Hi Kevin,

This is what I found:


Password information from the ARS 6.3 Config. Guide (Page 54)

Identifying password that the user enters when logging in to AR System. This
field is limited to 29 characters.

The Password field is encrypted into the database using a one-way hash
(SHA1), so unauthorized users cannot retrieve passwords in clear text, for
example, to log in to applications. To enhance system security, select a
password that is different from one used for another purpose.

If unsecure passwords are needed for applications, store the password in a
character field rather than the Password field (field 102).

If the password field is left blank, the AR System server will not validate
the password with the user's Windows or UNIX password, unless you configure
the server to cross-reference a blank password. For more information, see
"Server information—configuration" on page 137.

And knowledge base entry KM-000000010443 states that mid-tier forms pass the
password to the mid-tier server in plaintext unless SSL is implemented
(which we new).
Marc Simmons
Remedy Administrator


On 6/14/07, Kevin Murray <[EMAIL PROTECTED]> wrote:

Hi All,

Env: ARS 6.3/Mid-Tier 7.0

Clarification required on the dynamics of Remedy passwords...both user
and system set...

I believe the following statements to be TRUE since v6 onwards, if not
please can you advise of what your
understanding is:

1) From v6 onwards Remedy user passwords are now generated through a
one-way MD-5 hash function when none of the of the encryption packages
are used (including the standard package)

What form are passwords sent from say a browser using the midtier
component?

2) All other Remedy component passwords such as Application Service
Password, Database User Password, LDAP Distinguised User Password etc
are stored by the server (and Mid-tier component) using 56-bit DES
encryption which incorporates salting

Finally, what hash or encrypted form do user passwords take when
passed to say the supplied AREA plugin from the ARSystem server in
either SSL and non-SSL communication? I presume they are not
sent over the wire in clear-text in either approach, but some level of
security is incorporated, in such a manner that the LDAP server can
understand the
value passed. Any insights on this appreciated.

Thanks In Advance,
Kevin

Ref: http://www.remedy.com/customers/dht/archive/03-15-2004.htm


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where
the Answers Are"




--
Marc Simmons
Remedy Administrator

"Everyday above ground is a good day... the rest is a choice!"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers 
Are"

Reply via email to