-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Externalise keys storage #46
Comments
AWS Secrets Manager comes to mind at first. Alternatively, in theory, KMS could be used, but this would cut deep into the logic of the service, because in that case, we would not have access to the private key at all - all verification would have to be externalized to KMS. |
Storing keys in memory is also a potential security threat. While I was asking chatGPT to write code to generate keys in memory (please don't look at the ingestionaas repo about what we're currently doing), it gave the following warning:
|
Background
Currently the only signing key for JWTs is generated & stored in memory. So when there are multiple instances of
login-gateway
deployed under a load balancer, as each instance will have different key, it is impossible to use the service.Feature
Fetch key(s) for signing JWTs from external service (pref some AWS service).
The text was updated successfully, but these errors were encountered: