Secrets managers support for mirth.properties #4720
Replies: 2 comments 6 replies
-
The devil is in the "etc." part though, what managers to support. That should probably be a market share weighted choice - perhaps only NG can extrapolate where folks are running engines although I don't know how much telemetry data is actually collected in their systems. I know folks will kill me on this - it should also be weighted by paying customers as a priority also. And should it be free? I am of course assuming that credential manager integration points are different enough to warrant some ordering in development. |
Beta Was this translation helpful? Give feedback.
-
The mirth.properties file can be configured with an environment variable reference instead of a hard coded value, so as long as you have a way to get the secret into an environment variable prior to mirth startup, you shouldn't have to touch the mirth.properties file or worry about encrypting any files in the container |
Beta Was this translation helpful? Give feedback.
-
Morning!
An question came up in Mirth connect Slack channel about storing and accessing secrets in containers.
So one has to store for example, database credentials, in mirth.properties file, which by default is plaintext. According to Mirth Wiki page it is possible to encrypt the properties file after the first run, but that still leaves the credentials in the open in a couple of places.
I think it would be a good idea to have support for external credentials managers, like Docker Swarm/Compose secrets, K8s secrets, Azure identity tools, HashiCorp Vault etc.
And a cherry on top would be a pluggable architecture, so community can write additional adapters.
Beta Was this translation helpful? Give feedback.
All reactions