A Target is an endpoint for a secret such as a database, cloud platform, or server. Targets help admins keep their secrets and endpoints more organized. Instead of adding an endpoint to each secret separately, a Target can be used.


You can have multiple secrets point to the same Target, making it easy for different teams to connect and minimizing the number of Targets in your organization. Targets can also be used to sync encryption keys with an external KMS.

Using the Access Roles & RBAC capabilities, users are not required to have access to, or knowledge of, your privileged account credentials. Simply grant users with list permissions on those Target items to provide them with the ability create Dynamic Secrets Or Rotated Secrets.

For example, two Database Dynamic Secrets can be created using the same existing Target, but each with its own set of permissions.

You can also define a Target to be used with our Rotated Secrets to manage and automate your privilege account credentials rotation.

You can find the complete list of parameters for this command in the CLI Reference - Akeyless Targets section.

What’s Next