> When validating a user, we hash the password they give us and compare to the hashed > password we have stored. We cannot take the hashed password and regenerate the > original password.
Hashes don’t change because you copy it. -John On Mon, Jan 6, 2014 at 1:54 AM, Jean-Louis Halleux <[email protected]>wrote: > Hello Doug, > > I have then a question if you cannot decrypt a password: how can you > export data from the user form (including the password field), and then > import it to another server (with the password field) ? I tried it a long > time ago, and it used to work: users had access to the new server. > > Best regards, > > Jean-Louis Halleux > [email protected] > > > > On 02 Jan 2014, at 18:35, "Mueller, Doug" <[email protected]> wrote: > > > Several comments on this thread. > > > > First... > > > > There is no way to get a user's current password. PERIOD. It is not > possible. We > > in fact do not ever store the user's password in our system. We store a > one-way > > hashed copy of the password. > > > > When validating a user, we hash the password they give us and compare to > the hashed > > password we have stored. We cannot take the hashed password and > regenerate the > > original password. > > > > This is the most secure method for handling passwords in the system. > And, no one, > > not even an Administrator, can ever get the password that a user has > defined. > > > > This is important because users generally use the same password for many > things so > > if you could reverse engineer their password you could gain access to > other things > > that that user has access to. This is not possible with the strategy we > use. > > > > Now, on to the question about wanting to verify a user..... > > > > If you are coming in from a client or from workflow and you are the user > and you > > want the user to verify their own password, the > Application-Confirm-Password > > operation will work. NOTE that this is verifying the password of the > CURRENT user > > session. There is no ability for one user to use this command to verify > the > > password of another user. > > > > If you are coming in from an API program, simply issue a call like > ARVerifyUser > > and supply the user name and password (and authentication information if > that is > > required) and validate the user. If you want to run the program as a > different > > user than the user whose password you are changing, just use different > control > > records for the program and the call to the ARVerifyUser (remember to > terminate > > both sessions). This will validate the password for the user as you are > logging > > them into the system. > > > > Note that if using external authentication, your password is not in the > AR System > > at all so you likely should be changing it through another mechanism > supplied by > > the external source. If you are using external authentication directly, > you can > > still validate a users password using the above techniques. > > > > Now, if using SSO, there is another layer going on. The AR System NEVER > sees the > > user's password at all. That is intercepted at the SSO level. So, > there is no > > way to validate the user's password through the AR System if using SSO > (unless of > > course you write a custom interface to wherever SSO is validating things > and you > > pass through that custom logic. > > > > > > I hope this is helpful in solving your situation. > > > > Doug Mueller > > > > > > -----Original Message----- > > From: Action Request System discussion list(ARSList) [mailto: > [email protected]] On Behalf Of Kulkarni, Adhwari > > Sent: Thursday, January 02, 2014 1:06 AM > > To: [email protected] > > Subject: Re: Decrypt AR User password > > > > Hi James, > > If you want to validate a user and change its password using API, you > can simply create an instance of ARServerUser (Changes as per C/Java code) > and pass the username and password that the user has entered. > > By just trying to do a .login(), you should be able to check if it’s a > valid user or not. Also, you can use the setPassword() method to change the > password. > > Also, you should not pass the passwords from field ID 102 to the APIs. > The password passed through field 102 is hashed and not encrypted. If you > need to confirm the password, pass it through field ID 123. > > > > Regards, > > Adhwari > > The opinions, statements, and/or suggested courses of action expressed > in this E-mail do not necessarily reflect those of BMC Software, Inc. > > > > -----Original Message----- > > From: Action Request System discussion list(ARSList) [mailto: > [email protected]] On Behalf Of James Smith > > Sent: 01 January 2014 19:35 > > To: [email protected] > > Subject: Re: Decrypt AR User password > > > > Thanks LJ Longwing > > > > I tried executeSpecialCommand as well but its generating same exception. > > > > I saw a new method - ExecuteProcessForActiveLink but I need to pass the > activelink name as an argument for this method. > > > > It seems there is no way to validate users password. > > > > Happy New Year. > > > > > _______________________________________________________________________________ > > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the > Answers Are, and have been for 20 years" > > > > > _______________________________________________________________________________ > > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the > Answers Are, and have been for 20 years" > > > > > _______________________________________________________________________________ > > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org > > "Where the Answers Are, and have been for 20 years" > > > _______________________________________________________________________________ > UNSUBSCRIBE or access ARSlist Archives at www.arslist.org > "Where the Answers Are, and have been for 20 years" > -- *John Sundberg* Kinetic Data, Inc. "Your Business. Your Process." Save the date! *KEG14* February 24-25, 2014 *For more information, click here * - KEG<http://www.kineticdata.com/Events/KEG.html> 651-556-0930 I [email protected] www.kineticdata.com I community.kineticdata.com _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers Are, and have been for 20 years"

