This is an automated email from the ASF dual-hosted git repository.

potiuk pushed a commit to branch v3-0-test
in repository https://gitbox.apache.org/repos/asf/airflow.git


The following commit(s) were added to refs/heads/v3-0-test by this push:
     new 30f51d3969f [v3-0-test] Clarify our security model for sensitive 
connection information (#54088) (#54100)
30f51d3969f is described below

commit 30f51d3969f60854dcd07bd50e7d7753a0bf1d37
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Mon Aug 4 19:22:09 2025 +0200

    [v3-0-test] Clarify our security model for sensitive connection information 
(#54088) (#54100)
    
    The #53973 introduced a change in the model of handling of the
    sensitive connection data in the Airlfow UI. Previoiusly our agreed
    model included capability of reading sensitive data bu the users who
    have Connection Configuraiton role. However in 3.0.4 we changeed the
    model so that those users have "write-only" access - they can write
    the sensitive data, but they cannot read the data via API or the UI
    once it is written. WHile not a security vulnerability on it's own,
    it's a security improvement that allows to mitigate some scenarios,
    especially when connection editing user credentials are stolen.
    
    This PR clarifies the model and properly communicates it to the users
    clearly indicating the difference implemented in 3.0.4 and the model
    of our security and clearly explaining that before 3.0.4 that was a
    delibearate choice of the model that the connection editing users
    had access to the sensitive data.
    (cherry picked from commit f5a88d97eb791194a5bad66a1c5021abdd1fb775)
    
    Co-authored-by: Jarek Potiuk <[email protected]>
---
 airflow-core/docs/security/security_model.rst | 15 ++++++++++++---
 1 file changed, 12 insertions(+), 3 deletions(-)

diff --git a/airflow-core/docs/security/security_model.rst 
b/airflow-core/docs/security/security_model.rst
index 3aed408cab5..78f0090336c 100644
--- a/airflow-core/docs/security/security_model.rst
+++ b/airflow-core/docs/security/security_model.rst
@@ -115,9 +115,9 @@ Connection configuration users
 ..............................
 
 They configure connections and potentially execute code on workers during DAG 
execution. Trust is
-required to prevent misuse of these privileges. They have full access
-to sensitive credentials stored in connections and can modify them.
-Access to sensitive information through connection configuration
+required to prevent misuse of these privileges. They have full write-only 
access
+to sensitive credentials stored in connections and can modify them, but cannot 
view them.
+Access to write sensitive information through connection configuration
 should be trusted not to be abused. They also have the ability to configure 
connections wrongly
 that might create a API Server Denial of Service situations and specify 
insecure connection options
 which might create situations where executing dags will lead to arbitrary 
Remote Code Execution
@@ -125,6 +125,15 @@ for some providers - either community released or custom 
ones.
 
 Those users should be highly trusted not to misuse this capability.
 
+.. note::
+
+   Before Airflow 3, the **Connection configuration users** role had also 
access to view the sensitive information this has
+   been changed in Airflow 3 to improve security of the accidental spilling of 
credentials of the connection configuration
+   users. Previously - in Airflow 2 - the **Connection configuration users** 
had deliberately access to view the
+   sensitive information and could either reveal it by using Inspect 
capabilities of the browser or they were plain visible in
+   case of the sensitive credentials stored in configuration extras. Airflow 3 
and later versions include security
+   improvement to mask those sensitive credentials at the API level.
+
 Audit log users
 ...............
 

Reply via email to