[ https://issues.apache.org/jira/browse/SYNCOPE-505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14033918#comment-14033918 ]
Colm O hEigeartaigh commented on SYNCOPE-505: --------------------------------------------- {quote} We should find a way then to instruct the connector that the specific password value we are passing is already hashed: unfortunately, connector configuration properties are only evaluated when creating a connector instance, so they cannot be changed on-the-fly. {quote} Could we have a new (boolean) attribute (__HASHED_PASSWORD__) or something? Alternatively, we could use a predefined prefix/suffix on the _PASSWORD_. Any preferences? {quote} BTW, writing out the password only if SyncopeUser#getCipherAlgorithm matches the configured value for the DB Connector hash algorithm (e.g. the same logic of SYNCOPE-313) seems correct to me. {quote} Ok, sounds good. One query would be whether we should also follow this logic if the DB Connector has a CLEARTEXT value? I think we should, but want to verify it. Colm. > Support propagating non-cleartext passwords to external resources > ----------------------------------------------------------------- > > Key: SYNCOPE-505 > URL: https://issues.apache.org/jira/browse/SYNCOPE-505 > Project: Syncope > Issue Type: Improvement > Components: core > Reporter: Francesco Chicchiriccò > Assignee: Colm O hEigeartaigh > Fix For: 1.2.0 > > > Similarly to SYNCOPE-313 during synchronization, it seems feasible to provide > some Propagation Actions classes (say {{DBPasswordPropagationActions}} and > {{LDAPPasswordPropagationActions}} that will propagate non-cleartext password > values to external resources. > This might require some changes in the related connector bundles. -- This message was sent by Atlassian JIRA (v6.2#6252)