Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for certificate and key loading from OS stores #16267

Open
scathatheworm opened this issue Feb 12, 2020 · 10 comments
Open

Support for certificate and key loading from OS stores #16267

scathatheworm opened this issue Feb 12, 2020 · 10 comments

Comments

@scathatheworm
Copy link

Currently, beats only supports providing files for certificate and key for client authentication.

In operations of fleets of endpoints, client certificates are stored in the secure OS space for it: keychain in MacOS, Windows certificate store for Windows.

To extract events securely from these endpoints/systems, these certificates are needed, and exposing them as files in the filesystems poses a challenge in securing device identity.

The use case is for beats to allow the usage of client certificates from the OS secure stores. This might be related to #13591

@botelastic
Copy link

botelastic bot commented Feb 8, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Feb 8, 2021
@botelastic botelastic bot closed this as completed Mar 10, 2021
@zube zube bot removed the [zube]: Backlog label Mar 10, 2021
@zube zube bot added the [zube]: Done label Mar 10, 2021
@opoplawski
Copy link

Any chance this can be reopened? This is much needed functionality.

@ph ph reopened this Mar 18, 2021
@botelastic botelastic bot removed the Stalled label Mar 18, 2021
@zube zube bot added [zube]: Inbox and removed [zube]: Done labels Mar 18, 2021
@blakerouse
Copy link
Contributor

Can you provide more explanation on what you are wanting solved? At the moment using a system installed CA should provide everything you need to verify your certificates. Or are you looking for specific certificate pinning?

@opoplawski
Copy link

We would like to use automatically generated computer certificates that are kept in the system key stores. It is very cumbersome to export these certificates to files (they are not exportable by default and so require creation of a separate CRL template and duplicate certificates) as well as creating more things that need to be carefully protected. This https://github.com/github/certstore appears to be a relevant Go library for accessing these items.

@botelastic
Copy link

botelastic bot commented Mar 29, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Mar 29, 2022
@opoplawski
Copy link

This is still very much a useful item to have.

@botelastic botelastic bot removed the Stalled label Mar 29, 2022
@botelastic
Copy link

botelastic bot commented Mar 29, 2023

Hi!
We just realized that we haven't looked into this issue in a while. We're sorry!

We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1.
Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Mar 29, 2023
@opoplawski
Copy link

Please implement this. :+1

@botelastic botelastic bot removed the Stalled label Apr 17, 2023
@Akshaymb07
Copy link

Please implement this. :+1

@botelastic
Copy link

botelastic bot commented Oct 29, 2024

Hi!
We just realized that we haven't looked into this issue in a while. We're sorry!

We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1.
Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Oct 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

8 participants