# Secret storage **Status**: draft **Date**: 2021-06-02 **NOTE**: this document is a draft and is not implemented yet. Statement in this document might be changed in the future. ## Introduction Secrets are sensitive data that should be stored securely. There are following types of the secrets in the PRISM Platform: - seed: a secret used to derive cryptographic keys - private key: a secret used to sign data - public key: a secret used to verify signatures The PRISM Platform provides a secure storage for secrets. Hashicorp Vault is used as a secret storage service and provides a REST API, Web UI and command client to interact with the service. **NOTE:** The PRISM Platform uses a single Vault instance for all tenants per environment. Logical data separation is achieved by using Vault namespaces and policies applied to the tenant. ## Terminology ### Vault Vault is a secrets management service developed by HashiCorp. ### Agent PRISM Agent is a service that provides an APIs to interact with the PRISM Platform. ### Wallet Logical component fo the Agent that holds secrets. ## Technical Overview ### PRISM Agent Logical Isolation Each instance of the PRISM agent needs to have access to the secrets but must be isolated from other agents at the same environment. Vault namespaces are used to achieve this goal, so each agent has its own namespace and can access only its own secrets. For horizontal scalability the group of agents can be configured to share the same namespace, so they can access the same secrets, but they still need to use different Vault account to authenticate themselves to the Vault service. ### PRISM Agent Authentication Each instance of the PRISM agent needs to authenticate itself to the Vault service. The Vault service uses a token-based authentication mechanism. The PRISM agent uses a Vault [AppRole](https://developer.hashicorp.com/vault/docs/auth/approle) authentication method to authenticate itself to the Vault service. The token issued to the agent has the expiration time set in the application configuration. After the token expires, the agent needs to re-authenticate itself to the Vault service. ### Wallet Authentication Each instance of the Wallet needs to authenticate itself to the Vault service. The PRISM agent issues the authentication token to the Wallet based on the tenant ID. ### Secrets Engine Configuration The Vault service uses a secrets engine to store secrets. KV2 secrets engine is used to store secrets in the Vault service and provides the following features: - secrets are encrypted at rest - secrets are encrypted in transit - secrets are versioned - secrets can be deleted, restored and rolled back to a previous version - secrets are available via REST API, WEB UI, and command client - secrets are logically separated by namespaces and tenants ### Single and Multi-Tenant Configuration The PRISM Platform supports single and multi-tenant configurations. In the single-tenant configuration, the PRISM Agent uses a single Vault namespace, a single Wallet and a single Vault account to authenticate itself to the Vault service. In the multi-tenant configuration, the PRISM Agent manages multiple Wallets, each Wallet is associated with a single tenant. Multi-tenant configuration is used to achieve logical data separation between tenants, so each Wallet can access only its own secrets. The Wallet is identified by the tenant ID and represented by the account in the Vault service. The common sequence diagram for the single and multi-tenant configurations is shown below: ```mermaid sequenceDiagram Tenant->>+Agent: REST/DIDComm API Agent->>+Wallet: route the request Wallet->>+Vault: manage secrets Vault->>+Wallet: secrets Wallet->>+Wallet: business logic Wallet->>+Agent: route the response Agent->>+Tenant: REST/DIDComm API ``` ### Key Derivation The PRISM Platform uses HD key derivation to derive cryptographic keys from the seed. The Wallet is initialized with the seed and uses it to derive cryptographic keys for managed DIDs. Key derivation path is conventional and is defined as follows: ```agsl m / wallet-purpose` / DID-index` / key-purpose` / key-index` ``` ### Naming Convention The Wallet uses the following naming convention for secrets (DIDs and keys) stored in the Vault service: ```agsl <tenant-id>/dids/<did-ref>/keys/<key-purpose>/<key-index>/<key-type> value=<base64-encoded-value> <metadata> ``` where: - `tenant-id` is the tenant ID assigned to the Wallet - `did-index` is the DID index. Starts from 0 and grows incrementally after each DID creation. - `key-purpose` is the key purpose according to the PRISM DID Method specification - `key-index` is the key index. Starts from 0 and grows incrementally after each key rotation - `key-type` is the key type: public or private - `base64-encoded-value` is the base64-encoded value of the key - `metadata` is the key/value metadata attached the key that can be used to store additional information about the key such as `seed` or `key-derivation-path` ## Key Rotation The Agent supports key rotation for the managed DIDs. The key rotation is performed by the Agent and consists of the following steps: - select the DID to rotate the keys - generate new keys and store them in the Vault service - update and publish the DID document with the new keys **NOTE:** The Agent does not delete the old keys from the Vault service, so the old keys can be used to verify signatures of the messages signed with the old keys. **NOTE:** The key rotation procedure is not clarified yet and might be changed in the future. This functionality is not implemented yet. Links: - [PRISM DID Method Specification](https://github.com/input-output-hk/prism-did-method-spec) - [Vault Secrets Engine API](https://www.vaultproject.io/api/secret/kv/kv-v2) - [Vault Namespaces](https://www.vaultproject.io/docs/concepts/namespaces) - [HD Key Derivation ADR](https://github.com/input-output-hk/atala-prism-building-blocks/blob/main/docs/decisions/20230516-hierarchical-deterministic-key-generation-algorithm.md) - [Vault AppRole Authentication](https://www.vaultproject.io/docs/auth/approle) - [Vault Token Authentication](https://www.vaultproject.io/docs/auth/token) - [Vault KV Secrets Engine](https://www.vaultproject.io/docs/secrets/kv/kv-v2) - [Vault Entities](https://www.vaultproject.io/docs/concepts/entities)