Projects
A project defines a specific scope of work for a given product line in Infisical. Projects are created within an organization, and an organization can contain multiple projects across different product types.Project Types
Infisical supports project types, each representing a different security product with its own dashboard, workflows, and capabilities.
- Secrets Management: Securely store, access, and distribute secrets across environments with fine-grained controls, automatic rotation, and audit logging.
- Secrets Scanning: Detect hardcoded secrets in code, CI pipelines, and infrastructure—integrated with GitHub, GitLab, Bitbucket, and more.
- Infisical PKI: Issue and manage X.509 certificates using protocols like EST, with support for internal and external CAs.
- Infisical SSH: Provide short-lived SSH access to servers using certificate-based authentication, replacing static keys with policy-driven, time-bound control.
- Infisical KMS: Encrypt and decrypt data using centrally managed keys with enforced access policies and full audit visibility.
Roles and Access Control
Users and machine identities must be added to a project to access its resources. Each identity is assigned a project-level role that defines what they can manage—such as secrets, certificates, or SSH access. These roles apply to both individuals and user groups, enabling scalable access across teams and environments. Project access is strictly scoped: only members of a project can view or manage its resources. If someone needs access but isn’t part of the project, they can submit an access request. Each project in Infisical has its own access control model, distinct from organization-level access control. While organization roles govern broader administrative access, project-level roles control what users, groups, and machine identities can do within the boundaries of a specific project—such as managing secrets, issuing certificates, or configuring SSH access. Depending on the project type (e.g. Secrets Management, PKI, SSH), project-level access control supports advanced features like temporary access, access requests, and additional privileges.