Description
Summary of the new feature / enhancement
Current design requires passing secrets into a configuration as parameters as either SecureString
or SecureObject
. However, it may be easier/better to have a way for a configuration to have sufficient information to pull secrets from a known secret store. For example, at runtime having the secrets pulled from Azure KeyVault.
Proposed technical implementation details (optional)
This will likely be used for enterprise which have a shared or common secret store while community configurations that require secrets may still make sense to be passed in as parameters.
What may make sense is to introduce a getSecret('storeName', 'secretName')
function. The storeName
is associated with a specific DSC extension with that name and the secretName
is passed to that extension. The secret itself is retrieved from the extension as clear text, but treated within DSC as a SecureString
or SecureObject
(both should work and up to what the extension returns).