On 2014-04-23 15:44, Ed Leafe wrote:
You would generate a new salt when they update their password, and
save that salt with the user. If they submit their old password, the
new salt will result in an invalid hash.


Thanks Kevin and Ed for following up on this. I just took one of those 5-hour energy shots so if I ramble, that's why. lol

So we store the password in a DIFFERENT table from the Users table, and in the Users table we stored the Salt value (set via SYS(2015) to make it random), which is encrypted with your master encryption key of course before being stored in that field in the User table. SO...we then look up the ClientID + UserID in the User table, then grab the Salt key value, THEN we search the Passwords table for the SALTED and HASHED key of the 3 part combination: ClientID + UserID + Password. Thus, when the user changes his password, the new random Salt key stored in the Users table for his record (cClientID and cUserID fields) makes sure that his old passwords are invalid. Plus, this adds to the security by obesity approach Kevin mentioned.

Right?



_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to