servers and systems.
Database: It contains the login credentials and details of a database, such as MySQL, Oracle, or SQL Server.
Server: It contains the login credentials and details of a server.
Software license: It contains vital information about a software license such as the license key, the publisher, and support contact.
Custom item: It contains customized information that doesn’t fit any of the other secret types
Cerby protects the secret items you save in your vaults with the encryption scheme chosen by your organization: cloud and local encryption. Additionally, you can set up an identity challenge for Cerby users with shared access who want to view or edit a secret. For more information about our encryption schemes, read the article How Cerby protects your data with cloud and local encryption.
All Cerby Automate and Cerby Protect users, except Guest users, can add a secret item to their workspace to manage and secure it through Cerby. When you add a secret item, you automatically become Owner of it, and when you share access with other workspace users or teams, you can assign them one of the following two roles:
Owner: They can share access, edit, add attachments, and manage the secret item settings.
Collaborator: They can only view the secret item and download the attachments.
For more information about roles and the actions users can perform on a secret item, read the article How Cerby manages roles.
You can add your secret items and attachments to Cerby manually or import them from your password manager. For instructions, read the following articles:
For more information on the size limits and supported formats of secrets and attachments, read the Specifications section.
All secret types are displayed as cards in your dashboard, whether you use the Cerby web app, browser extension, or mobile app. Figure 1, Figure 2, and Figure 3 show secret cards on the Cerby web app, browser extension, and mobile app dashboards, respectively.
Figure 1. Secret cards in the Secrets view of the Cerby web app dashboard
Figure 2. Secret cards in the Secrets tab of the Cerby browser extension dashboard
Figure 3. Secret cards in the Secrets tab of the Cerby mobile app dashboard
Use the supported features of Secrets
The following are the supported features of Secrets:
Specifications
The following are the specifications on the size limits and supported formats of secrets, secret items, and attachments:
Notes field: You can enter up to 45,000 characters in the Notes field of a secret and secret item.
Input fields: You can enter up to 255 characters in the input fields, except the Notes field, of any secret and secret item.
Password field: Secret items that support the Password field (such as server, database, and WiFi) have their value masked.
Attachments: You can add as many file attachments as you want to a secret, and these files must not exceed 10 MB in size. The following are the supported file formats:
CSV
JSON
DOC
DOCX
ODT
PPT
PPTX
TXT
LOG
XLS
XLSX
PDF
PNG
JPG
JPEG
MPEG
MP4
M4A
WAV
AVI
RTF
HTML
HTM
MOV
TIFF
TIF
WMV
ZIP
RAR
KEY
P7B
P7C
P7R
P8
P10
P12
CSR
CER
CRL
CRT
DER
PEM
PFX
SPC
CERT