Easilyfollow the Principle of Least Privilege with Secret Manager's Cloud IAM roles. You can grant individual permissions to secrets and separate the ability to manage secrets from the ability to access their data.
Secret names are project-global resources, but secret data is stored in regions. You can choose specific regions in which to store your secrets, or you can let us decide. Either way, we automatically handle the replication of secret data.
Control access to secrets the same way you control access to other Google Cloud resources. Only project owners have permission to access Secret Manager secrets; other roles must explicitly be granted permissions through Cloud IAM.
With Cloud Audit Logs enabled, every interaction with Secret Manager generates an audit entry. You can ingest these logs into anomaly detection systems to spot abnormal access patterns and alert on possible security breaches.
Traditionally, providers of OAuth 2.0 endpoints have expected those who use their services to copy and paste the client ID and client secret from a registration page into working code. This method is error-prone and gives an incomplete picture of the information that is needed to get OAuth 2.0 working. (OAuth 2.0 also requires knowing all the endpoints, and configuring a redirect URI.) If service providers provide downloadable client_secrets.json files, and client libraries are prepared to consume these files, then implementing OAuth 2.0 will be easier and less prone to error.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
ubuntu google-compute server running 18.04
Need to config so server can rclone copy shared files
Shared files are in account with:
account has some OAuth 2.0 credentials set up, look like:
with associated secret.
account also has service account set up that looks like:
has unique id but no associated secret I can see.
Can I use service account or do I have to use one of the OAuth 2.0 accts?
Does it matter? Advantages of one over the other?
What does service_account_file look like? (Couldn't find in docs)
I used service account Id for client_id but left secret empty as service account seems to have no secret.
How is the service file created?
service-account-support indicates you can select a .JSON file type when creating a new service account, but I do not see that feature when I generate a new service account. In any case, I would prefer to use an existing service account; where do I find / how do I generate the service file?
Yes, but apparently I don't fully understand it.
I was originally confused because when I enter the Id of the service account, I get prompted for an OAuth client secret, which doesn't exist because I am trying to use a service account. It would be helpful if the notes indicated what to do in this situation.
However, plowing ahead...
When regenerating a secret key a emergency kit sheet is present with the secret key on it. I store this sheet (by uploading it to to one drive microsoft on my ios device). Sometimes I move it to some special vault in one drive with extra 2fa.
This sheet is seperated from my masterkey (stored in another place) and I have a copy of this secret key.
If so is that secure enough or should I put it in that one drive personal vault as well?
Or is just storing into one drive secure enough?
( have some issues to uploading the secret key in one step from the moment the sheet of emergency kit is there. I often have to upload to one drive first and move it to the personal vault.
It depends on the risk of getting locked out from Onedrive. If you always have access to your authenticator app to enter the 2FA codes, you can also move it into the vault. Otherwise, it would be better to have it in your Onedrive account to be always reachable to you.
Someone from 1Password will surely add to what I'm about to say (and please do correct me if I'm wrong), but my understanding is that the purpose of the Secret Key is to protect your data in case 1Password's servers ("cloud") were to be hacked. The Secret Key provides a guarantee that no matter the strength of your Account Password (nee Master Password), the data stored on 1Password's servers is at least encrypted with a 128-bit key, i.e. the Secret Key.
Because your data is encrypted with your Account Password in addition to the Secret Key, it's perfectly fine to store the Secret Key somewhere else, be it locally or on some other cloud server, as long as it is always accessible to you even if you can't log into 1Password, because you'll need it in order to log into 1Password on a new device.
If you use the mobile app, 1Password in fact already stores your Secret Key in the cloud as a security precaution, because if you reset your mobile device and log into your iCloud or Google account and then proceed to install the 1Password app, you'll see that your Secret Key is pre-filled for you, and you'll only need to provide your Account Password. This implies you know the password to your cloud account, of course.
sorry to hijack this discussion thread, as I also got a question re secret key, I know if we use a new device to login we need both secret key and master password, which I think is a great idea and secure way of protecting my data.
However, if this situation arise let says I lost my phone in a foreign country hence I couldn't access to my 1Password account, nor my other cloud accounts as I need 1Password to unlock them and other devices that previously signed in to my 1Passwsord account are not with me, and the Emergency Kit doc that has my secret key is not with me either. For this situation I couldn't gain access to my 1Password account using new device in a foreign country as I don't remember my secret key and worst is all my online account passwords are generated and stored in my 1Password account, therefore I cant open my email account, cant access to any of my cloud accounts or social media accounts nor I can have access to my online banking, I literally cant do anything, as I rely on 1Password to unlock my online accounts. And I am in a foreign country that desperate needs help and cant return back home to retrieve my secret key. For this situation, how can 1Password support team do to assist me?
or in other way if I am very unlucky that all my devices that previously signed in to 1Password account got stolen and I even lost my Emergency Kit doc, therefore leave me without my secrete key. How can 1Password support team do to assist me?
The only assistance we would be able to provide in such a scenario would be to highlight the various locations the Secret Key can typically be found: the Emergency Kit, the 1Password app on already signed-in devices, and iCloud Keychain if enabled. We have no mechanism for providing your Secret Key to you or resetting it. We do not have your Secret Key, and we can't give you something we don't have. Additionally because the Secret Key is used to encrypt your data, it is required to decrypt that data.
Additionally in this scenario I would note that we would not be able to discuss any specifics of your account with you. If you cannot receive email at the address associated with your account, we cannot discuss details related to that account. One possible exception to that rule would be if you could not provide email verification, we could assist in cancelling the subscription, if you were able to provide the details of the payment method tied to the subscription.
If this is a scenario you can envision yourself in, I'd encourage you to find other ways to carry your Secret Key with you. For example, as a possibility I recall being discussed in a previous thread, print and laminate the Secret Key and store that in your shoe beneath the insert. I thought that was a rather creative idea. It seems unlikely that one would lose all of their devices, their Emergency Kit, and their shoes all in one go, and not have significantly larger problems than not having immediate access to 1Password.
In the very worst case scenario: it seems storing a copy of your Secret Key with a friend/family member or in a place where a trusted person could access it, and you could reach that person by phone, might also be an acceptable mitigation.
To add, I am the family organizer of my family account. I keep my secret key within 1P (plus hard copy) because the browser sometimes forgets it. My question is does every member have their own secret key? I've never thought about this before. I may keep a copy of their secret keys within my 1P & theirs (plus hard copies of course) since they aren't very techie?
I am trying to add a OneDrive business drive into rclone. When using my own client ID and Secret I get an error message, but using the default (blank) option it configures the drive just fine. I followed this guide
" Now the application is complete. Run rclone config to create or edit a OneDrive remote. Supply the app ID and password as Client ID and Secret, respectively. rclone will walk you through the remaining steps."
Thank you very much! Using value did seem to work. Also unrelated question, but when cloud transfering from Google Drive to Microsoft OneDrive can I use server side transfer? Or is that only from same cloud storage providers i.e. Google to Google or Microsoft to Microsoft?
There is a mysterious effect! I have 20 accounts and only the created id and secret I created nearly one year ago are working and now this
I create new credentials and when doing "rclone config" to create remotes, it works and I can choose even the drive id.
i have not used onedrive, tho i have a 1TB account.
i had planned to set it up with rclone but never got round to it.
so when the OP was having problems, i decided to set a remote for rclone.
i followed the rclone instructions to get my own client id and key.
that worked.
3a8082e126