You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Document keep iam command and onboarding flow updates
- Add full keep iam reference to CLI docs
- Update init docs to show complete setup flow (vault, workspace, IAM)
- Document shell auto-init on first run
- Add keep iam callouts to SSM and Secrets Manager IAM sections
- Update AWS authentication docs with keep iam generation
- Update vault:add docs to mention IAM offer
Copy file name to clipboardExpand all lines: docs/guide/shell/index.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,8 @@ Launch the interactive shell with the `shell` command:
10
10
keep shell
11
11
```
12
12
13
+
If Keep hasn't been initialized yet, running `keep shell` (or just `keep` with no arguments) will automatically walk you through the setup process first.
Copy file name to clipboardExpand all lines: docs/guide/vaults/aws-secrets-manager.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,8 @@ You'll be prompted for:
38
38
39
39
## IAM Permission Scenarios
40
40
41
+
> **Quick start:** Run `keep iam` to generate a ready-to-use IAM policy based on your actual configuration. The examples below are for reference and custom setups.
42
+
41
43
Keep uses **tag-based permissions** for Secrets Manager to provide fine-grained access control. All secrets are tagged with `ManagedBy=Keep`, `Namespace={namespace}`, `Env={env}`, and `VaultSlug={vault}` for precise permission boundaries.
Copy file name to clipboardExpand all lines: docs/guide/vaults/aws-ssm.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,8 @@ You'll be prompted for:
40
40
41
41
## IAM Permission Scenarios
42
42
43
+
> **Quick start:** Run `keep iam` to generate a ready-to-use IAM policy based on your actual configuration. The examples below are for reference and custom setups.
44
+
43
45
Let's look at how to set up IAM permissions for different roles in your organization when using AWS SSM Parameter Store with Keep. These examples assume a namespace of "myapp" and use the default KMS key for SSM.
0 commit comments