Encrypted-at-Rest Password or Token Storage #168
Labels
area/cli
Related to the CLI plumbing
help wanted
Extra attention is needed
kind/feature
A new feature request
priority/important
Should be worked on soon. Higher priority than backlog
Milestone
Proposed Feature
Store an encrypted authentication token or password so that the user need not type their password each time they run
kconnect
to reconnect to a cluster.The
kconnect
CLI could store a private keyfile in the~/.kconnect
directory or support a configuration that refers to a Private key in a separate location (such as~/.ssh/id_rsa
) either for direct authentication to the IDP or to encrypt a token or password stored in~/.kconnect/config.yaml
or a separate credentials file.Problem
It's annoying to have to type your password each time you reconnect to the cluster, especially when you are authenticating via an Enterprise SSO solution. The tool should support storing a longer-lived token for SSO or a password in an encrypted format for each IDP.
The text was updated successfully, but these errors were encountered: