On Thu, 22 Aug 2019, 08:30 Michal Hajas, <mhajas(a)redhat.com> wrote:
Hi all,
we are getting together fields that can obtain their value from the vault.
We decided to start with a small subset of fields and then add more
if needed.
Suggested subset is following:
- SMTP password
- LDAP password
- Identity provider secret
+1 to all above
- Client secret (should be easy)
-1 We should recommend jwt auth or mtls here instead as it provides better
security. When those are used Keycloak only stores the public part so
doesn't need to be stored securely.
> There are also other fields which we were considering, however, we decided
> not to add them for now. Feel free to comment on any of these fields or
> suggest new once. We are open to add any new fields in case of reasonable
> arguments.
> - KeyProviders - This part should be probably added soon
as some follow-up
> work. It might be a little bit tricky as we don't want to duplicate each
> KeyProvider with its Vaul*KeyProvider version.
Can't we just add an option to existing providers to be able to load keys
from the vault?
- Saml keys (private key for signing, encryption)
OIDC keys as well. Let's do this on demand though as I'm not convinced this
belongs in the vault, but should rather be encrypted.
- External tokens from identity brokering
Tokens doesn't belong in the vault. They should be stored encrypted in the
db.
- User credentials (hashed passwords, OTP secrets, etc.)
User credentials should not be stored in the vault. They should be
encrypted in the db. Further I don't think it's needed to even encrypt.
Passwords are hashed. OTP secrets have their limitation anyways and the
future is webauthn which means Keycloak only stores the public key.
- Credential Attributes
What credential attributes? Can you give some examples here?
- Federated User Credentials
These are just stored as hashed passwords right? As user credentials they
should be encrypted in db not stored in the vault.
- Federated User Credential Attributes
> Best regards,
> Michal
> _______________________________________________
> keycloak-dev mailing list
> keycloak-dev(a)lists.jboss.org
>
https://lists.jboss.org/mailman/listinfo/keycloak-dev