User guide
To ensure better security of these passwords, the server configuration file may contain the
server control password in an obfuscated form.
Example 1
For example, in an XML-formatted server configuration file:
<server
name="RdbThinSrv1707"
type="RdbThinSrvMP"
url="//localhost:1707/"
srv.execStartup="mystartup"
controlUser="jdbc_user"
controlPass="0x811B15F866179583EB3C96751585B843"
/>
You can obtain an obfuscated password by using the Digest statement in the Rdb Thin Server
Controller.
Example 2
rdbthincontrol> digest thisismypassword
digest : 0x31435008693CE6976F45DEDC5532E2C1
The value can then be used in the configuration file where you would have normally
provided a plain text control password.
This value must be copied exactly as returned by the digest statement.
The plain text password conversion to its obfuscated form is case-sensitive, so the same word
or phrase but with different character casing will produce a different digested form.
Passwords are case sensitive so you must ensure that the value of the password used in plain
text and in it digested form match exactly character by character including case.
This is particularly important if a password is used on the DCL command line. If double
quotation characters are not used to surround the plain text password DCL may, depending
on your environment, force the value to all lower case or all uppercase which may differ
from the original.
Example 3
For example when -digest is used in command mode make sure the value is enclosed in
double quotations:
$ java -jar rdbthincontrol.jar -digest "MySecretPassword"
digest : 0x7315A012ECAD1059A3634F8BE1347846
$ java -jar rdbthincontrol.jar -digest MySecretPassword
digest : 0x4CAB2A2DB6A3C31B01D804DEF28276E6
Note:
125