Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature: consider a way to indicate what fields are sensitive #1608

Open
raulb opened this issue May 21, 2024 · 2 comments
Open

Feature: consider a way to indicate what fields are sensitive #1608

raulb opened this issue May 21, 2024 · 2 comments
Labels
feature New feature or request

Comments

@raulb
Copy link
Member

raulb commented May 21, 2024

Feature description

The platform team has submitted this feature request. It was initially created as part of another issue: #1558.

Clients require the ability to determine which situations require obfuscating their values. My recommendation is to derive this from the data type rather than manually indicating whether the information is sensitive. This issue should track progress on this approach.

@raulb
Copy link
Member Author

raulb commented May 21, 2024

@jmar910 @justmisosoup fyi, created this as a separate issue rather than make it part of #1558 .

@lovromazgon lovromazgon removed the triage Needs to be triaged label Jun 10, 2024
@lyuboxa
Copy link
Contributor

lyuboxa commented Jun 11, 2024

Discussed this issue with @justmisosoup and @jmar910. We can punt on this for now until we get some more experience.
The TL;DR being warning the user from entering sensitive data as plain text vs using secrets. The intermediary plan is to handle this in the UI and guesstimate which field may be sensitive based on naming.

If the Conduit team has a suggestion on how this can be implemented besides adding sensitive field to the config fields, let us know.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants