-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Questions about CommonHealth client credentials #11
Comments
|
Got it, then I think I know what we need to do for pre-MVP on our side:
|
Sounds great. Once we have the SoF auth server integrated with CHCS and in a testable state I will reach out and we can begin testing the better auth flow. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@surfdoc has provided me with credentials for Jupyter Health and Jupyter Health Testing.
I've placed the two sets of credentials as KV pairs in aws secretmanager in our aws project:
ch-health-creds-[prod|testing]
.My questions so far are about credentials and their lifetimes/lifecycles
ch_client.fetch_data()
. Right?What I'm trying to get at is what does "Jupyter Health" have access to, vs what does an individual Hub user have access to, and how can/should they differ (e.g. subsets of keys or shared keys, etc.). This will affect what credentials we load into the Hub user environment, and the presumably custom StorageDelegate class that we will use, because SQLite isn't going to work for shared state. For example, I see these broad categories:
Which of these best represents the credential/access patterns we expect here? In particular, does 3. make sense where a single 'partner' might have different users with different access scopes, or does this generally mean creating a new 'partner', and keys should be considered an implementation detail?
The text was updated successfully, but these errors were encountered: