[ 
https://issues.apache.org/jira/browse/SYNCOPE-505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14033863#comment-14033863
 ] 

Francesco Chicchiriccò commented on SYNCOPE-505:
------------------------------------------------

The logic for hashing the password value according to the relevant 
configuration lays in DBTable connector's code, not Syncope's.
This means that normally Syncope passes the password as clear text (wrapped in 
{{GuardedString}}) and then the connector will hash it according to the 
configured algorithm before writing to the underlying db table.

We should find a way then to instruct the connector that the specific password 
value we are passing is already hashed: unfortunately, connector configuration 
properties are only evaluated when creating a connector instance, so they 
cannot be changed on-the-fly.

BTW, writing out the password only if {{SyncopeUser#getCipherAlgorithm}} 
matches the configured value for the DB Connector hash algorithm (e.g. the same 
logic of SYNCOPE-313) seems correct to me.

> Support propagating non-cleartext passwords to external resources
> -----------------------------------------------------------------
>
>                 Key: SYNCOPE-505
>                 URL: https://issues.apache.org/jira/browse/SYNCOPE-505
>             Project: Syncope
>          Issue Type: Improvement
>          Components: core
>            Reporter: Francesco Chicchiriccò
>            Assignee: Colm O hEigeartaigh
>             Fix For: 1.2.0
>
>
> Similarly to SYNCOPE-313 during synchronization, it seems feasible to provide 
> some Propagation Actions classes (say {{DBPasswordPropagationActions}} and 
> {{LDAPPasswordPropagationActions}} that will propagate non-cleartext password 
> values to external resources.
> This might require some changes in the related connector bundles.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to