hkamel / sonar-auth-aad

Azure Active Directory Authentication for SonarQube

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Client Secret exposed in settings after save

dfar-io opened this issue · comments

After saving the Client Secret for my service principal, the secret is exposed to any other administrators within the system.

The secret should be masked to keep the value a secret (matching the functionality provided in Azure).

2020-01-09 11_46_42-General Settings - Administration

You should use the Settings Encryption feature that's part of SonarQube if you want to mask the value from view. See Settings Encryption in the Official Documentation for information on how to do that. Note that for step 4, you just need to copy the generated value to the configuration field.