Branch | Build status |
---|---|
master | |
develop |
Having nightmares about storing and deplyoing the vulnerable configurations of your applications?
Lockbox is a dead simple, cross-platform library (API & Client), built to save your credentials (e.g. app settings) in a centralized and secured storage.
What does it mean in practice? Imagine the following scenario - you have your application configuration file containing vulnerable data. Now, how do you deploy it to the production environment? Keep credentials in private repository? Manually update the settings on your server? Encrypt and decrypt the file and re-upload to the hosting enviroment?
What if you could have a centralized service that your applications would ask for the secured settings? This is where Lockbox come in handy. Whether you have a simple website or a set of microservices - you can keep your settings in a secured and centralized storage.
In other words - it's like Vault, but much more simpler.
- API key - unique token that identifies the user.
- Box - workspace that contains one or more users and collection of encrypted entries.
- Box user - existing user in the system that was granted access to the particular box.
- Entry- key/value object containing encrypted value that can be of any type (text, number, JSON etc.).
- User - unique user in the system (available roles: user, admin) that can manage boxes and entries.
Lockbox doesn't store encryption keys! It only contains the encrypted value and its salt. Encryption key may be even unique (if you wish to do so) for each entry. It means that even if the Lockbox database was compromised, the attacker will not be able to decrypt the values.
Encryption key has to be provided via the custom HTTP Header X-Encryption-Key when creating a new entry and fetching the value of existing one. For the encryption purposes the AES algorithm is being used.
On the other hand, a secret key is being stored by Lockbox API and is used for the API key authentication mechanism based on JWT (JSON Web Tokens).
- Initialize the Lockbox for the first time.
- Create a new user account.
- Create a new box.
- Add an entry to the box using custom encryption key.
- Integrate your application by passing the custom encryption key while fetching the entry.
- Wiki
- API documentation
- Lockbox Sandbox API
- Postman local requests
- Postman sandbox requests
- CURL requests examples
Run docker container which requires an external MongoDB instance (e.g. running on localhost):
docker pull lockbox/lockbox.server
docker run -p 5000:5000 lockbox.server
Or use the docker compose to build Lockbox.Server:
git clone https://github.com/Lockbox-stack/Lockbox.Server
docker-compose up
Open the web browser at http://localhost:5000 - Lockbox API should be up and running!
In order to run the Lockbox you need to have installed:
Create a new .NET Core application and execute the following command via NuGet package manager:
dotnet add package Lockbox.Api
Change your Program.cs code to look like this:
var host = new WebHostBuilder()
.UseKestrel()
.UseContentRoot(Directory.GetCurrentDirectory())
.UseStartup<LockboxStartup>()
.Build();
host.Run();
Start the application and open the web browser at http://localhost:5000.
git clone https://github.com/Lockbox-stack/Lockbox
- Lockbox.Examples.Api - Lockbox server with minimal configuration.
- Lockbox.Examples.WebApp - Web application that uses Lockbox to fetch the vulnerable appsettings.
In order to play with Lockbox examples, please read the API docs and use the provided Postman local requests collection that will guide you through the most important concepts.
dotnet add package Lockbox.Client
Create a new .NET Core Web application and add the following code to the Startup.cs:
public IConfiguration Configuration { get; set; }
public Startup(IHostingEnvironment env)
{
var builder = new ConfigurationBuilder()
.AddLockbox(encryptionKey: "encryption_key",
apiUrl: "api_url",
apiKey: "user_api_key",
boxName: "box_name",
entryKey: "entry_name_for_app_settings");
Configuration = builder.Build();
}
When everything is set correctly, you will see that your app configuration gets updated based on the encrypted value stored in Lockbox.
You can provide all of the settings directly in the code via appsettings.json file for the Lockbox.API:
{
"feature": {
"entrySizeBytesLimit": 524288,
"entriesPerBoxLimit": 20,
"usersPerBoxLimit": 20,
"boxesPerUserLimit": 3,
"requireAdminToCreateUser": false
},
"lockbox": {
"secretKey": "your_secret_key"
},
"mongoDb": {
"connectionString": "mongodb://localhost:27017",
"database": "Lockbox"
}
}
Although, you may also use the system environment variables which might be especially useful while running the Lockbox via Docker container.
Lockbox.Api
LOCKBOX_SECRET_KEY
LOCKBOX_MONGO_CONNECTION_STRING
LOCKBOX_MONGO_DATABASE
Lockbox.Client
LOCKBOX_ENCRYPTION_KEY
LOCKBOX_API_URL
LOCKBOX_API_KEY
LOCKBOX_BOX_NAME
LOCKBOX_ENTRY_KEY
Want to contribute? Please check the contribution guidelines.