Search⌘ K
AI Features

Docker Secrets

Explore how to securely manage sensitive application data such as passwords, certificates, and SSH keys using Docker Secrets in Swarm mode. Learn the lifecycle of secrets, their encryption in transit and at rest, and how Docker mounts them securely to specific service containers to maintain strict access control and isolation.

Most applications leverage sensitive data such as passwords, certificates, and SSH keys. Fortunately, Docker lets you wrap them inside secrets to keep them secure.

Note: Secrets only work in Swarm mode as they leverage the cluster store.

Docker secret management

Behind the scenes, Docker encrypts secrets ...