On Fri, 2023-10-06 at 14:26 -0500, Nathan Bossart wrote: > I guess it's more of the latter. Perhaps one potential use case > would be > short-lived credentials that are created on demand. Such a password > might > only be valid for something like 15 minutes, and many users might > have the > ability to request a password for the database role. I don't know > whether > there is a ton of demand for such a use case, and it might already be > solvable by just creating separate roles. In any case, if there's > general > agreement that we only want to target the rotation use case, that's > fine by > me.
The basic problem, as I see it, is: how do we keep users from accidentally dropping the wrong password? Generated unique names or numbers don't solve that problem. Auto-incrementing or a created-at timestamp solves it in the sense that you can at least look at a system view and see if there's a newer one, but it's a little awkward. A validity period is a good fit if all passwords have a validity period and we don't change it, but gets awkward otherwise. I'm also worried about two kinds of clutter: * old passwords not being garbage-collected * the identifier of the current password always changing (perhaps fine if it'a a "created at" ID?) Regards, Jeff Davis