Say we have a kubernetes cluster with Google as the OIDC provider for authentication.
Every developer using that cluster has the ~/.kube/config
with following configured:
user:
auth-provider:
config:
client-id: <client-id>
client-secret: <client-secret>
id-token: <id-token>
idp-issuer-url: https://accounts.google.com
refresh-token: <refresh-token>
When the developer leaves the organisation he is removed from Google login and he can not use this ~/.kube/config
to access kubernetes resources as he would need to login to Google, but he cannot do that now.
But the client id and secret is still leaked.
client-secret
leakage here can be of any security concern?- Can it be exploited by a non org member using an org member?
- Can this
client-id
andclient-secret
be used to make a different app and be exploited to make existing organization users to sign in and gain access to the ID-token on that existing user behalf?
Please suggest.
PS: the credential type of this client-id and client-secret is "Other" and not a "Web application" with redirect url.