The DXpassword tool lets you hash a password. You can then add the hashed password to a knowledge file.
This command has the following format:
dxpassword [-v] [-P algorithm] password
Hashes the password, where algorithm is one of the following:
(Default) Hashes the password using the SHA-1 algorithm
Hashes the password using the Message Digest algorithm
Hashes the password using the Salted SHA-1 algorithm. This algorithm produces a different hash even for the same clear text password, which is more secure.
Hashes the password using the UNIX crypt method.
Hashes the password using a reversible obfuscation algorithm. This shields dsa-password and ldap-dsa-password configuration items from users with access to the dxserver host.
Runs in verbose mode.
Specifies the password to be hashed.
Example: Hashing a Password Using MD5
The following command hashes the password qwer123 using the MD5 algorithm:
dxpassword -P MD5 qwer123
The output from this command is:
{MD5}VT6DymlpOzPvc5WMBLejFQ==
Example: Verbose Output from the DXpassword Tool
The following command hashes the password qwer123 using the SHA-1 algorithm, which is the default:
dxpassword -v qwer123
The output from this command is:
'qwer123' encoded is: {SHA}ACldbAY9DZzMbi3DJJGYppRIayY=
| Copyright © 2009 CA. All rights reserved. | Email CA about this topic |