Quick usage
Manage secrets with Infisical CLI
The CLI is designed for a variety of applications, ranging from local secret management to CI/CD and production scenarios. The distinguishing factor, however, is the authentication method used.
To use the Infisical CLI in your local development environment, simply run the command below and follow the interactive guide.
If you are in a containerized environment such as WSL 2 or Codespaces, run infisical login -i
to avoid browser based login
Initialize Infisical for your project
This will create .infisical.json
file at the location the command was executed. This file contains your local project settings. It does not contain any sensitive data.
To use the Infisical CLI in your local development environment, simply run the command below and follow the interactive guide.
If you are in a containerized environment such as WSL 2 or Codespaces, run infisical login -i
to avoid browser based login
Initialize Infisical for your project
This will create .infisical.json
file at the location the command was executed. This file contains your local project settings. It does not contain any sensitive data.
To use Infisical for non local development scenarios, please create a service token. The service token will allow you to authenticate and interact with Infisical. Once you have created a service token with the required permissions, you’ll need to feed the token to the CLI.
Pass as flag
You may use the —token flag to set the token
Pass via shell environment variable
The CLI is configured to look for an environment variable named INFISICAL_TOKEN
. If set, it’ll attempt to use it for authentication.
Inject environment variables
Custom aliases can utilize secrets from Infisical. Suppose there is a custom alias yd
in custom.sh
that runs yarn dev
and needs the secrets provided by Infisical.
To make the secrets available from Infisical to yd
, you can run the following command:
View all available options for run
command here
Connect CLI to self hosted Infisical
History
Your terminal keeps a history with the commands you run. When you create Infisical secrets directly from your terminal, they’ll stay there for a while.
For security and privacy concerns, we recommend you to configure your terminal to ignore those specific Infisical commands.
Was this page helpful?