[security-dev] SHA salted passwords

Pedro Igor Silva psilva at redhat.com
Mon Jan 7 09:14:41 EST 2013

Yeah, the class name is not good and leads to confusion.

Today you do not need any extra code to get encoded passwords. The code you pointed out is already doing that:


Behind the scenes it is using SHA-512 and a SecureRandom-1024 salt. Unfortunately, you can not change such configuration for now. 

Pedro Igor

----- Original Message -----
From: "Bruno Oliveira" <bruno at abstractj.org>
To: "Pedro Igor Silva" <psilva at redhat.com>
Cc: security-dev at lists.jboss.org
Sent: Monday, January 7, 2013 11:49:08 AM
Subject: Re: [security-dev] SHA salted passwords

Hi Pedro, maybe the class name led me to some confusion and I missed the real concept here. So, the PlainTextPassword can be used to store encoded password which algorithm will be used behind the scenes? 

Which extra code is necessary to have encoded passwords on PicketLink? Could you please provide some example?

+1 on EncodedPassword class. 

"The measure of a man is what he does with power" - Plato
Volenti Nihil Difficile

On Monday, January 7, 2013 at 10:20 AM, Pedro Igor Silva wrote:

> Actually, passwords are not stored in plain text by default. The PlainTextPassword is used to store both encoded and plain text passwords.
> Maybe we can change the API to better indicate whether you want to use encoded passwords or not. Something like this:
> Encoded : this.identityManager.updateCredential(user, new EncodedPassword(request.getPassword()));
> Plain Text: this.identityManager.updateCredential(user, new PlainTextPassword(request.getPassword()));
> Where for the EncodedPassword type you can specify the different configurations for the encoding such as supported algorithms, salt, etc.
> ----- Original Message -----
> From: "Bruno Oliveira" <bruno at abstractj.org (mailto:bruno at abstractj.org)>
> To: security-dev at lists.jboss.org (mailto:security-dev at lists.jboss.org)
> Sent: Monday, January 7, 2013 7:49:58 AM
> Subject: [security-dev] SHA salted passwords
> Good morning everyone. 
> I'm planning to upgrade AeroGear to PicketLink, looking at the examples looks like the passwords will be stored in plain text 
> (https://github.com/picketlink/TODO/blob/master/server/src/main/java/org/aerogear/todo/server/security/register/RegistrationEndpoint.java#L85).
> I was just wondering if ShaSaltedPasswordHash (https://github.com/picketlink/picketlink/blob/master/idm/impl/src/main/java/org/picketlink/idm/password/internal/SHASaltedPasswordHash.java#L13) 
> could replace PlainTextPassword in this example, because I don't want to provide examples to our users with passwords stored in plain text. 
> Is it possible? 
> -- 
> "The measure of a man is what he does with power" - Plato
> -
> @abstractj
> -
> Volenti Nihil Difficile
> _______________________________________________
> security-dev mailing list
> security-dev at lists.jboss.org (mailto:security-dev at lists.jboss.org)
> https://lists.jboss.org/mailman/listinfo/security-dev

More information about the security-dev mailing list