Solved

Jboss connection string encryption

Posted on 2010-11-10
4
1,240 Views
Last Modified: 2013-12-02
HI

I am following http://learnertobeginner.blogspot.com/2010/07/how-to-use-encrypted-password-in-jboss.html to encrypt a connection string to the database.

All documentations I have seen claims that the same SecureIdentityLoginModule supports also decryption but no sample is provided nor the class documentation in http://docs.jboss.org/jbossas/javadoc/3.2.7/connector/org/jboss/resource/security/SecureIdentityLoginModule.html describes how to do that.

I need to know how to decrypt the password , please help.

Thanks


0
Comment
Question by:elimesika
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 19

Expert Comment

by:ramazanyich
ID: 34107669
what do you want to achieve ?
if you check code of securityIdentityLoginModule - it has private method decode() to decode encrypted password which you provided in your login xml file and to use decoded password to perform login to jboss.
0
 
LVL 19

Author Comment

by:elimesika
ID: 34110978
HI

I have a tool that enables the user to change his db user/password , so , when I am opening this tool, I need to fill the password field with the decrypted password because this tool connects to the database and may change / store other application configuration.
0
 
LVL 19

Accepted Solution

by:
ramazanyich earned 500 total points
ID: 34124385
I'm afraid that in that case you will need to decrypt it yourself (check the source code of securityIdentityLoginModule and you can copy decode method from there)
0
 
LVL 19

Author Closing Comment

by:elimesika
ID: 34134195
Thanks for your time.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about my first experience with programming Arduino.
What do responsible coders do? They don't take detrimental shortcuts. They do take reasonable security precautions, create important automation, implement sufficient logging, fix things they break, and care about users.
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.
Introduction to Processes
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question