This is speculation without knowing your scope and architecture,
but perhaps part of the puzzle is two factor authentication
via a $20 Yubico FIDO U2F Security Key.
https://www.yubico.com/store/
https://www.yubico.com/about/background/fido/
https://www.yubico.com/2016/02/use-of-fido-u2f-security-keys-focus-of-2-year-google-study/

BSD licensed C library for server-side..
https://developers.yubico.com/libu2f-server/
https://developers.yubico.com/U2F/Libraries/Using_a_library.html

cheers -ben


P.S. It might be cool to link the yubico client-side libraries (LGPL)
into the VM for Iceberg to authenticate via U2F to github.
https://github.com/blog/2071-github-supports-universal-2nd-factor-authentication
https://www.yubico.com/why-yubico/for-individuals/github/
https://github.com/Yubico/libu2f-host



On Thu, Feb 23, 2017 at 9:31 PM, sergio ruiz <sergio....@gmail.com> wrote:

> Now that i think about it.. this will contain a list of passwords for
> servers, etc.. each user will need to access about a dozen company
> passwords.. trying to thing about how to keep this buttoned down..
>
>
> On February 22, 2017 at 9:19:05 AM, Alexandre Bergel (
> alexandre.ber...@me.com) wrote:
>
> If it help I’m using NaCl to do secure the passwords. You should not store
> the passwords of your users, not even encrypted.
>
> ----
> peace,
> sergio
> photographer, journalist, visionary
>
>

Reply via email to