There is about a year-old thread on the list on the topic of password protecting the Rails database password (typically stored in the clear in database.yml). A lot of people dismissed the idea, since any key to decrypting the password would have to be stored on the same box. I was wondering what people thoughts were on the feasibility/desirability of passing argument to Capistrano deployment tasks that would pass the decrypting key along to the application. In many applications, the database password may not be the only sensitive password on the box. After all, web servers might need to interact with all kinds of different systems, each system requiring its own authentication credentials. So even if you don''t think that the MySQL password is all that sensitive, there is still the general issue of leaving sensitive configuration details in plaintext (and embedded in the code) on the server. Any thoughts, help, comments would be appreciated. -- Posted via http://www.ruby-forum.com/. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to rubyonrails-talk-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org To unsubscribe from this group, send email to rubyonrails-talk-unsubscribe-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org For more options, visit this group at http://groups.google.com/group/rubyonrails-talk?hl=en -~----------~----~----~----~------~----~------~--~---