This is speculation without knowing your scope and architecture, but perhaps part of the puzzle is two factor authentication via a $20 Yubico FIDO U2F Security Key. https://www.yubico.com/store/ https://www.yubico.com/about/background/fido/ https://www.yubico.com/2016/02/use-of-fido-u2f-security-keys-focus-of-2-year-google-study/
BSD licensed C library for server-side.. https://developers.yubico.com/libu2f-server/ https://developers.yubico.com/U2F/Libraries/Using_a_library.html cheers -ben P.S. It might be cool to link the yubico client-side libraries (LGPL) into the VM for Iceberg to authenticate via U2F to github. https://github.com/blog/2071-github-supports-universal-2nd-factor-authentication https://www.yubico.com/why-yubico/for-individuals/github/ https://github.com/Yubico/libu2f-host On Thu, Feb 23, 2017 at 9:31 PM, sergio ruiz <sergio....@gmail.com> wrote: > Now that i think about it.. this will contain a list of passwords for > servers, etc.. each user will need to access about a dozen company > passwords.. trying to thing about how to keep this buttoned down.. > > > On February 22, 2017 at 9:19:05 AM, Alexandre Bergel ( > alexandre.ber...@me.com) wrote: > > If it help I’m using NaCl to do secure the passwords. You should not store > the passwords of your users, not even encrypted. > > ---- > peace, > sergio > photographer, journalist, visionary > >