Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow full configuration of provisioner webhooks in ca.json #1529

Open
wouttom opened this issue Sep 11, 2023 · 1 comment
Open

Allow full configuration of provisioner webhooks in ca.json #1529

wouttom opened this issue Sep 11, 2023 · 1 comment
Labels
enhancement needs triage Waiting for discussion / prioritization by team

Comments

@wouttom
Copy link

wouttom commented Sep 11, 2023

Hello!

  • Vote on this issue by adding a 👍 reaction
  • If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)

Issue details

We are currently running and configuring step-ca from infra-structure-as code. We want to add a webhook to a provisioner in the configurationfile ca.json.
Currently the entire webhook configuration is read from ca.json EXCEPT the secret that is used to sign the http-requests. The request will get signed by an empty secret if you configure the webhook in ca.json.

Make sure the secret is also read from ca.json.
To protect it and not store it plaintext/base64 encoded, it might be possible to encrypt the secret with the public key of the intermediate CA. Since the CA has the private key for its normal operations, it can decrypt the secret from the configfile.

Why is this needed?

To be to manage the configuration of the CA without having to run step cli-commands.
This allows for automating the configuration in a predictable way.

@wouttom wouttom added enhancement needs triage Waiting for discussion / prioritization by team labels Sep 11, 2023
@areed
Copy link
Contributor

areed commented Sep 12, 2023

Yes, we wanted to discourage keeping secrets in ca.json. Encrypting with the pub key of the intermediate is an interesting idea, but there may be risks that arise when using that keypair for more than just certificate signing. You can configure the webhook server to request and verify a client certificate if you want to be sure the request is coming from step-ca without using a secret.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement needs triage Waiting for discussion / prioritization by team
Projects
None yet
Development

No branches or pull requests

2 participants