Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing secret attribute in UAA YAML must not be used for any default passwords #2454

Closed
strehle opened this issue Aug 25, 2023 · 1 comment · Fixed by #2455
Closed

Missing secret attribute in UAA YAML must not be used for any default passwords #2454

strehle opened this issue Aug 25, 2023 · 1 comment · Fixed by #2455
Labels
accepted Accepted the issue

Comments

@strehle
Copy link
Member

strehle commented Aug 25, 2023

What version of UAA are you running?

Dev UAA , 76.19. , latest one

How are you deploying the UAA?

I am deploying the UAA

  • using a bosh release I downloaded from bosh.io
  • using cf-release

What did you do?

Defined a client in a yaml file to be provisioned with UAA. Usage was authorization code without a secret. So the client should not have a secret at all.
However the "" (empty) secret is created and can be used, this was unexpected.

What did you expect to see? What goal are you trying to achieve with the UAA?

Omitting a secret should not lead to an empty secret. If I set secret: "" then OK, it was specified in yaml. But the secret was not defined.

What did you see instead?

Code exchange was working with "" secret and the resulted token did no had the claim client_auth_method so from UAA it was a normal client authentication.

@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this:

https://www.pivotaltracker.com/story/show/185909306

The labels on this github issue will be updated when the story is started.

@strehle strehle linked a pull request Aug 25, 2023 that will close this issue
@cf-gitbot cf-gitbot added delivered accepted Accepted the issue and removed delivered labels Nov 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
accepted Accepted the issue
Projects
Development

Successfully merging a pull request may close this issue.

2 participants