You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* account - the account which we want to connect to
87
-
* cert_file - a path to conjur rootCA file. we need it if we initialize the client in `SslVerificationMode.SELF_SIGN`
86
+
* cert_file - a path to Secrets Manager rootCA file. we need it if we initialize the client in `SslVerificationMode.SELF_SIGN`
88
87
or `SslVerificationMode.CA_BUNDLE` mode
89
-
* service_id - a service id for the Conjur authenticator. Required when using the ldap authenticator (see below) but not when using the default `authn` authenticator.
88
+
* service_id - a service id for the Secrets Manager authenticator. Required when using the ldap authenticator (see below) but not when using the default `authn` authenticator.
90
89
* proxy_params - parameters for proxy connection. see `ProxyParams` class for more details - Optional
91
90
92
91
#### Create credentials provider
@@ -112,10 +111,10 @@ del credentials
112
111
113
112
#### Create authentication strategy
114
113
115
-
The client also uses an authentication strategy in order to authenticate to conjur. This approach allows us to implement different authentication strategies
114
+
The client also uses an authentication strategy in order to authenticate to Secrets Manager. This approach allows us to implement different authentication strategies
116
115
(e.g. `authn`, `authn-ldap`, `authn-k8s`) and to keep the authentication logic separate from the client implementation.
117
116
118
-
We provide the `AuthnAuthenticationStrategy` for the default Conjur authenticator. Example use:
117
+
We provide the `AuthnAuthenticationStrategy` for the default Secrets Manager authenticator. Example use:
119
118
120
119
```python
121
120
from conjur_api.providers import AuthnAuthenticationStrategy
This document outlines security procedures and general policies for the CyberArk Conjur
4
-
suite of tools and products.
5
-
6
-
*[Reporting a Bug](#reporting-a-bug)
7
-
*[Disclosure Policy](#disclosure-policy)
8
-
*[Comments on this Policy](#comments-on-this-policy)
9
-
10
3
## Reporting a Bug
4
+
CyberArk takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you follow responsible disclosure guidelines and contact [email protected] and work with us toward a quick resolution to protect our customers.
11
5
12
-
The CyberArk Conjur team and community take all security bugs in the Conjur suite seriously.
13
-
Thank you for improving the security of the Conjur suite. We appreciate your efforts and
14
-
responsible disclosure and will make every effort to acknowledge your
15
-
contributions.
16
-
17
-
Report security bugs by emailing the lead maintainers at [email protected].
18
-
19
-
The maintainers will acknowledge your email within 2 business days. Subsequently, we will
20
-
send a more detailed response within 2 business days of our acknowledgement indicating
21
-
the next steps in handling your report. After the initial reply to your report, the security
22
-
team will endeavor to keep you informed of the progress towards a fix and full
23
-
announcement, and may ask for additional information or guidance.
24
-
25
-
Report security bugs in third-party modules to the person or team maintaining
26
-
the module.
27
-
28
-
## Disclosure Policy
29
-
30
-
When the security team receives a security bug report, they will assign it to a
31
-
primary handler. This person will coordinate the fix and release process,
32
-
involving the following steps:
33
-
34
-
* Confirm the problem and determine the affected versions.
35
-
* Audit code to find any potential similar problems.
36
-
* Prepare fixes for all releases still under maintenance. These fixes will be
37
-
released as fast as possible.
38
-
39
-
## Comments on this Policy
40
-
41
-
If you have suggestions on how this process could be improved please submit a
42
-
pull request.
6
+
Refer to [CyberArk's Security Vulnerability Policy](https://www.cyberark.com/cyberark-security-vulinerability-policy.pdf) for more details
0 commit comments