[ 
https://issues.apache.org/jira/browse/DERBY-4579?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kim Haase updated DERBY-4579:
-----------------------------

    Attachment: DERBY-4579-2.diff
                DERBY-4579-2.zip

Thanks very much, Knut. I've incorporated your edits into a second patch 
(DERBY-4579-2.diff and DERBY-4579-2.zip), which I'll commit. I put the added 
sentence under Syntax.


> Document the configurable hash authentication scheme
> ----------------------------------------------------
>
>                 Key: DERBY-4579
>                 URL: https://issues.apache.org/jira/browse/DERBY-4579
>             Project: Derby
>          Issue Type: Improvement
>          Components: Documentation
>    Affects Versions: 10.6.0.0
>            Reporter: Knut Anders Hatlen
>            Assignee: Kim Haase
>         Attachments: DERBY-4579-2.diff, DERBY-4579-2.zip, DERBY-4579.diff, 
> DERBY-4579.stat, DERBY-4579.zip
>
>
> DERBY-4483 adds the ability to configure which message digest algorithm to 
> use to protect the passwords that are stored in the database when using 
> BUILTIN authentication.
> I think these changes are required:
> * Reference manual: Document the new database property 
> derby.authentication.builtin.algorithm. It's a dynamic property that can be 
> set either on database level or on system level. Its value is the name of a 
> message digest algorithm available from one of the Java Cryptography 
> Extension providers registered in the JVM. Example values: MD5, SHA-256, 
> SHA-512. The specified algorithm will be applied on the concatenation of the 
> user name and the password before it's stored in the database. If the 
> property is NULL or the empty string, the old algorithm (SHA-1 on the 
> password only) is applied instead.
> * Developer's guide: Mention the property in "List of user authentication 
> properties"
> * Server and admin guide: In the table in section "Network client security", 
> mention that strong password substitution cannot be used to connect as a user 
> whose password has been stored with the new scheme. I'd suggest changing the 
> following sentence:
>     Strong password substitution cannot be used with external Derby 
> authentication schemes (for example, LDAP).
> And replacing it with something like:
>     Strong password substitution can only be used with Derby's NONE and 
> BUILTIN authentication schemes. Also, for the BUILTIN scheme, it does not 
> work for database-level users whose password has been protected by a custom 
> message digest algorithm specified by the 
> derby.authentication.builtin.algorithm property.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to