If you discover a security vulnerability, please report it responsibly by emailing security@ory.sh. Do not open a public GitHub issue for security vulnerabilities.
We will acknowledge receipt within 3 business days and work with you to understand and address the issue.
When using this provider:
-
Protect API Keys: Never commit API keys to version control. Use environment variables or a secrets manager.
-
Use Terraform State Encryption: Enable encryption for your Terraform state, especially in remote backends.
-
Restrict State Access: Limit who can access Terraform state files, as they may contain sensitive values.
-
Review Plans: Always review
terraform planoutput before applying changes. -
Audit Changes: Use version control and code review for all Terraform configuration changes.
client_secretvalues inory_oauth2_clientare stored in Terraform statepasswordvalues inory_identityare stored in Terraform state- SMTP connection URIs may contain credentials
- API keys configured in the provider are passed to the Ory API
Use Terraform's sensitive variable handling and state encryption to protect these values.