Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Asymmetric secret synchronization #235

Open
jroper opened this issue Nov 29, 2022 · 1 comment
Open

Asymmetric secret synchronization #235

jroper opened this issue Nov 29, 2022 · 1 comment

Comments

@jroper
Copy link

jroper commented Nov 29, 2022

If using asymmetric key pair synchronization, ie, a public and private key, you may only want the public key synchronized to various locations, while the private key should not be synchronized. So for example, service A uses the private key to sign JWTS, and service B needs to use the public key to verify them. To support this, it would be useful if you could specify which keys in the secret data to synchronize.

@Totalus
Copy link

Totalus commented Dec 9, 2022

Can't you just create two distinct secrets for your use case ?

The only moment you would really need this feature is if your secret is auto-generated by an external service (ex: Cert-Manager) that creates one secret with both public and private key in the data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants