Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following secret types are to be supported:

Secret typeFormatNotesWho creates?Who accesses?How does it work now?Additional notes
login & passwordStringruntime + at start; per tenantAPI keyString
  • FOLIO resource administrator
  • external system administrator
  • modules working with any resource with logopass
dif modules use their own storages for that
API keyString
  • administrator
  • system
  • modules working with APIs
dif modules use their own storages for that
tokenString
  • system
  • mod-authtoken
  • modules working with tokens


SSL certificatefile
  • administrator
  • modules using certificate for work with Kafka

Cannot be stored in SSM, Vault etc.

Encrypted S3?

Who creates? Who should have access? How does it work now?

Secret stores

...

The following secret stores are to be supported:

Secret store mechanismLinksEnvironments or needs
HarshiCorp Vaulthttps://www.vaultproject.io/on-premises installations
AWS Systems Manager Parameter Store ( or just AWS SSM)https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.htmlAWS cloud hosting
properties-file
for dev/test needs
environment variables
(question)

K8S secrets


(question)

Secrets management UI

...

(question) Home-grown unified web UI vs. store-specific UIs

Both AWS SSM and Vault have their own management user interfaces, Rancher provides an option to manage secrets in form of environment variables in UI forms.

...

...