Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow to provider password to kcadm (keycloak-admin-cli) via environment variable #21961

Open
jirutka opened this issue Jul 25, 2023 · 3 comments · May be fixed by #29430
Open

Allow to provider password to kcadm (keycloak-admin-cli) via environment variable #21961

jirutka opened this issue Jul 25, 2023 · 3 comments · May be fixed by #29430
Assignees
Labels

Comments

@jirutka
Copy link
Contributor

jirutka commented Jul 25, 2023

Description

Please allow us to provide the user password for kcadm also via the environment variable, not just --password option or interactively.

Discussion

No response

Motivation

Simplify using kcadm in scripts in a more secure way.

Details

No response

@jirutka jirutka added kind/enhancement Categorizes a PR related to an enhancement status/triage labels Jul 25, 2023
@ghost ghost added the team/cloud-native label Jul 26, 2023
@EricLee423
Copy link

that's a good suggestion.
In these days, due to the require from security standard, the chance is pretty high that special characters would be added into the password (such as " ), passing such value via command line would break the functionality completely.

@jesperronn
Copy link

Very good idea. Although it seems little has happened for the last month, perhaps someone reading this would try to make a suggestion?

@shawkins shawkins self-assigned this Apr 1, 2024
@shawkins
Copy link
Contributor

shawkins commented Apr 1, 2024

To be addressed after #28329 - it would be a good idea if this were an option for all passwords, if not all options.

shawkins added a commit to shawkins/keycloak that referenced this issue May 9, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 9, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 20, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 20, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 23, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 23, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
shawkins added a commit to shawkins/keycloak that referenced this issue May 23, 2024
closes: keycloak#21961

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants