Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[NT] How to use feathr client without needing to give end user Azure credentials or configurations #1228

Open
NotInControl opened this issue Jan 19, 2024 · 0 comments

Comments

@NotInControl
Copy link

Willingness to contribute

Yes. I can contribute for this issue independently.

Non-technical Request Proposal

Issue Description:

Background:
I am using the Feathr project to integrate with Azure services, and I need to configure the client with sensitive Azure credentials, such as Azure AD secrets or connection strings. However, I want to ensure that these credentials are not exposed in plain text within the Feathr client configurations to maintain security and prevent unauthorized access to Azure resources.

Question:
Is there a recommended best practice or approach for configuring the Feathr client in a way that allows me to use Azure credentials without exposing them in the client configurations? I want to ensure that end users of the Feathr client do not have access to these sensitive Azure credentials.

I'm open to any suggestions or guidance on how to securely handle Azure credential management within the Feathr project.

Currently from what I see every end user that uses the feathr client needs access to an ADLS key, client secret, and potentially other config items, that if exposed could give the user direct access to these resources.

Thank you for your help!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant