<div dir="auto">Following on from my last e-mail this brings us to a follow on step for the users that are looking to externalise both their username and credential configuration together.<div dir="auto"><br></div><div dir="auto">Within the Elytron subsystem I can now add a new 'authentication-client-file' resource to load static definitions from file, as static definitions these will not be manageable. By using child resources however I can still hook these into capabilities to make them referenceable.</div><div dir="auto"><br></div><div dir="auto">By loading from file we could also consider a couple of additional options such as encrypting the file, we could also consider bundling within a jar allowing other resources such as keytabs and certificates to be bundled with the configuration.</div><div dir="auto"><br></div><div dir="auto">After this stage we then have further possibilities to expand on this further.</div><div dir="auto"><br></div><div dir="auto">We could add a custom authentication-client resolver SPI to allow for custom resolvers, anyone who wants to resolve from custom locations could add their own implementation. In hosted environments such as OpenShift custom resolvers could be used to obtain authentication policies being managed elsewhere without relying on property expansion.</div><div dir="auto"><br></div><div dir="auto">Additionally by having all of this wrapped in an API we have the ability to add both auditing and authorization for anything accessing this configuration - something that is not possible in solutions that rely on expression expansion.</div><div dir="auto"><br></div><div dir="auto">Regards,</div><div dir="auto">Darran Lofthouse.</div><div dir="auto"><br></div><div dir="auto"><br></div></div><br><div class="gmail_quote"><div dir="ltr">On Fri, 7 Dec 2018, 11:32 Darran Lofthouse <<a href="mailto:darran.lofthouse@redhat.com">darran.lofthouse@redhat.com</a> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><br><div class="gmail_quote"><div dir="ltr">On Fri, Dec 7, 2018 at 1:34 AM Brian Stansberry <<a href="mailto:brian.stansberry@redhat.com" target="_blank" rel="noreferrer">brian.stansberry@redhat.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div style="font-family:trebuchet ms,sans-serif"><br></div><br><div class="gmail_quote"><div dir="ltr">On Tue, Dec 4, 2018 at 12:31 PM Martin Choma <<a href="mailto:mchoma@redhat.com" target="_blank" rel="noreferrer">mchoma@redhat.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">A few thoughts:<br>
<br>
Real Time Updates<br>
- Runtime changes in era of OpenShift become less and less important<br>
as configuration should be immutable. Runtime changes should be<br>
addressed on OpenShift level. At least in past some of my "runtime<br>
changes" issues were denied with this argument.<br></blockquote><div><br></div><div style="font-family:"trebuchet ms",sans-serif">This is certainly something to consider when considering any new management functionality.</div><div style="font-family:"trebuchet ms",sans-serif"><br></div><div style="font-family:"trebuchet ms",sans-serif">Another thing to consider is what services are going to utilize any real-time update? Are there many resources that respond to a credential attribute value change (e.g. write-attribute) without triggering reload-required? If they do trigger reload-required it seems likely that's because making a new value take effect was considered to be too difficult compared to the gain. In an immutable world the gain is likely even less.</div></div></div></blockquote><div><br></div><div>Yes the real time updates could only ever be approached on a resource by resource basis so existing resources (at least we have a finite set to consider) would either need to already update real time password updates or be retrospectively modified to support them - for the credential store the best we can do it make this a possibility.</div><div> </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div class="gmail_quote"><div style="font-family:"trebuchet ms",sans-serif"></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
- If this will be decided to accomplish I think it is enough when<br>
updates take in action on explicit administrator command.<br>
<br>
Support for Expressions<br>
- Really question here is if vault wasn't misused as external<br>
configuration storage for standalone.xml holding environment<br>
properties on one place. Which could be more convenient as specifying<br>
bunch of system properties. If so we should address this feature<br>
separately - way to specify configuration property file for server<br>
standalone.xml.<br></blockquote><div><br></div><div style="font-family:"trebuchet ms",sans-serif">I hope people aren't using a vault just for that. If you want to group together properties you can use bin/standalone.sh -P. On OpenShift you can mount a ConfigMap as a source of env var values, and env vars are used in expression resolution.</div><div style="font-family:"trebuchet ms",sans-serif"><br></div><div style="font-family:"trebuchet ms",sans-serif">I could imagine people sticking a username in a vault just because they put the password in the vault and administratively it was simpler to manage the two related values together. No idea if that's really done; I just can imagine it. ;)</div></div></div></blockquote><div><br></div><div>Rather than focusing on the management side of the credential store and features like real time updates it feels to me that emphasis should be on this username / password problem - any enhancements in this area having a better chance for long term relevance.</div><div><br></div><div>As I have mentioned previously we know we have some resources that only require a credential, such as unlocking a local KeyStore.</div><div><br></div><div>The username / password pairing is a common issue - we don't really have a clean solution for this yet so would be a good area to focus.</div><div><br></div><div>However a number of newer authentication mechanisms have moved beyond the traditional username / password combo, some need an alternative to a password, some don't need a username at all. These also often have an option to delegate the callers identity to the remote endpoint etc...</div><div><br></div><div>Better solving these last two would seem to be a better investment of effort, regardless of how static future configurations do or do not become this would still be relevant.</div><div><br></div><div>We already have the client side authentication context which provides a very flexible configuration selection approach based on the endpoint being connected to and additional information available as the connection is requested. Whilst very flexible this does add a level of complexity in understanding how the configuration is assembled and how mappings are applied.</div><div><br></div><div>The next resource we have is the existing authentication-configuration, this is effectively a single client side authentication policy for an outbound connection. </div><div><br></div><div>I think from an end users perspective it is clearer to visualise a 1:1 relationship between the resource defining the outbound connection and the resource defining the authentication policy. From a tooling perspective as these are linked by capabilities a user doesn't even need to fully see the separation, e.g. as you edited a datasource the console could offer an option to edit the authentication-configuration which could open without forcing the user to navigate to a different location in the model hierarchy.</div><div><br></div><div>We would need to look into more detail as to the suitability of this resource and exactly how we would integrate it but this would generally be my preferred starting point over trying to replicate expression expansion.</div><div> <br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div class="gmail_quote"><div style="font-family:"trebuchet ms",sans-serif"><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
- If purpose is to really treat different arguments as security<br>
sensitive then proposed encryption/decryption way seems promising to<br>
me.<br>
<br>
On Wed, Sep 26, 2018 at 3:22 PM Darran Lofthouse<br>
<<a href="mailto:darran.lofthouse@jboss.com" target="_blank" rel="noreferrer">darran.lofthouse@jboss.com</a>> wrote:<br>
><br>
> During WildFly 15 and WildFly 16 I am looking at the next stages for credential store development based on a few feature requests we have not handled yet.<br>
><br>
> We are at the stage where this development is likely to affect multiple areas of the application server, additionally we need to consider these requests as a set so we don't take a decision for one that prevents us working on the remainder.<br>
><br>
> I have put together a blog post describing some of the general issues we want to look into: -<br>
><br>
> <a href="http://darranl.blogspot.com/2018/09/wildfly-elytron-credential-store-next.html" rel="noreferrer noreferrer" target="_blank">http://darranl.blogspot.com/2018/09/wildfly-elytron-credential-store-next.html</a><br>
><br>
> Some of these changes will have an impact on any subsystem currently referencing the credential store.<br>
><br>
> Other changes we will need to decide if the solution lies within WildFly Elytron, the management tier of the server, or the admin tools - or possibly a combination of all three.<br>
><br>
> I am also going to share this link in the community forums to try and obtain some additional feedback from end users.<br>
><br>
> Regards,<br>
> Darran Lofthouse.<br>
> _______________________________________________<br>
> wildfly-dev mailing list<br>
> <a href="mailto:wildfly-dev@lists.jboss.org" target="_blank" rel="noreferrer">wildfly-dev@lists.jboss.org</a><br>
> <a href="https://lists.jboss.org/mailman/listinfo/wildfly-dev" rel="noreferrer noreferrer" target="_blank">https://lists.jboss.org/mailman/listinfo/wildfly-dev</a><br>
_______________________________________________<br>
wildfly-dev mailing list<br>
<a href="mailto:wildfly-dev@lists.jboss.org" target="_blank" rel="noreferrer">wildfly-dev@lists.jboss.org</a><br>
<a href="https://lists.jboss.org/mailman/listinfo/wildfly-dev" rel="noreferrer noreferrer" target="_blank">https://lists.jboss.org/mailman/listinfo/wildfly-dev</a><br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="m_7134372807292581019m_7355516987941093080m_-646338351475464315gmail_signature"><div dir="ltr">Brian Stansberry<div>Manager, Senior Principal Software Engineer</div><div>Red Hat</div></div></div></div>
</blockquote></div></div>
</blockquote></div>