Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Should we require user authentication to invoke managed operations from the command line?
    1. These operations do not go through the client, so we would have to a) create special JMX hook into the server based authentication scheme or b) create a separate authentication scheme for managed operations.
  2. How should we hash passwords?
    1. Do we need a master serverKey hash? How is this generated and where is it stored?
      1. No. This doesn't add any additional security since the master password would be stored in prefs file and therefore accessible to someone with access to the server. We could encrypt the master password, but then we'd need to rely on the MAC Address which can change and we'd have to rehash every password if the master key ever changed. All of this adds a complexity overhead that isn't a good tradeoff since we don't actually end up with any additional security. 
    2. Do we need salt per user?
      1. Yes. Choose a random salt per user and store that alongside the password.
    3. Which hash algorithm should we use?
      1. SHA-512
  3. Do we need to associate a fingerprint (ip address, etc) with each AccessToken?
    1. How would we get this info server side? Does the client need to pass it along when logging in?

...