[security-dev] SHA salted passwords

Pedro Igor Silva psilva at redhat.com
Mon Jan 7 07:20:59 EST 2013

Actually, passwords are not stored in plain text by default. The PlainTextPassword is used to store both encoded and plain text passwords.

Maybe we can change the API to better indicate whether you want to use encoded passwords or not. Something like this:

Encoded : this.identityManager.updateCredential(user, new EncodedPassword(request.getPassword()));

Plain Text: this.identityManager.updateCredential(user, new PlainTextPassword(request.getPassword()));

Where for the EncodedPassword type you can specify the different configurations for the encoding such as supported algorithms, salt, etc.

----- Original Message -----
From: "Bruno Oliveira" <bruno at abstractj.org>
To: security-dev at lists.jboss.org
Sent: Monday, January 7, 2013 7:49:58 AM
Subject: [security-dev] SHA salted passwords

Good morning everyone. 

I'm planning to upgrade AeroGear to PicketLink, looking at the examples looks like the passwords will be stored in plain text 

I was just wondering if ShaSaltedPasswordHash (https://github.com/picketlink/picketlink/blob/master/idm/impl/src/main/java/org/picketlink/idm/password/internal/SHASaltedPasswordHash.java#L13) 
could replace PlainTextPassword in this example, because I don't want to provide examples to our users with passwords stored in plain text. 

Is it possible? 

"The measure of a man is what he does with power" - Plato
Volenti Nihil Difficile

security-dev mailing list
security-dev at lists.jboss.org

More information about the security-dev mailing list