Solved

isql access using an encrypted password

Posted on 2004-08-16
3
1,842 Views
Last Modified: 2011-09-20
Hi,

Is there any way to use isql with an encrypted password ?

so with the command "isql -Uuser -Ppassword" been executed from a shell script, "password" would be encrypted - is this possible ?
0
Comment
Question by:HowardNZ2003
3 Comments
 
LVL 14

Assisted Solution

by:Jan_Franek
Jan_Franek earned 100 total points
ID: 11810458
According to isql reference on http://sybooks.sybase.com/onlinebooks/group-as/asg1250e/util/@ebt-link;pt=1092;lang=cs?target=%25N%15_15937_START_RESTART_N%25
you should use -X command line option:

-X
initiates the login connection to the server with client-side password encryption. isql (the client) specifies to the server that password encryption is desired. The server sends back an encryption key, which isql uses to encrypt your password, and the server uses the key to authenticate your password when it arrives.
0
 
LVL 6

Accepted Solution

by:
ChrisKing earned 150 total points
ID: 11810733
are you trying to encrypt the tunnel of communincations from the client to the server

order the password itself (from the OS) ?

if the latter, then try
isql -Sserver -Uuser -i script.sql < ~/.password

the ~/.password file contains the password for "user" and has been secured with: chmod 700 ~/.password
0
 

Author Comment

by:HowardNZ2003
ID: 11819205
Thanks,

it was actually how to hide the password at the OS level but all input was valuable.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can I use dynamic SQL in a function for a COLUMN NAME 6 640
Best Fit Equation for a Line 5 831
Sybase 15.7 database backup 8 606
sybase output only middle rows 4 7
Note: This is the third blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   We’ve been talki…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now