[ 
https://issues.apache.org/jira/browse/SYNCOPE-313?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14026295#comment-14026295
 ] 

Colm O hEigeartaigh commented on SYNCOPE-313:
---------------------------------------------

Hi Francesco,

Ok thanks for the clarification. I think allowing a list of propagation + sync 
actions makes sense, so that we could support the new password + membership 
sync actions behaviours at the same time, for example.

To clarify the password encoding issue: Currently, the PasswordEncoder 
hard-codes the digest output to HEX:

digester.setStringOutputType(CommonUtils.STRING_OUTPUT_TYPE_HEXADECIMAL);

So let's say our LDAPPasswordSynchronizationAction is taking the encoded 
password + setting it directly into SyncopeUser. For the LDAP example, it is 
BASE-64 encoded. However, when we try to verify a password next, we end up 
comparing a BASE-64 encoded digest stored in SyncopeUser with the HEX encoded 
digest generated in PasswordEncoder.verify. 

Does that make sense?

Colm.


> Support synchronizing non-cleartext passwords from external resources
> ---------------------------------------------------------------------
>
>                 Key: SYNCOPE-313
>                 URL: https://issues.apache.org/jira/browse/SYNCOPE-313
>             Project: Syncope
>          Issue Type: Improvement
>            Reporter: Colm O hEigeartaigh
>            Assignee: Colm O hEigeartaigh
>             Fix For: 1.2.0
>
>
> Currently we can synchronize cleartext passwords from external resources. 
> However, we can't handle non-cleartext passwords, as they get treated as if 
> they are plaintext passwords when imported into Syncope, and hence hashed 
> again according to user.cipherAlgorithm().
> This task is to treat an imported password as hashed according to a give 
> cipher algorithm configured on the connector (for example via 'Password 
> Cipher Algorithm' for the DB Connector). 
> This is specific to each individual connector, as for example for the DB 
> Connector, it might just be a hashed value stored in a table, whereas for 
> LDAP it'll be of the form "CIPHER}VALUE" etc.
> Note that we we cannot refer to any specific connector bundle from inside the 
> SyncopeSyncResultHandler, hence we should find the cleanest place to 
> encapsulate the following logic:
> if (password.isClearText()) {
> // do as currently done
> } else {
>   if (connector.isLDAP()) {
>    // extract cipher and value
>   } else if (connector.isDBTable()) {
>    // treat value as ciphered with the cipher defined in connector 
> configuration
>   } else {
>     ...
>   }
> }



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to