mirror of
https://github.com/kanidm/kanidm.git
synced 2025-02-23 12:37:00 +01:00
Add cred display design (#367)
This commit is contained in:
parent
dd1945dd0d
commit
7baff8db91
53
designs/credential-display.rst
Normal file
53
designs/credential-display.rst
Normal file
|
@ -0,0 +1,53 @@
|
|||
|
||||
Credential Display UI
|
||||
---------------------
|
||||
|
||||
We need a way to display the credentials associated to a user, that may be in a variety
|
||||
of formats. We need to ensure that:
|
||||
|
||||
* Credential disclosure is not possible in any form.
|
||||
* Multiple classes and types of credentials are supported.
|
||||
* That the displayed information matches what is configured for other commands to consume.
|
||||
|
||||
|
||||
Draft Display (CLI)
|
||||
-------------------
|
||||
|
||||
An example of this display for the CLI:
|
||||
|
||||
::
|
||||
|
||||
kanidm account credential list <account> [-D account]
|
||||
- account_metadata
|
||||
locked: true|false
|
||||
valid_from: <date>
|
||||
expire_at: <date>
|
||||
|
||||
- <credential_id>
|
||||
type: Password|APIKey|PasswordMFA
|
||||
locked: true|false
|
||||
valid_from: <date>
|
||||
expire_at: <date>
|
||||
password: <type of hash>
|
||||
totp: enabled|disabled
|
||||
webauthn:
|
||||
- token_name
|
||||
- token_name
|
||||
recovery_codes: enabled|disabled
|
||||
|
||||
- <credential_id>
|
||||
...
|
||||
|
||||
API
|
||||
---
|
||||
|
||||
This would require a new api that goes via the IDM gateway to ensure that on the server side we
|
||||
perform the correct transforms over the credential types to prevent data leaks.
|
||||
|
||||
The ability to view credentials is bound by the standard search access control rules.
|
||||
|
||||
The API would return a list of credential details, which is an enum of the possible classes supported
|
||||
by the server. This ensures during addition of new credetial types or changes we update these protocol
|
||||
types.
|
||||
|
||||
This also helps to support future webui elements for credentials.
|
Loading…
Reference in a new issue