-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EDC - Concept for improving secret storing for DMA users #627
Comments
was presented in open planning ⇾ developer and committer are involved |
Upstream Issue created: eclipse-edc/Connector#4090 |
Can this be assigned to me? |
hello @rafaelmag110 code is done and will be proposed very soon in the EDC project. |
Hi @rafaelmag110 , can you define what the term DMA user means? |
Hi @lgblaumeiser |
Hello @stefan-ettl , @rafaelmag110 , @lgblaumeiser Since the feature is a 24.08 feature and the development phase is coming to an end, we need a status on the feature.
If you need any clarification, please get in touch, thank you very much. |
Hi @stephanbcbauer and @lgblaumeiser My initial requirement has been fulfilled. |
2024-06-11:
|
Upstream EDC The users of the DMA can define secrets aliases in data addresses and data destinations to later be resolved by the EDC. In EDC deployments that integrate with hashicorp vault, users of the EDC can also have access to the vault instance and store their secrets by themselves. However, this is not the case for cloud stores such as AWS Secrets Manager or Azure Vault. There could be a way to enable users to store their secrets in such vaults.
Initial creator: @rafaelmag110
The text was updated successfully, but these errors were encountered: