Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make clientSecretAlias configurable #468

Closed
paullatzelsperger opened this issue Oct 2, 2024 · 0 comments · Fixed by #469
Closed

Make clientSecretAlias configurable #468

paullatzelsperger opened this issue Oct 2, 2024 · 0 comments · Fixed by #469
Assignees
Labels
api enhancement New feature or request

Comments

@paullatzelsperger
Copy link
Member

Feature Request

When ParticipantContexts are created via IH's Identity API, it automatically creates an STS account (if STS is embedded in IH).
In doing so, a client_secret is generated (using a pluggable StsClientSecretGenerator). However, there currently is no way
to influence the alias, under which the client_secret is stored in the Vault, instead, it is hard-coded to "<participant-id>-sts-client-secret".

This is obscure, and could theoretically cause collisions in the Vault.

Which Areas Would Be Affected?

ParticipantContext API

Why Is the Feature Desired?

Configurability, avoid collisions in the Vault

Solution Proposal

Add to the ParticipantManifest a map of extensible properties

@paullatzelsperger paullatzelsperger added api enhancement New feature or request labels Oct 2, 2024
@paullatzelsperger paullatzelsperger self-assigned this Oct 2, 2024
@github-actions github-actions bot added the triage all new issues awaiting classification label Oct 2, 2024
@paullatzelsperger paullatzelsperger removed the triage all new issues awaiting classification label Oct 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
api enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant