Skip to content

[beyondinsight_password_safe] Handle null password ion authentication#17411

Open
StacieClark-Elastic wants to merge 1 commit intoelastic:mainfrom
StacieClark-Elastic:beyondinsight_password_safe-handle-null-password
Open

[beyondinsight_password_safe] Handle null password ion authentication#17411
StacieClark-Elastic wants to merge 1 commit intoelastic:mainfrom
StacieClark-Elastic:beyondinsight_password_safe-handle-null-password

Conversation

@StacieClark-Elastic
Copy link
Member

Proposed commit message

Added a check to handle null password during authentication

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • [x ] I have verified that all data streams collect metrics or logs.
  • [ x] I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

@StacieClark-Elastic StacieClark-Elastic requested a review from a team as a code owner February 13, 2026 20:37
@StacieClark-Elastic StacieClark-Elastic added bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Integration:beyondinsight_password_safe BeyondInsight and Password Safe labels Feb 13, 2026
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@StacieClark-Elastic StacieClark-Elastic changed the title Handle null password ion authentication [beyondinsight_password_safe] Handle null password ion authentication Feb 13, 2026
@StacieClark-Elastic StacieClark-Elastic force-pushed the beyondinsight_password_safe-handle-null-password branch from 751fd99 to 49b09d2 Compare February 13, 2026 20:39
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@elasticmachine
Copy link

💚 Build Succeeded

Copy link
Contributor

@efd6 efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggest the following commit message

beyondinsight_password_safe: handle optional password in authentication

The BeyondInsight API does not always require a password for
authentication. Whether one is needed depends on the "User Password
Required" setting on the API registration in BeyondInsight. When no
password was configured, the integration failed because it assumed
the password field was always present in state.

ref: https://docs.beyondtrust.com/bips/docs/bi-cloud-configure-api

url: http://{{Hostname}}:{{Port}}/BeyondTrust/api/public/v3
apikey: test_api_key
username: testuser2
password: null
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This has no default in the manifest, so it can be omitted here.

Suggested change
password: null

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the state construction I think the password field should be conditionally included

{{#if password}}
  password: {{escape_string password}}
{{/if}}

"Authorization": [
sprintf("PS-Auth key=%s; runas=%s;", [state.apikey, state.username]) +
((state.password != "") ? (sprintf(" pwd=[%s];", [state.password])) : ""),
((state.?password.orValue("") != "") ? (sprintf(" pwd=[%s];", [state.password])) : ""),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

With conditional rendering into the config, this becomes has(state.password) ? …

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bugfix Pull request that fixes a bug issue Integration:beyondinsight_password_safe BeyondInsight and Password Safe Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants