Adding Statefulness to HSM Demo #1000
Replies: 3 comments 11 replies
-
So the rotation operation will be manual, and then we use the alias for setting and getting against the public key? |
Beta Was this translation helpful? Give feedback.
-
@l-monninger Maybe I'm misunderstanding something here but I have one really big concern. I was under the impression we were setting up all of the key infrastructure to not store keys on machines and instead always making a call out to another service to pull them in. I especially think storing that state on disk is an anti-pattern to the secure handling of keys. What's the justification for needing to store the keys and not just make a call out to KMS and vault whenever the application needs them? |
Beta Was this translation helpful? Give feedback.
-
@l-monninger I've created and merged PR #1001 into #986. This adds an It can be updated with a curl request to the
Look up the public key:
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Summary
Statefulness in the HSM Demo app will allow us to work on key rotation concepts in a flexible manner.
Storing an Application Public Key that can be modified independently of the cryptographic material in the signing backend would mimic many of the systems where the HSMs would be applied.
Suggested Approach
/public_key/set
and/public_key/get
to perform basic setting and getting operations against this public key.Beta Was this translation helpful? Give feedback.
All reactions