Secure, store, and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets.