[ 
https://issues.apache.org/jira/browse/SYNCOPE-505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14033849#comment-14033849
 ] 

Colm O hEigeartaigh commented on SYNCOPE-505:
---------------------------------------------


Well in the DBPasswordPropagationActions we know that the password is 
hashed/encrypted as we are calling getPassword() and not getClearPassword(), 
right? I suppose we could only write out the password if 
SyncopeUser.getCipherAlgorithm() matches the configured value for the DB 
Connector hash algorithm?

Colm.

> Support propagating non-cleartext passwords to external resources
> -----------------------------------------------------------------
>
>                 Key: SYNCOPE-505
>                 URL: https://issues.apache.org/jira/browse/SYNCOPE-505
>             Project: Syncope
>          Issue Type: Improvement
>          Components: core
>            Reporter: Francesco Chicchiriccò
>            Assignee: Colm O hEigeartaigh
>             Fix For: 1.2.0
>
>
> Similarly to SYNCOPE-313 during synchronization, it seems feasible to provide 
> some Propagation Actions classes (say {{DBPasswordPropagationActions}} and 
> {{LDAPPasswordPropagationActions}} that will propagate non-cleartext password 
> values to external resources.
> This might require some changes in the related connector bundles.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to