The DXpassword tool lets you hash a password. You can then add the hashed password to a knowledge file.
This command has the following format:
dxpassword [-v] [-P algorithm] password
Hashes the password, where algorithm is one of the following:
(Default) Hashes the password using the SHA-1 algorithm
Hashes the password using the Salted SHA-1 algorithm. This algorithm produces a different hash even for the same clear text password, which is more secure.
Hashes the password using the SHA-512 algorithm
Hashes the password using the Salted SHA-512 algorithm
Hashes the password using the Message Digest algorithm.
Hashes the password using the Salted Message Digest algorithm
Hashes the password using the UNIX crypt method.
Hashes the password using a reversible obfuscation algorithm. Use this option to hash a password before including it in a knowledge file in the dsa-password or ldap-dsa-password configuration items. This protects the password from users with access to the computer running the DSA.
Runs in verbose mode.
Specifies the password to be hashed.
Example: Hashing a Password Using MD5
The following command hashes the password qwer123 using the MD5 algorithm:
dxpassword -P MD5 qwer123
The output from this command is:
{MD5}VT6DymlpOzPvc5WMBLejFQ==
Example: Verbose Output from the DXpassword Tool
The following command hashes the password qwer123 using the SHA-1 algorithm, which is the default:
dxpassword -v qwer123
The output from this command is:
'qwer123' encoded is: {SHA}ACldbAY9DZzMbi3DJJGYppRIayY=
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |