Skip to content

Commit 8a4f38f

Browse files
arnoldmr01potiuk
andauthored
Clarify policy for exposing sensitive data (#59864)
* doc: clarify policy for exposing sensitive data * Update airflow-core/docs/security/security_model.rst --------- Co-authored-by: Jarek Potiuk <jarek@potiuk.com>
1 parent b78efb0 commit 8a4f38f

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

airflow-core/docs/security/security_model.rst

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,15 @@ Those users should be highly trusted not to misuse this capability.
131131
been changed in Airflow 3 to improve security of the accidental spilling of credentials of the connection configuration
132132
users. Previously - in Airflow 2 - the **Connection configuration users** had deliberately access to view the
133133
sensitive information and could either reveal it by using Inspect capabilities of the browser or they were plain visible in
134-
case of the sensitive credentials stored in configuration extras. Airflow 3 and later versions include security
135-
improvement to mask those sensitive credentials at the API level.
134+
case of the sensitive credentials stored in configuration extras. Airflow 3 and later versions mask these sensitive credentials
135+
at the API level and do not return them in clear text.
136+
137+
About Sensitive information
138+
...........................
139+
140+
Sensitive information consists of connection details, variables, and configuration. In Airflow 3 and later versions, sensitive information will not be exposed to users via API, UI, ``airflowctl``.
141+
However, ``task-sdk`` still provides access to sensitive information (e.g., Use SDK API Client to get Variables with task-specific ``JWT`` token). Local CLI will only return keys except when using ``--show_values``.
142+
Sensitive information has been masked in logs, UI, and API outputs. In case of Dag author expose sensitive information in other way (e.g., via environment variables), those values will not be masked.
136143

137144
Audit log users
138145
...............

0 commit comments

Comments
 (0)