Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenCHAMI needs to support several use cases for managing BMC credentials #41

Open
alexlovelltroy opened this issue Oct 31, 2024 · 0 comments

Comments

@alexlovelltroy
Copy link
Member

In order to authenticate with a BMC, a username and password are required. These can be the same for all devices in a cluster or they can be individual per device. In either case, we need to allow admins to securely store them separately from SMD which is not suited to be a secure credential store. The credentials will need to be retrievable for unattended actions.

Admins with proper authentication to OpenCHAMI should be able to issue commands to the BMCs through the system (for power control, diagnostics, etc...) without needing to know the credentials used.

Options:

  • Store a url for credentials with drivers for various storage engines including Hashicorp Vault and file://
  • Store encrypted passwords in an OpenCHAMI backend like Viper config
  • other?

We need to consider the most secure option for sites like LANL, but we also need to consider a low infrastructure option for sites without significant existing infrastructure.

Originally posted by @alexlovelltroy in #32 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant