You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently users can include certain /q endpoints in a PROD profile. Some of these endpoint should be secured, but currently it's up to the user to do this, and by default, when including this, it will be unsecure.
This feature request suggest to change the default in the above case to secure, and let the user either 1) secure it themselves using their own security model, or 2) explicitly remove the security, or 3) keep the generated default security.
The generated default security could be a basic auth, that use admin and a generated password that print on startup ? Or just an admin key that print on startup.
Some /q services should always be open (like health). So this might only apply to certain services under /q , or health should be moved out of /q ?
Perhaps it is not worth mixing this issue with #5485. But managing the admin passwords out of the box (ex if basic auth is enabled for some /q/*) would require persisting them with all security related follow ups required (PEN testing, configuration management review, etc at the RHBQ level) - Quarkus will become an application itself. It is not a blocker in itself but something which is worth considering too when deciding how to approach it
Description
Currently users can include certain
/q
endpoints in a PROD profile. Some of these endpoint should be secured, but currently it's up to the user to do this, and by default, when including this, it will be unsecure.This feature request suggest to change the default in the above case to secure, and let the user either 1) secure it themselves using their own security model, or 2) explicitly remove the security, or 3) keep the generated default security.
The generated default security could be a basic auth, that use admin and a generated password that print on startup ? Or just an admin key that print on startup.
Some /q services should always be open (like health). So this might only apply to certain services under
/q
, or health should be moved out of /q ?cc @maxandersen @Sanne
Implementation ideas
No response
The text was updated successfully, but these errors were encountered: