Back to Infisical

Overview

docs/documentation/getting-started/overview.mdx

0.159.252.3 KB
Original Source

import AiAgentsCallout from "/snippets/ai-agents-callout.mdx";

<Card title="What is Infisical?" href="/documentation/getting-started/introduction"

Learn what Infisical is and how it can help you manage secrets, certificates, and secure access across your infrastructure. </Card>

Products

<Columns cols="2"> <Card title="Secrets Management" href="/documentation/platform/secrets-mgmt/overview" icon="vault" > Securely store, manage, and control access to sensitive application secrets across your environments. </Card> <Card title="Secrets Scanning" href="/documentation/platform/secret-scanning/overview" icon="radar" > Automatically detect and alert on hardcoded secrets in source code, CI pipelines, and infrastructure. </Card> <Card title="Certificate Management" href="/documentation/platform/pki/overview" icon="file-certificate" > Automate CA and X.509 certificate lifecycle management across your infrastructure. </Card> <Card title="Infisical PAM" href="/documentation/platform/pam/overview" icon="user-shield" > Manage access to resources like databases, servers, and accounts with policy-based controls and approvals. </Card> <Card title="Infisical KMS" href="/documentation/platform/kms/overview" icon="key" > Encrypt and decrypt sensitive data using a centralized key management system. </Card> </Columns>

Resources

<Columns cols="2"> <Card title="CLI Reference" icon="terminal" href="/cli/overview"> Explore Infisical’s command-line interface for managing secrets, certificates, and system operations via terminal. </Card> <Card title="API Reference" icon="book-open-lines" href="/api-reference/overview/introduction"> Browse Infisical’s API documentation to programmatically interact with secrets, access controls, and certificate workflows. </Card> </Columns> <Columns cols="2"> <Card title="Self-Hosting" icon="server" href="/self-hosting/overview"> Learn how to deploy and operate Infisical on your own infrastructure with full control and data ownership. </Card> <Card title="Security" icon="shield" href="/internals/security"> Learn about the security model and implementation best practices. </Card> </Columns> <AiAgentsCallout />