Secrets management
Externalised secrets
Externalised secrets
Configuration supports externalisation of secrets (i.e. passwords) eliminating the need for clear-text secrets in configuration files.
Secrets are available using the standard mechanism of using the scope secrets
:
By default secrets management is not enabled.
Since secrets management is a part the configuration subsystem it must be configured separately. To allow maximum flexibility, configuration is done using environment variables which can be set in the application start script, injected by container management systems or configured on the application user account, depending on how the system is set up.
Different implementations requires different configuration. Which implementation to use is specified using the following environment variable:
The built in local secrets management implementation provides decryption of secrets stored in configuration.
Secrets must be encrypted, base64 encoded and added to configuration manually, no automatic encryption is done since configuration is read-only.
Only AES encryption (key size 128/256) is supported.
An encrypted property has the following format (where "yR3v4....wgkR0="
is the base64 encoded encrypted value):
To enable this implementation, set the following environment variable(s):
To decrypt secret encrypted with OpenSSL use the following configuration:
In the current version only aes-256-cbc
cipher with sha256
digest is supported.
It is possible to supply custom secrets management implementations.
Custom implementations are enabled by supplying the fully qualified class name of the implementation.
A custom implementation must implement the following interface available in platform-config-<version>.jar
.
The custom implementation class and all of its dependencies must also be available on the application class path.
To set variables on Windows using power shell in terminal execute:
This will set required variables "machine-wide".
For more information on how to encrypt secrets for use with implementation, see: