Skip to content

Commit 1d7c0cb

Browse files
authored
Recommend setting a strong passphrase for druid-pac4j auth (#17712) (#17717)
1 parent 81a3f51 commit 1d7c0cb

File tree

2 files changed

+9
-5
lines changed

2 files changed

+9
-5
lines changed

docs/development/extensions-core/druid-pac4j.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,17 @@ druid.auth.authenticator.jwt.type=jwt
4747
### Properties
4848
|Property|Description|Default|required|
4949
|--------|---------------|-----------|-------|
50-
|`druid.auth.pac4j.cookiePassphrase`|passphrase for encrypting the cookies used to manage authentication session with browser. It can be provided as plaintext string or The [Password Provider](../../operations/password-provider.md).|none|Yes|
50+
|`druid.auth.pac4j.cookiePassphrase`|Passphrase for encrypting the cookies used to manage authentication session with browser. It can be provided as plaintext string or the (recommended) [Password Provider](../../operations/password-provider.md).|none|Yes|
5151
|`druid.auth.pac4j.readTimeout`|Socket connect and read timeout duration used when communicating with authentication server|PT5S|No|
5252
|`druid.auth.pac4j.enableCustomSslContext`|Whether to use custom SSLContext setup via [simple-client-sslcontext](simple-client-sslcontext.md) extension which must be added to extensions list when this property is set to true.|false|No|
5353
|`druid.auth.pac4j.oidc.clientID`|OAuth Client Application id.|none|Yes|
5454
|`druid.auth.pac4j.oidc.clientSecret`|OAuth Client Application secret. It can be provided as plaintext string or The [Password Provider](../../operations/password-provider.md).|none|Yes|
5555
|`druid.auth.pac4j.oidc.discoveryURI`|discovery URI for fetching OP metadata [see this](http://openid.net/specs/openid-connect-discovery-1_0.html).|none|Yes|
5656
|`druid.auth.pac4j.oidc.oidcClaim`|[claim](https://openid.net/specs/openid-connect-core-1_0.html#Claims) that will be extracted from the ID Token after validation.|name|No|
57-
|`druid.auth.pac4j.oidc.scope`| scope is used by an application during authentication to authorize access to a user's details |`openid profile email`|No
57+
|`druid.auth.pac4j.oidc.scope`| scope is used by an application during authentication to authorize access to a user's details.|`openid profile email`|No|
58+
59+
:::info
60+
Users must set a strong passphrase to ensure that an attacker is not able to guess it simply by brute force.
61+
A compromised passphrase may allow an attacker to read and manipulate session cookies.
62+
For more details, see [CVE-2024-45384](https://nvd.nist.gov/vuln/detail/CVE-2024-45384).
63+
:::

website/.spelling

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2191,9 +2191,7 @@ regionName
21912191
json
21922192
metastore
21932193
UserGroupInformation
2194-
CVE-2019-17571
2195-
CVE-2019-12399
2196-
CVE-2018-17196
2194+
CVE-2024-45384
21972195
bin.tar.gz
21982196
0s
21992197
1T

0 commit comments

Comments
 (0)