[ 
http://issues.apache.org/jira/browse/DIREVE-321?page=comments#action_12363016 ] 

Stefan Zoerner commented on DIREVE-321:
---------------------------------------

If admin is allowed to to read the password, why shouldn't s/he be allowed to 
dump them? If passwords are stored as hash value (DIREVE-286), it is at least 
not that easy to guess them. For a disaster recovery scenario, complete db 
content has more value.



> Need a dump tool to extract LDIF from JDBM database
> ---------------------------------------------------
>
>          Key: DIREVE-321
>          URL: http://issues.apache.org/jira/browse/DIREVE-321
>      Project: Directory Server
>         Type: New Feature
>     Reporter: Alex Karasulu
>     Assignee: Alex Karasulu
>     Priority: Critical
>      Fix For: 0.9.4

>
> We're in need of a tool that dumps the contents of the jdbm database as an 
> LDIF.  This tool is meant to be used if the server cannot start of the 
> database is corrupt for some reason.  It should try its best to extract as 
> much data as it can from the database using the master table and the dn index.

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira

Reply via email to