syncope-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
Subject [1/6] syncope git commit: Reworking 'Set admin credentials'
Date Thu, 12 Apr 2018 10:42:04 GMT
Repository: syncope
Updated Branches:
  refs/heads/2_0_X 0189a50fd -> 73fab3dee
  refs/heads/master 321102374 -> e5860a76a

Reworking 'Set admin credentials'


Branch: refs/heads/2_0_X
Commit: b7aacd8d0538da9dde6c8dc940b423a1d52ac560
Parents: 0189a50
Author: Francesco Chicchiriccò <>
Authored: Thu Apr 12 11:49:28 2018 +0200
Committer: Francesco Chicchiriccò <>
Committed: Thu Apr 12 11:49:28 2018 +0200

 .../setadmincredentials.adoc                    | 23 +++++++++++++-------
 1 file changed, 15 insertions(+), 8 deletions(-)
diff --git a/src/main/asciidoc/reference-guide/workingwithapachesyncope/systemadministration/setadmincredentials.adoc
index 4292a06..10e24f0 100644
--- a/src/main/asciidoc/reference-guide/workingwithapachesyncope/systemadministration/setadmincredentials.adoc
+++ b/src/main/asciidoc/reference-guide/workingwithapachesyncope/systemadministration/setadmincredentials.adoc
@@ -21,22 +21,28 @@
 The procedure below affects only the `Master` <<domains,domain>>; for other domains
check <<domains-management,above>>.
-The default password for the `admin` user is `password`.
 The credentials are defined in the `` file; text encoding must be set
to UTF-8:
-* `adminUser` - administrator username
-* `adminPassword` - SHA1 hash evaluation of cleartext password (represented as a sequence
of 40 hexadecimal digits)
-* `adminPasswordAlgorithm` - algorithm to be used for hash evaluation (default value: SHA1)
+* `adminUser` - administrator username (default `admin`)
+* `adminPassword` - administrator password (default `password`)'s hashed value
+* `adminPasswordAlgorithm` - algorithm to be used for hash evaluation (default `SHA1`, others
+`SHA256`, `SHA512`, `SMD5`, `SSHA1`, `SSHA256`, `SSHA512` and `BCRYPT` are supported)
-For GNU / Linux and Mac OS X, the SHA1 password can be obtained via the `sha1sum` command-line
tool of
-[GNU Core Utilities^]:
+The hashed password value can be obtained, depending on the actual algorithm, via various
+As an example, for `SHA1` and GNU / Linux and Mac OS X, the `sha1sum` command-line tool of
+[GNU Core Utilities^] can be used as follows:
 echo -n "new_password" | sha1sum
-For MS Windows, some options are available:
+Please beware that any shell special character must be properly escaped for the command above
to produce the expected
+hashed value.
+Again about `SHA1`, for MS Windows some options are available:
 *[MS File Checksum Integrity Verifier^] +
 install, save your password to a file (e.g. `password.txt` without EOL) and issue at command
line: +
@@ -47,3 +53,4 @@ fciv.exe -sha1 password.txt
 *[GnuWin32^] port of GNU utilities for MS Windows
 *[Cygwin^] Unix-like environment and command-line interface for Microsoft
Windows (featuring[GNU Core Utilities^])

View raw message