Skip to content

Close the loop: less privileged keys #5

@grahamc

Description

@grahamc

Right now, Packet has a very limited set of ACL options for keys.

  • A given key is read-only, or read-write
  • A key can be for a user, with access to all of the organizations the user can, or for a project with access to only one project.

A read-write API key can make new read-write API keys.

As it is, this secrets engine is already valuable by making my secrets dynamic, and I can easily identify keys which shouldn't exist.

To fully close the loop and make this engine really good:

  1. Packet's API should support creating API keys which cannot create new API keys
  2. This Secrets Engine should make it possible, possibly even default, to hand out temporary tokens which don't have the authority to create API keys.

Maybe this could look like the Packet API accepting a basic "policy document" which I can provide to the secret engine. To start with:

{ "can_create_api_keys": false }

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions