This checks out. Thank you for educating me.
For any doubters, here’s a long-form article on the subject: https://www.taxpolicycenter.org/taxvox/who-gets-tax-benefit-those-checkout-donations-0
This checks out. Thank you for educating me.
For any doubters, here’s a long-form article on the subject: https://www.taxpolicycenter.org/taxvox/who-gets-tax-benefit-those-checkout-donations-0
Do you see the comment from user “Maalus” immediately prior to the comment that you first replied to? That’s where it was said.
If you cannot see that comment it’d be interesting to understand why. Maybe you have blocked that user so can’t see his comment but you are seeing replies to it?
CyberArk is a commercial product that attacks this problem space. It puts an agent process on the host next to your app. Only processes whose fingerprint matches those authorized to access a credential are allowed to fetch it. That fingerprint can be based on the host (known list of production hosts), the os user ID that owns the pid, the path to the executable for the pid, and probably a few more items.
Under that model your app just needs to know the environment that it wants (inject however you want) and the userid it wants to use. At runtime it reaches out to the local cyberark agent to obtain the password secret.
To anyone that hasn’t yet seen the movie Idiocracy, watch it now. Best documentary you’ll ever watch.