Add support for credential rotation for Zero Downtime Deployment #700
Replies: 1 comment
-
First off, AUTH is not recommended; see [1] ("Problems with AUTH"). Secondly, SYM_ENCRYPT relies on a static keystore. If keys are changed (in all keystores), then members need to be restarted. If this doesn't work for you, would adding a function to reload keys to [1] http://www.jgroups.org/manual5/index.html#AUTH |
Beta Was this translation helpful? Give feedback.
-
Currently when a JGroups stack uses AUTH or Encrypt stack elements, then the configured password or keystores are the sole credentials that are used to authenticate or encrypt jgroups traffic.
If credentials need to be rotated, then old cluster members cannot communicate with the new members - because the old members don't know the new credentials. This my cause service interruptions and makes it hard to implement zero-downtime requirements.
Idea:
In order to support credential rotation, jgroups could support a "backup" Keystore or credentials / key / password that could be used to provide the "old" password / keystore to new jgroups members, for the time of the migration, such that new members could catch up with old members. Once the new credentails are available to all new members, the backup keystore / auth key / passwords could be removed again from the configuration.
Beta Was this translation helpful? Give feedback.
All reactions