There’s a nice overview of techniques here: Comparison of different key/secret managing schemes - #22 by ctem
Ultimately you will always need to manage at least one key manually, though the overhead can be controlled.
There’s a nice overview of techniques here: Comparison of different key/secret managing schemes - #22 by ctem
Ultimately you will always need to manage at least one key manually, though the overhead can be controlled.