[
https://issues.apache.org/jira/browse/SYNCOPE-505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14037181#comment-14037181
]
Colm O hEigeartaigh commented on SYNCOPE-505:
---------------------------------------------
{quote}
BTW, writing out the password only if SyncopeUser#getCipherAlgorithm matches
the configured value for the DB Connector hash algorithm (e.g. the same logic
of SYNCOPE-313) seems correct to me.
{quote}
A quick query on this - in DBPasswordSyncActions I can get access to the
Connector via
AbstractSyncopeResultHandler.getConnector().getActiveConnInstance(). How can I
do the same in DBPasswordPropagationActions?
Colm.
> Support propagating non-cleartext passwords to external resources
> -----------------------------------------------------------------
>
> Key: SYNCOPE-505
> URL: https://issues.apache.org/jira/browse/SYNCOPE-505
> Project: Syncope
> Issue Type: Improvement
> Components: core
> Reporter: Francesco Chicchiriccò
> Assignee: Colm O hEigeartaigh
> Fix For: 1.2.0
>
>
> Similarly to SYNCOPE-313 during synchronization, it seems feasible to provide
> some Propagation Actions classes (say {{DBPasswordPropagationActions}} and
> {{LDAPPasswordPropagationActions}} that will propagate non-cleartext password
> values to external resources.
> This might require some changes in the related connector bundles.
--
This message was sent by Atlassian JIRA
(v6.2#6252)