Hello,
It would also be an idea to have a secure sink like a key vault/HSM where Keycloak has write (but may not modify) access. This is especially useful if the integrated system and Keycloak are maintained in the same organization, also the keys might already get created in that external service (HSM). An SPI could be established which allows to store the secret in a predefined way in that sink. The sink could be as simple as a service which write crypted mails to the other party. The installation tab might show a link to the external system, which would enforce specific authorization requirements.
What do you think?
Mit freundlichen Grüßen / Best regards
Markus Till
> -----Ursprüngliche Nachricht-----
> Von:
keyclo...@googlegroups.com <
keyclo...@googlegroups.com> Im
> Auftrag von Marek Posolda
> Gesendet: Dienstag, 31. August 2021 16:51
> An: Keycloak Dev <
keyclo...@googlegroups.com>
> Betreff: [keycloak-dev] Stop storing private keys of SAML clients in Keycloak DB
> --
> You received this message because you are subscribed to the Google Groups
> "Keycloak Dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
>
keycloak-dev...@googlegroups.com.
> To view this discussion on the web visit
>
https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google
> .com%2Fd%2Fmsgid%2Fkeycloak-dev%2F2ab24fd5-acec-e275-4162-
> e5b325e114fc%
2540redhat.com&data=04%7C01%7Cmarkus.till%
40bosch.io%
> 7C01043b282b374392cc2308d96c8ebca4%7C0ae51e1907c84e4bbb6d648ee58410f
> 4%7C0%7C0%7C637660182569764398%7CUnknown%7CTWFpbGZsb3d8eyJWIjo
> iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000
> &sdata=qPsfaiXTsxIIPlGdba5%2BDQ6w9uL3O71FRZw20nkv3rg%3D&re
> served=0.