On 2025-06-28 18:06:51 +0200, raphi wrote: > Am 28.06.2025 um 15:59 schrieb Peter J. Holzer: > > On 2025-06-27 19:00:36 +0200, raphi wrote: > > > > > It's the application's password that we want to ensure that it is > > > complex and gets changed after we set an initial password for it. > > Why let a human change that at all? Couldn't you just create a suitable > > random password at deployment time? (And then automatically every n > > months if you want to rotate it.) > > > Because someone has to configure the password in the application, mostly > within WLS or Tomcat
Yeah, my aim would be to eliminate that "somebody" and automate it with
an ansible playbook (or whatever).
> and that's definitely not something that we DBA want to touch, that's
> the devs job. Which means we would have to provide some mechanism for
> the application to grab the password, say from a file or something,
> which has it's own pitfalls. Not to mention that we DBA usually don't
> want to know any application passwords.
If it's automated the DBA wouldn't know the password. The playbook would
generate a random password, create the user in the database and create
an XML file for Tomcat[1] with the connection details (including the
password). It seems to me that this would be a relatively simple change
to your existing "database self service" mechanism.
> The only feasable way to implement this is with hashicorp Vault or
> something similar, then no one knows the password, neither DBA nor Dev
> and it would be guaranteed that it's complex.
That's another possibility. Might be a bit more complex, but I've never
used it so I don't really know.
hjp
[1] There are probably different methods, but wherever I see Java, I
also see XML ;-)
--
_ | Peter J. Holzer | Story must make more sense than reality.
|_|_) | |
| | | [email protected] | -- Charles Stross, "Creative writing
__/ | http://www.hjp.at/ | challenge!"
signature.asc
Description: PGP signature
