2
I’m migrating from a local tfs to a private git (probably bitbucket). Today I simply encrypt webconfig, now I will have to take my sensitive data out of version control (Connection string, passwords, etc).
How do you do it? Environment variables?
Since the answer is probably yes, every time you need to add or edit a key, I go to the infra-man and it adds "in hand"?
What about the organization of these variables? One variable for each key? At user level? Must I encrypt in some way?
In case I use Enkins, the deploy is automated. But I’m studying improvements in the process. I believe that the permissions of Jenkins do not allow changing environment variables, so the question of the guy below.
I’m also intrigued on how Azure create the variables/settings, How does Azure do to change the veritable environment by site/app? Could (should) simulate this in my systems as well?
thank you for answering. As I said, today I already encrypt my webconfig, but I want to use a git (bitbucket) as version control, making it impossible to use this technique anymore (as the risk of sending passwords and connectionstrings to bitbucket "unintentionally"). If you look at Azure, Heroku, openshitf, etc, they always use environment variables, because "outside the dotnet world", keeping this data in webconfig (even encrypted) is not safe.
– Fernando Mondo
Here you have a reference: http://www.hanselman.com/blog/BestPracticesForPrivateConfigDataAndConnectionStringsInConfigurationInASPNETAndAzure.aspx
– Fernando Mondo