-
Notifications
You must be signed in to change notification settings - Fork 33
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Summary:
Requesting an enhancement to Playbooks to securely handle sensitive information such as API keys, HTTP headers, and other secrets by masking them in UI.
Current Limitation:
Currently, Playbooks store and display sensitive data in plain text, making it vulnerable to unauthorized access and misuse. There is no built-in mechanism to mask or securely handle this information.
Proposed Solution:
- Mask Secrets in UI:
- Implement automatic masking of sensitive values in execution logs and UI displays.
- Redact API keys, HTTP headers, authentication tokens, and other sensitive data.
- Secure Storage and Retrieval:
- Store secrets securely using encryption mechanisms.
- Provide integration with a secret manager to fetch secrets dynamically at runtime.
- Role-Based Access Control (RBAC) for Secrets:
- Ensure only authorized users can view or modify sensitive data.
- Restrict access to specific secrets based on user roles.
- Configuration Options:
- Allow users to define which keys should be masked.
- Provide flexibility in specifying custom sensitive fields.
Expected Benefits:
- Enhanced security by preventing accidental exposure of sensitive information.
- Reduced risk of unauthorized access and misuse.
- Improved compliance with security best practices and regulatory standards.
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request