Hi Team,

Currently the public key login module works perfectly by default, but if we 
change property "encryption.enabled=true" from the file 
"etc/org.apache.karaf.jaas.cfg" I get my public key stored in 
etc/keys.properties encrypted like
ffang = {CRYPT}a0b350706bd5a1fadff906d0cc28e681{CRYPT}, 
and this break the key login.

Not like the password stored in users.properties which is used by 
PropertiesLoginModule, the public key is intended to be distributed and read by 
everyone(though it's not very readable),  I don't think we really need encrypt 
a public key. I suggest let PublickeyLoginModule ignore the encryption.enabled 
flag, don't encrypt a public key.

If there's no objection I will create a jira ticket and change this accordingly.

Best Regards
-------------
Freeman(Yue) Fang

Red Hat, Inc. 
FuseSource is now part of Red Hat



Reply via email to