[ http://issues.apache.org/jira/browse/DIREVE-321?page=comments#action_12363016 ]
Stefan Zoerner commented on DIREVE-321: --------------------------------------- If admin is allowed to to read the password, why shouldn't s/he be allowed to dump them? If passwords are stored as hash value (DIREVE-286), it is at least not that easy to guess them. For a disaster recovery scenario, complete db content has more value. > Need a dump tool to extract LDIF from JDBM database > --------------------------------------------------- > > Key: DIREVE-321 > URL: http://issues.apache.org/jira/browse/DIREVE-321 > Project: Directory Server > Type: New Feature > Reporter: Alex Karasulu > Assignee: Alex Karasulu > Priority: Critical > Fix For: 0.9.4 > > We're in need of a tool that dumps the contents of the jdbm database as an > LDIF. This tool is meant to be used if the server cannot start of the > database is corrupt for some reason. It should try its best to extract as > much data as it can from the database using the master table and the dn index. -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://issues.apache.org/jira/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira
