User impersonation secrets for deployment runs in prefect open source #18189
Unanswered
jlwhelan28
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
There has already been considerable discussion on why dynamic secret values passed as flow parameters is not a supported pattern in Prefect. See #11679 (among other discussions)
Understanding that, I'm struggling to navigate this in my use case for Prefect OS. I am working with the following pattern
Secret Blocks don't work for me, without fine grain auth in Prefect open source all secrets are exposed to all "users", and anyone with access to the prefect api could access secrets for another user without extensive route blocking.
Curious if anyone has tackled a similar setup or if the Prefect team has advice. Is there a way to access REST API headers from within the flow?
Beta Was this translation helpful? Give feedback.
All reactions