-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to remove any secure credentials from a V2 Teams service profile once entered #1292
Comments
@t1m0thyj @davidkjackson54 are the service secure creds removed if you delete the properties from the secure array in In some cases, skipping questions in the secure array and the values staying the same is desirable. For example, if my config uses 4 sets of creds for different LPARs and I only want to update one set. I can run |
If the zowe.config.user provides a higher level argument and a lower level service profile also provide the argument, then it will take precedence. If the user wishes to revert to using the higher level profile then he needs to be able to 'undo' his credentials from the service profile. yyyy will take precedence. |
@davidkjackson54 The above method suggested by @MikeBauerCA works for me to stop yyyy from taking precedence. If I remove (or comment out) the user and password properties in the secure array of the {
"$schema": "./zowe.schema.json",
"profiles": {
"D001": {
"type": "zosmf",
"profiles": {
"u820all": {
"type": "zosmf",
"properties": {},
"secure": [
//"user",
//"password"
]
}
},
"properties": {
"host": "example.com",
"port": 443
},
"secure": [
"user",
"password"
]
}
},
"defaults": {
"zosmf": "D001.u820all"
},
"autoStore": true
} |
@t1m0thyj @MikeBauerCA Having the user edit a supplied zowe.config.json would seem to be going against the principles of having a team profile in the first place? that is essentially what the article Zowe CLI — Getting Started, Made Easy! refers to: |
I believe that the |
Thank you for raising this issue. |
Closing this issue as the initial question about how to delete secure credentials with the ProfileInfo API has been addressed here. Additional enhancements can be tracked in separate issues:
|
This problem was found when modifying VSCode Explorer code to use V2 Teams profiles.
The user enters his secure credentials into the service profile and also sets a default set of credentials in the base profile.
Once this has been done, there is no current means of removing the secure credentials from the service profile to allow that profile to default to the base profile values.
This problem exists in the cli
zowe config secure
command and also needs to be addressed in the ProfileileInfo class to allow the credentials to be removed by VSCode applications in code.Currently the only workaround is to delete all the zowe related credentials from the Operating System's secure vault which is risky should the user inadvertently select the wrong entry to be deleted. That also requires the user to then have to re-enter all his credentials again which is a poor user expereince.
The text was updated successfully, but these errors were encountered: