Infisical
Secrets Management on Autopilot.
Overview
All-in-one platform to securely manage application configuration and secrets across your team and infrastructure. Used by Fortune 500 enterprises, international governments, and fastest-growing startups. Save time and boost security.
Self-Hosting
CLI Reference
Installation
bun add -g @infisical/cliLogin
Login into Infisical from the CLI
- Interactive
infisical login- Non-interactive
--plain: When used with direct user login or machine identity authentication, outputs only the JWT access token without any additional formatting. This is useful for scripting and CI/CD pipelines where you need to capture the token.--silent: Use it alongside the--plainflag to disable all messages in the console except from the access token.
infisical login \
--domain "<YOUR_DOMAIN>" \
--email "<YOUR_EMAIL>" \
--password "<YOUR_PASSWORD>" \
--organization-id "<YOUR_ORGANIZATION_ID>" \
--plain \
--silentInit
Switch between Infisical projects within CLI
infisical initLink a local project to your Infisical project. Once connected, you can then access the secrets locally from the connected Infisical project.
This command creates a
.infisical.jsonfile containing your Project ID.
Export
Export Infisical secrets from CLI into different file formats
infisical export --env=dev --output-file=./.env.development--env: The environment to export secrets for, defaults todev. Can be one of:dev,staging,prod.--projectId: By default the project id is retrieved from the.infisical.jsonlocated at the root of your local project. This flag allows you to override this behavior by explicitly defining the project to fetch your secrets from.