Skip to main content

Questions tagged [secret-sharing]

1 vote
1 answer
278 views

Is it safe to publish encrypted secrets in a git repository?

Tools like Ansible Vault, CNCF SOPS or Chezmoi make it easiy to keep secrets encrypted in version control, so that you can publish the repository, but still use the secrets inside when deploying. This ...
Tyler's user avatar
  • 13
2 votes
0 answers
400 views

Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)

CVE-2020-27838 describes that Keycloak has an open endpoint where it's possible to obtain client_secret information, as shown in the example below: /auth/realms/{realm}/clients-registrations/default/{...
Marcus's user avatar
  • 21
0 votes
1 answer
737 views

What does it mean to store secret keys as an "environment variable" as opposed to hardcoded in the source code?

I see why it is obviously bad to store a secret key and client ID in the source code for a web application. However, how do you go about the alternative? Surely, that information has to be stored ...
BigMistake's user avatar
5 votes
3 answers
5k views

Best method to send credentials to clients

I'm constantly exchanging credentials with my clients for things like database servers, cloud accounts, etc. Neither I nor my clients, have time to implement a sophisticated method for secure ...
Cristobal Sarome's user avatar
0 votes
1 answer
183 views

How to store ClientID and ClientSecret in a K8 Env

I am trying integrate our service with SSO. I have generated the ClientID and ClientSecret. Is it a good security practice to store the ClientID and ClientSecret as a configmap? If not, what are the ...
warrior-oo7's user avatar
1 vote
1 answer
197 views

What Criteria Should We Use to Determine What is and isn't a Secret?

Background: We have product development teams, where each team has one or two QA engineers. They run tests from their local machines. Here is what they require: Application credentials (a clientId ...
jmort253's user avatar
  • 201
1 vote
1 answer
290 views

How does a TPM verify the identity of the calling process/service?

Any application can use a TPM chip to securely create and store cryptographic keys. For example for Digital Rights Management (DRM) or for prevention of cheating in online games. However, how can a ...
Equinox's user avatar
  • 21
0 votes
1 answer
354 views

Is there a viable zero-knowledge approach for using oAuth to generate and manage private keys?

I've been doing a deep dive into how products like Web3Auth work under the hood and wonder if this is a viable approach to building applications where a user can have the convenience of using oAuth to ...
user3458571's user avatar
1 vote
2 answers
269 views

Encryption method for file that can only be read by program

I have a Python 3 program, and I’m having trouble finding an encryption method that will suit my needs. Suppose the program is on a thumb drive. I would give the thumb drive to someone else, and they ...
Cannabijoy's user avatar
1 vote
2 answers
368 views

API Client Secrets are Being Logged in Plaintext (PowerShell Logs)

I'm currently implementing a PowerShell script to call the Sophos API (https://developer.sophos.com/intro). Write-Output "`nEnter the Sophos API key / client secret." $ClientSecret = Read-...
TheCyberWarden's user avatar
1 vote
2 answers
558 views

Best and safest way to store secret key used for PKA on server?

I interact with some API's that use PKA and I'm looking for the safest / best-practice way to store my secret key. The approaches I know are for example: Create a 0500 access directory on my server ...
DevelJoe's user avatar
  • 161
0 votes
0 answers
399 views

Best Practice for retrieving secrets securely

So a company I work with currently is using a password management system that lets us retrieve the passwords for an application by providing a secure key to an API. Currently, the key is stored in ...
SpaceCowboy74's user avatar
0 votes
0 answers
31 views

The difference between a virtual door-lock and a public key [duplicate]

The thing that helped me to understand what is a "public key" was to parallel it with a door lock: The door lock is public in the sense that anyone can try to unlock it and the door key is ...
humble-learner's user avatar
4 votes
2 answers
2k views

Web-based secret manager using CryptoJS

I'm building an application, part of which will allow businesses to store secrets. I'm looking at using CryptoJS (https://www.npmjs.com/package/crypto-js). This would encrypt everything on the client ...
vue-coder's user avatar
  • 143
1 vote
0 answers
224 views

Shamir secret sharing, is security reduced by chunking a secret into smaller blocks?

When using Shamir's secret sharing algorithm one has to define the size for the finite field over which the secret is split. I came across a few implementations, like secrets.js-lit, and as far as I ...
Gamer2015's user avatar
  • 737

15 30 50 per page
1
2 3 4 5
8