Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Evaluate and fix issue known to OpenAM as #201801-02 #11

Closed
siepkes opened this issue Mar 11, 2018 · 3 comments
Closed

Evaluate and fix issue known to OpenAM as #201801-02 #11

siepkes opened this issue Mar 11, 2018 · 3 comments

Comments

@siepkes
Copy link
Member

siepkes commented Mar 11, 2018

Evaluate and fix issue known to OpenAM as #201801-02

Since we share a common heritage with OpenAM the issue described here as "Issue #201801-02: Configuration password stored in plain text" probably affects wren:AM too.

We need to evaluate if and how this issue affects wren:AM and fix it.

The issue in the referenced document describes the export of server settings contain some configuration passwords in plain text.

The document indicates there is no workaround.

@pavelhoral
Copy link
Member

pavelhoral commented Sep 7, 2018

You can get password values via get-sub-cfg command in 13.0.0:

ssoadm get-sub-cfg -u amadmin -f pwd.txt -e / -s iPlanetAMAuthLDAPService -g MyLDAP

iplanet-am-auth-ldap-auth-level=0
iplanet-am-auth-ldap-search-filter=(objectclass=inetOrgPerson)
iplanet-am-auth-ldap-search-scope=SUBTREE
iplanet-am-auth-ldap-return-user-dn=true
iplanet-am-auth-ldap-bind-passwd=thisissecret
iplanet-am-ldap-user-creation-attr-list=
...

Not sure if the issue is fixed in the current master or not...

@pavelhoral
Copy link
Member

pavelhoral commented Sep 7, 2018

I guess it is not fixed if you compare how GetSubConfiguration prints property values compared to GetAuthInstance.

@karelmaxa
Copy link
Member

The issue was fixed in #137.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants