We are working on an account management for our iRODS setup that is
external to iRODS itself. In order to store user's passwords in this
system and allow them to change it, we need to know what hash type is
being used by iRODS to create the password hash stored in the ICAT.
Can anyone advise on this?
cheers
Florian
==========================================================
Florian Goessmann
----------------------------------------------------------
Manager, ARCS Data Services
"Providing collaboration services and tools for the Australian
research community"
PO Box 201 CARLTON South
Victoria, 3053
Australia
Phone: +61 8 6436 8835
Mobile: +61 4 3517 5033
Fax: +61 8 6436 8555
Email: florian....@arcs.org.au
Jabber: florian....@arcs.org.au
Calendar: http://hdl.handle.net/102.100.100/19
www: http://www.arcs.org.au
----------------------------------------------------------
iVEC, 'The hub of advanced computing in Western Australia'
26 Dick Perry Avenue, Technology Park
Kensington WA 6151
Australia
Email: flo...@ivec.org
Jabber: flo...@jabber.ivec.org
www: http://www.ivec.org
>
> 'iadmin dspass' will descramble a password for the admin via a call to
> obfDecodeByKey
Good theory Wayne. But I can't make it work:
--
# Set the password for user graham.jenkins2:
iadmin moduser graham.jenkins2 password DoesNotWork
# Print the scrambled password:
echo "select user_id, user_name from r_user_main;" | psql -d ICAT | grep graham.jenkins2
3388569 | graham.jenkins2
echo "select user_id, rcat_password from r_user_password;" | psql -d ICAT | grep 3388569
3388569 | .E_Jn&(e)(ma,b
# Unscramble it:
iadmin dspass ".E_Jn&(e)(ma,b" 123
Unscrambled form is:"C_1%8ORgymOzq
--
Graham Jenkins
Australian Research Collaboration Service
Victorian Partnership for Advanced Computing
(+613) 9925-4862