On 11/20/13 10:22 AM, Milo Hyson wrote:
Out of curiosity, what problems do you see hashed passwords resolving in this
case?
As others have already pointed out, I was shooting off my mouth without
understanding the question.
Oh. That's very different. Nevermind.
--
JHHL
(Now going back to a
On 2013-11-20 williamissey...@tsys.com wrote:
> Is there any way to not have the password visible in the realm for
> example for active directory realm?
You can extend the default JNDIRealm:
import org.apache.catalina.realm.JNDIRealm;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
publ
Out of curiosity, what problems do you see hashed passwords resolving in this
case?
- Milo Hyson
Chief Scientist
CyberLife Labs, Inc.
On Nov 20, 2013, at 8:23 AM, James H. H. Lampert
wrote:
> Harrumph. It occurs to me that if Tomcat stored passwords the way OS/400 does
> (i.e., as a one-way
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
James
On 11/20/13, 11:23 AM, James H. H. Lampert wrote:
> 2013/11/20 :
>>> Is there any way to not have the password visible in the realm
>>> for example for active directory realm?
> . . . On 11/20/13 12:36 AM, Konstantin Kolinko wrote:
>> https:/
On 20/11/2013 16:23, James H. H. Lampert wrote:
> 2013/11/20 :
>>> Is there any way to not have the password visible in the realm for
>>> example for active directory realm?
> . . .
> On 11/20/13 12:36 AM, Konstantin Kolinko wrote:
>> https://wiki.apache.org/tomcat/FAQ/Password
>
> Harrumph. It o
2013/11/20 :
Is there any way to not have the password visible in the realm for
example for active directory realm?
. . .
On 11/20/13 12:36 AM, Konstantin Kolinko wrote:
https://wiki.apache.org/tomcat/FAQ/Password
Harrumph. It occurs to me that if Tomcat stored passwords the way OS/400
does
2013/11/20 :
> Hi all,
>
> Is there any way to not have the password visible in the realm for example
> for active directory realm?
>
> debug="99"
> connectionURL="ldap://xxx:389";
> authentication="si
Hi all,
Is there any way to not have the password visible in the realm for example
for active directory realm?
ldap://xxx:389";
authentication="simple"
referrals="follow"
connectionName="cn= CN=xx