<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
<blockquote class=" cite" id="mid_4E38839F_7030608_redhat_com"
cite="mid:4E38839F.7030608@redhat.com" type="cite"> First,
security specialist would probably rebel about providing the
password or keys in clear. The best practice says do not reveal
the keys/passwords but rather encrypt them with some other
"transport" secret that would be known to the user or destination
host and would protect the password/key while in transit.<br>
</blockquote>
<br>
OK, the transport from client to FreeIPA would, of course, be
secure, but the key/token that is returned from the client is
available in cleartext (perhaps just in memory, such as ssh-agent).
And specifying a passphrase on the command line would be discouraged
but possible -- prompting for it, if Kerberos tokens were not
sufficient, would be preferable.<br>
<br>
<blockquote class=" cite" id="mid_4E38839F_7030608_redhat_com"
cite="mid:4E38839F.7030608@redhat.com" type="cite"> Our current
plan is to focus on the storage and make sure we can address the
use cases we need to address like keys for disk encryption, SSH
etc. Serving them out is whole different story and I doubt it will
be done soon. Design work in this area would hopefully start in
the fall.</blockquote>
<br>
If there were some way to securely embed an arbitrary string in the
user profile, that would go a long way to solving this problem. At
least 4KB to cover a 2048 X.509 public key, but ideally 10 KB or
more. To remove the ACL complexity, just having it accessible only
by the user (token or password based fetch) would be suitable.<br>
<br>
Ian<br>
</body>
</html>