Skip to content

Masking Secrets in Playbooks #502

@sourabhbhandari

Description

@sourabhbhandari

Summary:
Requesting an enhancement to Playbooks to securely handle sensitive information such as API keys, HTTP headers, and other secrets by masking them in UI.

Current Limitation:
Currently, Playbooks store and display sensitive data in plain text, making it vulnerable to unauthorized access and misuse. There is no built-in mechanism to mask or securely handle this information.

Proposed Solution:

  • Mask Secrets in UI:
  1. Implement automatic masking of sensitive values in execution logs and UI displays.
  2. Redact API keys, HTTP headers, authentication tokens, and other sensitive data.
  • Secure Storage and Retrieval:
  1. Store secrets securely using encryption mechanisms.
  2. Provide integration with a secret manager to fetch secrets dynamically at runtime.
  • Role-Based Access Control (RBAC) for Secrets:
  1. Ensure only authorized users can view or modify sensitive data.
  2. Restrict access to specific secrets based on user roles.
  • Configuration Options:
  1. Allow users to define which keys should be masked.
  2. Provide flexibility in specifying custom sensitive fields.

Expected Benefits:

  • Enhanced security by preventing accidental exposure of sensitive information.
  • Reduced risk of unauthorized access and misuse.
  • Improved compliance with security best practices and regulatory standards.

Metadata

Metadata

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions