Skip to content

Commit 9f32252

Browse files
akosasiGitHub Enterprise
authored andcommitted
Merge pull request #60 from Conjur-Enterprise/name-change
CNJR-10966: Name Change Updates
2 parents cb4699d + fddcbbd commit 9f32252

File tree

3 files changed

+6
-41
lines changed

3 files changed

+6
-41
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,10 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
1010
- Nothing should go in this section, please add to the latest unreleased version
1111
(and update the corresponding date), or add a new version.
1212

13-
## [1.7.29] - 2025-08-26
13+
## [1.7.29] - 2025-09-03
1414

1515
### Changed
16+
- Update README to align with Conjur's name change to CyberArk Secrets Manager and update SECURITY.md. CNJR-10966
1617
- Upgrade base docker images from Debian Bullseye to Bookworm.
1718
- Migrate from MySQL 8.1 to MySQL LTS and enable `mysql_native_password` plugin in the configuration files.
1819
- Remove deprecated docker compose version declarations

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ When the client connects to a target service through the Secretless Broker:
4141

4242
Secretless is responsible for establishing connections to the backend, and can handle secret rotation in a way that’s transparent to the client.
4343

44-
To provide Secretless access to a target service, a [Service Connector](#service-connectors) implements the protocol of the service, replacing the authentication handshake. The client does not need to know or use a real password to the service. Instead, it proxies its connection to the service through a local connection to Secretless. Secretless obtains credentials to the target service from a secrets vault (such as Conjur, a keychain service, text files, or other sources) via a [Credential Provider](#credential-providers). The credentials are used to establish a connection to the actual service, and Secretless then rapidly shuttles data back and forth between the client and the service.
44+
To provide Secretless access to a target service, a [Service Connector](#service-connectors) implements the protocol of the service, replacing the authentication handshake. The client does not need to know or use a real password to the service. Instead, it proxies its connection to the service through a local connection to Secretless. Secretless obtains credentials to the target service from a secrets vault (such as CyberArk Secrets Manager, a keychain service, text files, or other sources) via a [Credential Provider](#credential-providers). The credentials are used to establish a connection to the actual service, and Secretless then rapidly shuttles data back and forth between the client and the service.
4545

4646
Secretless Broker is currently licensed under [ASL 2.0](#license)
4747

@@ -52,7 +52,7 @@ Secretless supports several target services out of the box, and these include:
5252
- MySQL (Socket and TCP)
5353
- PostgreSQL (Socket and TCP)
5454
- SSH / SSH-Agent (Beta)
55-
- HTTP with Basic auth, Conjur, and AWS authorization strategies (Beta)
55+
- HTTP with Basic auth, CyberArk Secrets Manager or Conjur OSS, and AWS authorization strategies (Beta)
5656

5757
Support for these services is provided via internal plugins (also referred to as "Service Connectors") that are part
5858
of the Secretless binary distribution.

SECURITY.md

Lines changed: 2 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,6 @@
11
# Security Policies and Procedures
22

3-
This document outlines security procedures and general policies for the CyberArk Conjur
4-
suite of tools and products.
5-
6-
* [Reporting a Bug](#reporting-a-bug)
7-
* [Disclosure Policy](#disclosure-policy)
8-
* [Comments on this Policy](#comments-on-this-policy)
9-
103
## Reporting a Bug
4+
CyberArk takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you follow responsible disclosure guidelines and contact [email protected] and work with us toward a quick resolution to protect our customers.
115

12-
The CyberArk Conjur team and community take all security bugs in the Conjur suite seriously.
13-
Thank you for improving the security of the Conjur suite. We appreciate your efforts and
14-
responsible disclosure and will make every effort to acknowledge your
15-
contributions.
16-
17-
Report security bugs by emailing the lead maintainers at [email protected].
18-
19-
The maintainers will acknowledge your email within 2 business days. Subsequently, we will
20-
send a more detailed response within 2 business days of our acknowledgement indicating
21-
the next steps in handling your report. After the initial reply to your report, the security
22-
team will endeavor to keep you informed of the progress towards a fix and full
23-
announcement, and may ask for additional information or guidance.
24-
25-
Report security bugs in third-party modules to the person or team maintaining
26-
the module.
27-
28-
## Disclosure Policy
29-
30-
When the security team receives a security bug report, they will assign it to a
31-
primary handler. This person will coordinate the fix and release process,
32-
involving the following steps:
33-
34-
* Confirm the problem and determine the affected versions.
35-
* Audit code to find any potential similar problems.
36-
* Prepare fixes for all releases still under maintenance. These fixes will be
37-
released as fast as possible.
38-
39-
## Comments on this Policy
40-
41-
If you have suggestions on how this process could be improved please submit a
42-
pull request.
6+
Refer to [CyberArk's Security Vulnerability Policy](https://www.cyberark.com/cyberark-security-vulinerability-policy.pdf) for more details

0 commit comments

Comments
 (0)