You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the problem you are trying to solve
As an added layer of security, we could consider allowing generating an org decryption key that only the user controls so that org credentials could not be decrypted without that.
Thoughts:
allow user to choose "extra encryption"
Generate a key for the user - and tell them to store it in their password manager
We store the key in their browser so the user only needs to enter it when using a new browser session
Upon login, if the orgs are encrypted - ask for the key
If the key is unavailable, then the user would be required to generate a new key and re-connect all of their orgs
Benefits:
Org auth tokens stored in Jetstream's DB would not be able to be decrypted with any encryption keys housed within jetstream's infrastructure.
The text was updated successfully, but these errors were encountered:
Describe the problem you are trying to solve
As an added layer of security, we could consider allowing generating an org decryption key that only the user controls so that org credentials could not be decrypted without that.
Thoughts:
Benefits:
Org auth tokens stored in Jetstream's DB would not be able to be decrypted with any encryption keys housed within jetstream's infrastructure.
The text was updated successfully, but these errors were encountered: