Offboarding Developers Securely: Revoking Access to Shared Configs
When someone leaves the team: revoke their API token, rotate shared secrets, remove their machine, and verify everything with snapshot history.
The Offboarding Problem
When a developer leaves your organization, you need to revoke their access to everything: source code repositories, cloud consoles, CI/CD pipelines, and communication tools. Most companies have checklists for this. But developer environment secrets are almost always overlooked.
The departing developer's laptop contains production database credentials, AWS access keys, SSH keys to your servers, API tokens for third-party services, and environment files with secrets that may not exist anywhere else. If they used a dotfile manager or manual setup, there is no central system to revoke. You have to trust that they deleted everything.
With ConfigSync, offboarding is a structured process: revoke the token, rotate secrets, remove the machine, and verify with the audit trail.
Step 1: Revoke the API Token
Every machine in ConfigSync authenticates with an API token. Revoking that token immediately cuts off access to all synced configurations and secrets.
Step 2: Remove Their Machine
After revoking the token, remove their machine from your account. This cleans up the machine list and ensures their device no longer appears in your dashboard.
Step 3: Rotate Shared Secrets
If the departing developer had access to shared team secrets, those secrets should be rotated. They were encrypted with the team's master password, and while the developer cannot access them through ConfigSync anymore, they may have copies on their local machine.
Step 4: Verify with Audit Trail
The snapshot history tells you exactly what the departing developer last accessed. This is critical for determining the scope of secret rotation needed.
| Action | How to Verify | What to Look For |
|---|---|---|
| Token revoked | Dashboard > Tokens | Token no longer listed |
| Machine removed | configsync machines list | Device not in list |
| Last access time | configsync history --machine | Timestamp of last pull |
| Secrets accessed | configsync history --machine | Which tiers were pulled |
| Secrets rotated | configsync history | New snapshot with rotations |
The Offboarding Checklist
Here is the complete offboarding checklist for ConfigSync access:
Why Token-Based Auth Makes Offboarding Clean
The reason ConfigSync makes offboarding straightforward is that authentication is token-based. Each machine has its own token. Revoking one token does not affect any other machine. There is no shared credential to rotate (except the master password in extreme cases), no SSH key to remove from multiple servers, and no access list to update across services.
Compare this to the typical offboarding process for developer environments: ask the person to delete their local files, hope they do it, rotate every shared credential because you have no way to know what they copied, and update a dozen access lists across different services. ConfigSync reduces this to four API calls and a secret rotation.
Offboarding is one of those processes that organizations get wrong repeatedly because it is complex and infrequent. With ConfigSync, the process is simple, verifiable, and complete. Revoke the token, rotate the secrets, and move on.
Ready to try ConfigSync?
Sync your entire dev environment across machines in minutes. Free forever for up to 3 devices.