clarify how AWX stores cerdentials

This commit is contained in:
Ryan Petrello
2020-03-06 16:00:41 -05:00
parent d75c2d9b44
commit 35f414ccf2

View File

@@ -1,11 +1,19 @@
Extract credentials
===================
Extracting Credential Values
============================
Credentials and encrypted settings can be extracted using the following snippet:
AWX stores a variety of secrets in the database that are either used for automation or are a result of automation. These secrets include:
- all secret fields of all credential types (passwords, secret keys, authentication tokens, secret cloud credentials)
- secret tokens and passwords for external services defined in Ansible Tower settings
- "password" type survey fields entries
To encrypt secret fields, Tower uses AES in CBC mode with a 256-bit key for encryption, PKCS7 padding, and HMAC using SHA256 for authentication.
If necessary, credentials and encrypted settings can be extracted using the AWX shell:
```python
# awx-manage shell_plus
>>> from awx.main.utils import decrypt_field
>>> cred = Credential.objects.get(name="my private key")
>>> decrypt_field(cred, "ssh_key_data")
>>> print(decrypt_field(cred, "ssh_key_data"))
```