if it's an arx file, that means that it was exported from Remedy.  Remedy
never stores un-encrypted passwords in the password file, so the value that
was export must already be a hash...so the imported value from an arx file
IS a hash.


On Mon, Jan 6, 2014 at 8:56 AM, Jean-Louis Halleux <[email protected]>wrote:

> Then another question: how does ARS know that the value you submit in an
> arx file containing users and passwords is the hash, and not the value in
> clear text ?
>
> Thanks
> Jean-Louis Halleux
> [email protected]
>
>
>
> On 06 Jan 2014, at 15:52, "Grooms, Frederick W" <[email protected]>
> wrote:
>
> > Export/Import works because both systems are ARS servers.  You are not
> decrypting/encrypting the password, just copying the encrypted value from
> one server to another. It is just like having to restore a backup.
> > If you look at the export you will see it is the hashed value.
> >
> > Fred
> >
> > -----Original Message-----
> > From: Action Request System discussion list(ARSList) [mailto:
> [email protected]] On Behalf Of Jean-Louis Halleux
> > Sent: Monday, January 06, 2014 1:54 AM
> > To: [email protected]
> > Subject: Re: Decrypt AR User password
> >
> > Hello Doug,
> >
> > I have then a question if you cannot decrypt a password: how can you
> export data from the user form (including the password field), and then
> import it to another server (with the password field) ? I tried it a long
> time ago, and it used to work: users had access to the new server.
> >
> > Best regards,
> >
> > Jean-Louis Halleux
> > [email protected]
> >
> >
> >
> > On 02 Jan 2014, at 18:35, "Mueller, Doug" <[email protected]> wrote:
> >
> >> Several comments on this thread.
> >>
> >> First...
> >>
> >> There is no way to get a user's current password.  PERIOD. It is not
> possible.  We
> >> in fact do not ever store the user's password in our system.  We store
> a one-way
> >> hashed copy of the password.
> >>
> >> When validating a user, we hash the password they give us and compare
> to the hashed
> >> password we have stored.  We cannot take the hashed password and
> regenerate the
> >> original password.
> >>
> >> This is the most secure method for handling passwords in the system.
>  And, no one,
> >> not even an Administrator, can ever get the password that a user has
> defined.
> >>
> >> This is important because users generally use the same password for
> many things so
> >> if you could reverse engineer their password you could gain access to
> other things
> >> that that user has access to.  This is not possible with the strategy
> we use.
> >>
> >> Now, on to the question about wanting to verify a user.....
> >>
> >> If you are coming in from a client or from workflow and you are the
> user and you
> >> want the user to verify their own password, the
> Application-Confirm-Password
> >> operation will work.  NOTE that this is verifying the password of the
> CURRENT user
> >> session.  There is no ability for one user to use this command to
> verify the
> >> password of another user.
> >>
> >> If you are coming in from an API program, simply issue a call like
> ARVerifyUser
> >> and supply the user name and password (and authentication information
> if that is
> >> required) and validate the user.  If you want to run the program as a
> different
> >> user than the user whose password you are changing, just use different
> control
> >> records for the program and the call to the ARVerifyUser (remember to
> terminate
> >> both sessions).  This will validate the password for the user as you
> are logging
> >> them into the system.
> >>
> >> Note that if using external authentication, your password is not in the
> AR System
> >> at all so you likely should be changing it through another mechanism
> supplied by
> >> the external source.  If you are using external authentication
> directly, you can
> >> still validate a users password using the above techniques.
> >>
> >> Now, if using SSO, there is another layer going on.  The AR System
> NEVER sees the
> >> user's password at all.  That is intercepted at the SSO level.  So,
> there is no
> >> way to validate the user's password through the AR System if using SSO
> (unless of
> >> course you write a custom interface to wherever SSO is validating
> things and you
> >> pass through that custom logic.
> >>
> >>
> >> I hope this is helpful in solving your situation.
> >>
> >> Doug Mueller
> >>
> >>
> >> -----Original Message-----
> >> From: Action Request System discussion list(ARSList) [mailto:
> [email protected]] On Behalf Of Kulkarni, Adhwari
> >> Sent: Thursday, January 02, 2014 1:06 AM
> >> To: [email protected]
> >> Subject: Re: Decrypt AR User password
> >>
> >> Hi James,
> >> If you want to validate a user and change its password using API, you
> can simply create an instance of ARServerUser (Changes as per C/Java code)
> and pass the username and password that the user has entered.
> >> By just trying to do a .login(), you should be able to check if it's a
> valid user or not. Also, you can use the setPassword() method to change the
> password.
> >> Also, you should not pass the passwords from field ID 102 to the APIs.
> The password passed through field 102 is hashed and not encrypted. If you
> need to confirm the password, pass it through field ID 123.
> >>
> >> Regards,
> >> Adhwari
> >> The opinions, statements, and/or suggested courses of action expressed
> in this E-mail do not necessarily reflect those of BMC Software, Inc.
> >>
> >> -----Original Message-----
> >> From: Action Request System discussion list(ARSList) [mailto:
> [email protected]] On Behalf Of James Smith
> >> Sent: 01 January 2014 19:35
> >> To: [email protected]
> >> Subject: Re: Decrypt AR User password
> >>
> >> Thanks LJ Longwing
> >>
> >> I tried executeSpecialCommand as well but its generating same exception.
> >>
> >> I saw a new method - ExecuteProcessForActiveLink but I need to pass the
> activelink name as an argument for this method.
> >>
> >> It seems there is no way to validate users password.
> >>
> >> Happy New Year.
> >
> >
> _______________________________________________________________________________
> > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> > "Where the Answers Are, and have been for 20 years"
>
>
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> "Where the Answers Are, and have been for 20 years"
>

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to