+1

Agree with Jan. Nice summary :)

Regards.
Denis

> -----Messaggio originale-----
> Da: Jan Bernhardt [mailto:jbernha...@talend.com]
> Inviato: giovedì 10 gennaio 2013 11:24
> A: dev@syncope.apache.org
> Oggetto: RE: Support for encrypted schema attributes
> 
> 
> +1 
> Nice summary!
> 
> Regards.
> Jan
> 
> > -----Original Message-----
> > From: Francesco Chicchiriccò [mailto:ilgro...@apache.org]
> > Sent: Donnerstag, 10. Januar 2013 10:01
> > To: dev@syncope.apache.org
> > Subject: Re: Support for encrypted schema attributes
> > 
> > On 09/01/2013 19:37, Denis Signoretto wrote:
> > > [...]
> > > I agree with Fabio, probably this feature it's not so 
> useful in most of
> > common cases.
> > > I was imagining a general use cases where some user 
> attributes, for
> > > security reasons or law restrictons, can't be stored 
> cleartext; e.g. a
> > > sort of sencondary password or a PIN to use for instance 
> to open doors
> > > or to enable a payment (some online banking use a secondary PIN to
> > confirm a payment operation).
> > 
> > Hi all,
> > let me summarize the requirements of this new "Encrypted 
> Schema" (for
> > what I have understood from recent e-mails).
> > 
> > 1. Main purpose: store some arbitrary string values encrypted in the
> > database; this can be enforced by law, for example.
> > 
> > 2. When defining an encrypted schema, you must provide the cypher
> > algorithm to be used and a passphrase.
> > Such passphrase will be stored by Syncope as encrypted with 
> an internal key
> > (more or less like we are already doing with user passwords).
> > 
> > 3. When creating an attribute with such schema, the value(s) will be
> > automatically encrypted by Syncope using the provided algorithm and
> > passphrase.
> > 
> > 4. When reading an attribute with such schema (e.g. contained in an
> > AttributeTO), the value(s) will be sent encrypted.
> > Only who knows the algorithm and the passphrase will be 
> able to decrypt.
> > Moreover, you can think to make the admin console able to show such
> > attribute value(s) as encrypted by default and to decrypt 
> them on demand
> > after asking for algorithm and passphase.
> > 
> > 5. When propagating / synchronizing attribute with such schema,
> > GuardedString will be used, not String.
> > 
> > 6. When changing algorithm or passpshase of an existing 
> schema, new values
> > will be encrypted with these, old values will remain as they are.
> > Naturally, one can provide an update procedure.
> > 
> > Does it sound reasonable? If so I will open an issue for this.
> > 
> > Regards.
> > 
> > --
> > Francesco Chicchiriccò
> > 
> > ASF Member, Apache Syncope PMC chair, Apache Cocoon PMC Member
> > http://people.apache.org/~ilgrosso/
> 
> 

Reply via email to