Provide Method for Saving Secrets in different format e.g. base64 encoded #97
Description
Use case : Programmatically accessing Azure DEVOps is through the use of Personal Access Tokens (PAT). The PAT has to be base64 encoded when constructing the auth. header.
Can the Get/Set-Secret cmdlets improve security when dealing with Personal Access Tokens, for example GitHub and Azure DEVOps, as well as other API that require the parsing of an authentication header? Having the text in insecure memory for as short a time as possible would be beneficial.
At the moment I'm using the Set-Secret to save the encoded base64 PAT but that still means variables that are potentially unsafe and need properly handling in memory. At least being able to pull the value from the store means I'm not having to manipulate it every time I call it out of credential manager. Now I just need to worry about auth. header variable and securely destroying that after use.