Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for use of secure strings for sensitive parameters #195

Closed
4 tasks done
tenthirtyam opened this issue Dec 5, 2023 · 1 comment · Fixed by #199
Closed
4 tasks done

Add support for use of secure strings for sensitive parameters #195

tenthirtyam opened this issue Dec 5, 2023 · 1 comment · Fixed by #199
Assignees
Labels
enhancement Enhancement
Milestone

Comments

@tenthirtyam
Copy link
Collaborator

Code of Conduct

  • I have read and agree to the project's Code of Conduct.
  • Vote on this issue by adding a 👍 reaction to the original issue initial description to help the maintainers prioritize.
  • Do not leave "+1" or other comments that do not add relevant information or questions.
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment.

Description

For example: if one runs a command with no input one is prompted for:

server:
user:
password:

The password value should not be echo'd back to the screen in plaintext

Use Case(s)

A user may not want to reveal sensitive credentials during a screen sharing session.

Potential Configuration

Please consider the use of -AsSecureString when reading in the password interactively.

References

No response

@tenthirtyam tenthirtyam added the enhancement Enhancement label Dec 5, 2023
@tenthirtyam tenthirtyam added this to the v2.5.0 milestone Dec 5, 2023
@github-actions github-actions bot added the pending-review Pending Review label Dec 5, 2023
tenthirtyam pushed a commit to Ashwini-Ravi/powershell-module-for-vmware-cloud-foundation-reporting that referenced this issue Dec 15, 2023
Added support for use of secure strings for sensitive parameters.

Red: vmware#195

Signed-off-by: Ashwini Ravindernath <[email protected]>
tenthirtyam pushed a commit to Ashwini-Ravi/powershell-module-for-vmware-cloud-foundation-reporting that referenced this issue Dec 15, 2023
Added support for use of secure strings for sensitive parameters.

Ref: vmware#195

Signed-off-by: Ashwini Ravindernath <[email protected]>
tenthirtyam pushed a commit to Ashwini-Ravi/powershell-module-for-vmware-cloud-foundation-reporting that referenced this issue Dec 15, 2023
Added support for use of secure strings for sensitive parameters.

Ref: vmware#195

Signed-off-by: Ashwini Ravindernath <[email protected]>
tenthirtyam pushed a commit to Ashwini-Ravi/powershell-module-for-vmware-cloud-foundation-reporting that referenced this issue Dec 15, 2023
Added support for use of secure strings for sensitive parameters.

Ref: vmware#195

Signed-off-by: Ashwini Ravindernath <[email protected]>
tenthirtyam pushed a commit that referenced this issue Dec 15, 2023
Added support for use of secure strings for sensitive parameters.

Ref: #195

Signed-off-by: Ashwini Ravindernath <[email protected]>
Copy link

I'm going to lock this issue because it has been closed for 30 days. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jan 15, 2024
@tenthirtyam tenthirtyam removed the pending-review Pending Review label Jul 24, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Enhancement
Projects
None yet
2 participants