Skip to content
This repository was archived by the owner on Dec 8, 2021. It is now read-only.
This repository was archived by the owner on Dec 8, 2021. It is now read-only.

Provide Method for Saving Secrets in different format e.g. base64 encoded #97

Open
@PaulBendall

Description

@PaulBendall

Use case : Programmatically accessing Azure DEVOps is through the use of Personal Access Tokens (PAT). The PAT has to be base64 encoded when constructing the auth. header.

Can the Get/Set-Secret cmdlets improve security when dealing with Personal Access Tokens, for example GitHub and Azure DEVOps, as well as other API that require the parsing of an authentication header? Having the text in insecure memory for as short a time as possible would be beneficial.

At the moment I'm using the Set-Secret to save the encoded base64 PAT but that still means variables that are potentially unsafe and need properly handling in memory. At least being able to pull the value from the store means I'm not having to manipulate it every time I call it out of credential manager. Now I just need to worry about auth. header variable and securely destroying that after use.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions