-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify synthetics params / secrets docs #3672
Conversation
A documentation preview will be available soon: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few editorial changes.
BTW, it's much better if you submit your changes against the main branch (rather than a versioned branch) so that we can easily backport the changes. To do this, you just need to switch to master before you click the Edit link in the docs.
@@ -2,10 +2,12 @@ | |||
[[synthetics-params-secrets]] | |||
= Work with params and secrets | |||
|
|||
Params allow you to use dynamically defined values, including sensitive information, in your | |||
Params allow you to use dynamically defined values, in your |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Params allow you to use dynamically defined values, in your | |
Params allow you to use dynamically defined values in your |
synthetic monitors. For example, you may want to test a production website with a particular | ||
demo account whose password is only known to the team managing the synthetic monitors. | ||
|
||
Please read the <<synthetics-secrets-sensitive, documentation on sensitive values>>for more information on security-sensitive use cases. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please read the <<synthetics-secrets-sensitive, documentation on sensitive values>>for more information on security-sensitive use cases. | |
For more information about security-sensitive use cases, refer to the <<synthetics-secrets-sensitive, documentation about sensitive values>>. |
Please note that params are viewable in plain-text by administrators and other users with "all" privileges for | ||
the synthetics app. | ||
Additionally, note that synthetics scripts have no limitations on accessing these values, and a malicious script author could write a | ||
synthetics journey that exfiltrates `params` and other data at runtime. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please note that params are viewable in plain-text by administrators and other users with "all" privileges for | |
the synthetics app. | |
Additionally, note that synthetics scripts have no limitations on accessing these values, and a malicious script author could write a | |
synthetics journey that exfiltrates `params` and other data at runtime. | |
Params are viewable in plain-text by administrators and other users with `all` privileges for | |
the Synthetics app. | |
Also note that synthetics scripts have no limitations on accessing these values, and a malicious script author could write a | |
synthetics journey that exfiltrates `params` and other data at runtime. |
Do *not* to use truly sensitive passwords (for example, an admin password or a real credit card) | ||
in *any* synthetics tools. | ||
Instead, set up limited demo accounts, or fake credit cards with limited functionality. | ||
If you want to limit access to parameters ensure that that users who are not supposed to access those values do not have "all" privileges |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you want to limit access to parameters ensure that that users who are not supposed to access those values do not have "all" privileges | |
If you want to limit access to parameters, ensure that users who are not supposed to access those values do not have `all` privileges |
@dedemorton Thanks for the review, Andrew is out of office, I will open a new PR against the master branch to address your review comments and ask for final review. |
Closed in favor of #3691 |
Clarify and add detail to section on synthetics security / working with sensitive values