Team Setup
Keyway uses GitHub's permission model - if someone has access to the repo, they can access the secrets.
How permissions work
| GitHub Role | Secret Access |
|---|---|
| Admin | Full access + manage environments |
| Maintain | Read & write secrets |
| Write | Read & write secrets |
| Triage | Read-only access |
| Read | Read-only access |
No separate invitations needed. Add team members to your GitHub repo, and they're automatically authorized.
Onboarding a team member
1. Add them to the GitHub repo
Go to your repository settings → Collaborators → Add people.
2. They install and login
npm install -g @keywaysh/cli
keyway login
3. They pull secrets
git clone git@github.com:your-org/your-project.git
cd your-project
keyway pull
That's it! They now have access to the secrets.
Environment-specific permissions
By default, all environments inherit GitHub repo permissions. Admins can customize this via the dashboard or the API.
Audit trail
All secret operations are logged. View activity in the dashboard or via API:
curl -H "Authorization: Bearer $TOKEN" \
https://api.keyway.sh/v1/activity
Best practices
- Use GitHub teams for easier permission management
- Create environment-specific restrictions for production secrets
- Review the audit log regularly
- Rotate secrets after team member departures