-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/innkeeper api key UI #765
Conversation
Deployment URLs ready for review. |
Signed-off-by: Lucas ONeil <[email protected]>
Signed-off-by: Lucas ONeil <[email protected]>
Signed-off-by: Lucas ONeil <[email protected]>
Signed-off-by: Lucas ONeil <[email protected]>
50d9170
to
47c4899
Compare
Signed-off-by: Lucas ONeil <[email protected]>
@loneil could we have the api key displayed in the UI instead of treating it as a password that is displayed only once? I think it would make it easier for tenants to fetch the value and manage their keys (i.e.: knowing who is assigned which key, when more than one is available). Additionally, it is going to be easy to delete and recreate a key so it is not too concerning in my opinion to have it listed somewhere in the UI. |
The thing is it's not persisted like that. Same as the reservation password it's stored as a salt/hash instead (#740). Figured that was the good security practice for API keys but we could step it down to just storing plain text for retrieval if required. |
I am leaning towards plaintext for that, I think it would make life easier, but am open to leaving it protected if the security concern is high. |
I would suggest we handle keys and passwords in a secure way and avoid clear text as much as possible. |
@loneil we will definitely need tenant self-management of api-keys if we keep them encrypted - having the innkeeper be able to generate the first one (or in edge cases) will help, but we don't want to have the overhead of having to communicate back-and-forth with the tenant every time they need a key rotated/recreated. The issue with having the api-keys not visible even to the tenant is that, in case one gets compromised, ALL of them will need to be deleted and re-created. Could we maybe use a (known) part of the wallet key to salt the api-keys, so that the tenant should be able to enter it to decode the encrypted values if they need to do so? |
Yes the self-serve tenant creation will be an important next step. It's a salt/hash pair so it's a hash of the salt and password that's stored, not an encryption of the plaintext password. |
If we have a label that they might use to identify which record they are looking at might be good enough at least for now. |
It's an optional field but might be worth making mandatory to ensure it? |
yes, I think so |
Signed-off-by: Lucas ONeil <[email protected]>
Create an API Key as an Innkeeper for tenants.