Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFC: Password Deprecate Request #1085

Open
wants to merge 6 commits into
base: main
Choose a base branch
from

Conversation

strehle
Copy link
Member

@strehle strehle commented Feb 12, 2025

Short: Deprecate Password Grant in UAA.
Consequence is: Build an alternative in cf login / cf auth because until now the password grant is used always in case of CF user authentications. UAA supports JWT bearer, but this should be improved in order to consume it and to not block customers, because of missing functionality.

Most of technical details in cloudfoundry/uaa#3285

@cloudfoundry/toc

For easier viewing

@beyhan beyhan requested review from a team, rkoster, beyhan, stephanme, ameowlia and ChrisMcGowan and removed request for a team February 12, 2025 16:06
@beyhan beyhan added toc rfc CFF community RFC labels Feb 12, 2025
@strehle strehle changed the title Add Password Deprecate Request RRC: Password Deprecate Request Feb 13, 2025
@strehle strehle changed the title RRC: Password Deprecate Request RFC: Password Deprecate Request Feb 13, 2025
Copy link
Member

@ameowlia ameowlia left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @strehle,

❓ Can you please add a proposed timeline for the deprecation similar to this one for capi v2?

It would be great if there was an intermediate step (similar to the capi v2 deprecation) where passwords are turned off by default, but can be turned on again.

@strehle
Copy link
Member Author

strehle commented Feb 21, 2025

hi @ameowlia

❓ Can you please add a proposed timeline for the deprecation similar to this one for capi v2?

Thank you for your feedback, I added a proposed timeline in https://github.com/strehle/community/blob/rfc-deprecate-passwords/toc/rfc/rfc-draft-deprecate-passwords.md#timeline

It would be great if there was an intermediate step (similar to the capi v2 deprecation) where passwords are turned off by default, but can be turned on again.

Described the changes in phases.
@

@beyhan
Copy link
Member

beyhan commented Feb 28, 2025

@a-b could you please provide feedback if you have any on this RFC because it also proposes CF CLI changes.

@a-b
Copy link
Member

a-b commented Feb 28, 2025

Thank you for bringing this to our attention. We support improvements in security as long as CF CLI remains backward compatible with older deployments.

@beyhan
Copy link
Member

beyhan commented Mar 4, 2025

@a-b do you have any comments on the proposed phased approach in https://github.com/strehle/community/blob/1494e6b766f3b7dcacf76bd8eacd14e75097307d/toc/rfc/rfc-draft-deprecate-passwords.md?plain=1#L64-L79?

@a-b
Copy link
Member

a-b commented Mar 4, 2025

I am curious about the expiration and rotation of tokens. Should we implement a policy that requires regular rotation by default?

@beyhan beyhan requested a review from ameowlia March 4, 2025 15:39
@beyhan
Copy link
Member

beyhan commented Mar 4, 2025

We discussed this RFC during the TOC meeting on 4th of March and decided to start the FCP with the goal to accept the RFC. The comment is not blocking the RFC as discussed during the meeting.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
rfc CFF community RFC toc
Projects
Status: In Progress
Development

Successfully merging this pull request may close these issues.

4 participants