-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jwk: Add keep pairs option for keys delete #1476
Comments
You don't need to delete old keys. In fact, it's not a good idea to delete old keys as you will instantaneously invalidate all keys so far. ORY Hydra always uses the most recent key for signature issuance. Therefore, if you rotate the key, the new one will automatically be used for signing. |
It was wrong! My proposal is for encryption key rotation. In this case, it's signing key rotation. Signing key rotation process is difference from encryption key rotation. Key deletion is infrequent and dangerous but I think it's need. |
That's a good point, they should be cleaned up once in a while. Maybe we should add a |
Sounds good! It seems more safety. |
Would you be up for a PR? :) |
Sure! Please wait for me |
I am closing this issue as it has not received any engagement from the community or maintainers in a long time. That does not imply that the issue has no merit. If you feel strongly about this issue
We are cleaning up issues every now and then, primarily to keep the 4000+ issues in our backlog in check and to prevent maintainer burnout. Burnout in open source maintainership is a widespread and serious issue. It can lead to severe personal and health issues as well as enabling catastrophic attack vectors. Thank you to anyone who participated in the issue! 🙏✌️ |
Is your feature request related to a problem? Please describe.
When rotating JWKs, I delete old keys at first and it takes time and effort like this.
This complicated script means delete keys except latest key pairs each JWK Set.
I execute this before rotating system secret because hydra cannot serve if keys associated deleted system secret exists.
Describe the solution you'd like
Add
keep-pairs
option to delete a JSON Web Key Set endpoint and command.For example:
/keys/{set}?keep-pairs=1
hydra keys delete {set} --keep-pairs 1
This is same as following
Additional context
My system rotation step is here.
This proposal helps first step.
The text was updated successfully, but these errors were encountered: