-
Notifications
You must be signed in to change notification settings - Fork 6.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CLI options to disable encryption and authentication to external Infinispan #28750
Comments
@vmuzikar - We would like to see two additional options on the Quarkus CLI which would make it simpler for developers to develop changes, and also for users to try out those features in their local environment. Could you please approve that those options are OK, and that the names align with the current ones? If that is the case, @pruivo will go ahead and create a PR. Thanks! |
@ahus1 @pruivo Sorry for the late reply. Would it rather make sense to set this based on prod/dev profile ( CC @keycloak/cloud-native |
I don't have a strong opinion on we should create CLI options to disable or make that decision based on tls/auth provided. The latter would make my life easier and avoid creating "too many" CLI options. About the prod vs dev profile, the only use case where disabling this makes sense in prod is when Infinispan is running on a private datacenter/network as it won't make much sense to pay the cost of encrypting data. |
I think it all depends on whether we want to explicitly require setting TLS and auth for ISPN, how common is the non-TLS no-auth scenario. If we want to be really secure-by-default, we probably should have explicit options to disable TLS and auth.
That make sense. So let's not tie it to the dev profile. |
The Infinispan server defaults are
The non-TLS scenario is very useful for testing. In the feature that I'm developing, I'm disabling TLS using system properties: https://github.com/keycloak/keycloak/pull/28845/files#diff-15b16210d4c7b60aaf3ad0d7b19f1a2d6f31f487c1a02cdfa498bc0996e78578R52 You can argue that |
Ah, I realized now that we're talking specifically only about remote ISPN. In that case, the security really lies in the hands of the ISPN server, not Keycloak. From my perspective then we don't need explicit options to disable (validations of) TLS and auth. If it's specified, Keycloak will use it, otherwise it won't. |
@vmuzikar Just to clarify:
If my understanding is correct, 👍 from me. |
@pruivo Yes, that's 👍 from me too. |
…nispan Closes keycloak#28750 Signed-off-by: Pedro Ruivo <pruivo@redhat.com>
Closes keycloak#28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Closes keycloak#28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Closes keycloak#28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
…nispan Closes #28750 Signed-off-by: Pedro Ruivo <pruivo@redhat.com>
Closes #28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Closes #28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Description
In production, it is recommended to encrypt and authenticate the communication between the Keycloak server and the Infinispan server. However, in some environments, like development, proofs-of-concept, and demos, it is easier to deploy Keycloak + Infinispan without configuring users or TLS certificates.
The following options are proposed:
cache-remote-tls-enabled
-> defaults to true, set to false to allow plain text communication with an Infinispan Server without encryption configured.cache-remote-auth-enabled
-> defaults to true, set to false to allow communication with an Infinispan server without security.The text was updated successfully, but these errors were encountered: