You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -444,11 +444,16 @@ secure them properly**, as described in the
444
444
[Security Considerations](#security-considerations) section of
445
445
this document.
446
446
447
-
The sample configuration files include entries that define the actual
448
-
credential values and entries that reference credentials in the operating system
449
-
credential store. You would keep only one of each pair and comment out or
450
-
remove the other. Another example user-sync-config.yaml show how to reference
451
-
umapi and ldap configuration files stored in a secure store that you define.
447
+
There are three techniques supported by User Sync for securing credentials.
448
+
449
+
1. Credentials can be placed in the connector-umapi.yml and connector-ldap.yml files directly and the files protected with operating system access control.
450
+
2. Credentials can be placed in the operating system secure credential store and referenced from the two configuration files.
451
+
3. The two files in their entirety can be stored securely or encrypted and a program that returns their contents is referenced from the main configuration file.
452
+
453
+
454
+
The example configuration files include entries that illustrate each of
455
+
these techniques. You would keep only one set of configuration items
456
+
and comment out or remove the others.
452
457
453
458
#### Configure connection to the Adobe Admin Console (UMAPI)
454
459
@@ -1697,7 +1702,7 @@ Starting in User Sync 2.1, there are two additional techniques available
1697
1702
for protecting credentials. The first uses the operating system credential
1698
1703
store to store individual configuration credential values. The second uses
1699
1704
a mechanism you must provide to store the entire configuration file for umapi
1700
-
and ldap access which includes all the credentials required. These are
1705
+
and/or ldap which includes all the credentials required. These are
Note the change of `api_key`, `client_secret`, and `priv_key_path` to `secure_api_key_key`, `secure_client_secret_key`, and `secure_priv_key_data_key`, respectively. These alternate configuration values give the key names to be looked up in keyring (or the equivalent service on other platforms) to retrieve the actual credential values. In this example, the credential key names are `umapi_api_key`, `umapi_client_secret`, and `umapi_private_key_data`.
1723
+
Note the change of `api_key`, `client_secret`, and `priv_key_path` to `secure_api_key_key`, `secure_client_secret_key`, and `secure_priv_key_data_key`, respectively. These alternate configuration values give the key names to be looked up in the user keychain (or the equivalent service on other platforms) to retrieve the actual credential values. In this example, the credential key names are `umapi_api_key`, `umapi_client_secret`, and `umapi_private_key_data`.
1719
1724
1720
1725
The contents of the private key file is used as the value of `umapi_private_key_data` in the credential store.
0 commit comments