-
Notifications
You must be signed in to change notification settings - Fork 18
docs: ADR-0004: authentication types and encrypted secrets #104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Jonathan Howard <jonathan.w.howard@lmco.com>
Can you talk to what the user experience would be? Are you think that if a encrypted password is accessed, the user would be prompted for a decrypt key? I see the benefits of SOPS to encrypt secrets that are stored in version control or other configuration files stored outside of a deployed environment. If the intent would be for the keypair or master key is stored on the same system as the bomctl config, I think the security benefits would be negated. @eddiezane @ashearin what are your thoughts? |
Per working group session 8/5/24. For now leave as proposed, be reevaluated for a future release. |
4. Authentication types and secrets encryption
Date: 2024-07-11
Status
Proposed
Context
Additional authentication mechanisms and secure secrets storage should be supported.
Decision
Add support for additional authentication mechanisms:
Secrets provided as plain text will be encrypted with a user-provided or auto-generated key pair.
Add a config file mapping of URLs or bare hostnames to associated user credentials.
auto-generate a new key pair
Either leverage the SOPS tool as a library to perform the encryption/decryption,
or use its encrypted string expression form.
Example of proposed config file additions:
Consequences
These changes will increase flexibility for users by allowing fetching from and pushing to additional
remote endpoints that may have limited or strict options for authentication. They will also provide
enhanced security options for local storage and transmission of secrets.