"Tim O'Guin" <
timo...@gmail.com> writes:
> Well, the master always needs to be able to read the pillar data. I'd
> imagine the way to deal with your issue would be to define the client_acl
> so that only the user that salt runs as can call the pillar.* modules. As
> long as your users have their own accounts they're signing into Halite with
> (or calling salt via the CLI with), you should be able to restrict their
> access.
I first ask on IRC but forresta point me here, so I expose my probably
insane idea to everyone ;-)
What about some kind of password generator mechanism?
I want to say “my application need a MySQL user named "foo" with a
password”.
Then the minion running my application will start some kind of
Diffie-Hellman with the minion managing the MySQL, though master to
authenticate the dialog.
No one need to know the password, not even the master.
This should be renewable:
- if passwords on MySQL client and server are out of synch
- when someone ask
- on a time based, for example change password every month
I'm not a crypto guy but found some infos about n-party Diffie-Hellman
exchange[1].
What do you think about this?
Footnotes:
[1]
http://crypto.stackexchange.com/questions/1025/can-one-generalize-the-diffie-hellman-key-exchange-to-three-or-more-parties
--
Daniel Dehennin
Récupérer ma clef GPG:
gpg --keyserver
pgp.mit.edu --recv-keys 0x7A6FE2DF