[actions] ensure connector URLs do not have auth info embedded in the URL #96236
Labels
connectivity
Issues relating to connectivity between Kibana and external services
estimate:needs-research
Estimated as too large and requires research to break down into workable issues
Feature:Actions/ConnectorTypes
Issues related to specific Connector Types on the Actions Framework
Feature:Actions
Team:ResponseOps
Label for the ResponseOps team (formerly the Cases and Alerting teams)
From a comment in PR 95365, it was noted that we should not allow customers to associate URLs that have embedded auth info in them, where we currently allow URLs.
For example, the url
https://elastic:[email protected]
contains an embedded userid / password ofelastic
/changeme
. Allowing customers to enter this auth info means the URLs will end up containing sensitive information, and these fields are currently not encrypted like other "secrets" used in connectors.Any connector that can handle (or requires) userid / password values already has these available as separate, encrypted fields, so there should be no loss of function when making this restriction.
I believe this affects the following connectors:
It specifically does not affect slack, or is different, because the slack url contains an authentication token in the path, and is already stored encrypted. But I guess we should probably disallow using the embedded userid / password even in this case, just to standardize this restriction across the connectors.
The text was updated successfully, but these errors were encountered: