You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 8, 2021. It is now read-only.
Use case : Programmatically accessing Azure DEVOps is through the use of Personal Access Tokens (PAT). The PAT has to be base64 encoded when constructing the auth. header.
Can the Get/Set-Secret cmdlets improve security when dealing with Personal Access Tokens, for example GitHub and Azure DEVOps, as well as other API that require the parsing of an authentication header? Having the text in insecure memory for as short a time as possible would be beneficial.
At the moment I'm using the Set-Secret to save the encoded base64 PAT but that still means variables that are potentially unsafe and need properly handling in memory. At least being able to pull the value from the store means I'm not having to manipulate it every time I call it out of credential manager. Now I just need to worry about auth. header variable and securely destroying that after use.