mirror of
https://github.com/keycloak/keycloak.git
synced 2026-05-07 07:30:17 -05:00
Added a link to the ApacheDS doc for server side password hashing
Closes #39136 Signed-off-by: Emmanuel Lécharny <elecharny@gmail.com>
This commit is contained in:
committed by
GitHub
parent
8885a6276c
commit
a48469896e
@@ -159,7 +159,7 @@ User Attribute mappers that map basic {project_name} user attributes, such as us
|
||||
|
||||
When {project_name} updates a password, {project_name} sends the password in plain-text format. This action is different from updating the password in the built-in {project_name} database, where {project_name} hashes and salts the password before sending it to the database. For LDAP, {project_name} relies on the LDAP server to hash and salt the password.
|
||||
|
||||
By default, LDAP servers such as MSAD, RHDS, or FreeIPA hash and salt passwords. Other LDAP servers such as OpenLDAP store the passwords in plain-text unless you use the _LDAPv3 Password Modify Extended Operation_ as described in https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3[RFC3062]. Enable the LDAPv3 Password Modify Extended Operation in the LDAP configuration page. See the documentation of your LDAP server for more details. Configure ApacheDS to hash and salt passwords automatically by enabling the passwordHashing interceptor.
|
||||
By default, LDAP servers such as MSAD, RHDS, or FreeIPA hash and salt passwords. Other LDAP servers such as OpenLDAP store the passwords in plain-text unless you use the _LDAPv3 Password Modify Extended Operation_ as described in https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3[RFC3062]. Enable the LDAPv3 Password Modify Extended Operation in the LDAP configuration page. See the documentation of your LDAP server for more details. https://directory.apache.org/apacheds/advanced-ug/4.1.1.4-ss-password-hash.html[Configure ApacheDS to hash and salt passwords automatically] by enabling the passwordHashing interceptor.
|
||||
|
||||
WARNING: Always verify that user passwords are properly hashed and not stored as plaintext by inspecting a changed
|
||||
directory entry using `ldapsearch` and base64 decode the `userPassword` attribute value.
|
||||
|
||||
Reference in New Issue
Block a user