http://qs321.pair.com?node_id=928636


in reply to Masking Windows Passwords

What you’s really like to do is to have access to the COM interface controlled such that no one or no application can gain access to it at all without being authorized through the existing Windows (OpenDirectory / LDAP / etc.) authentication mechanisms.

The request itself might be accompanied by some random identification-token which is simply a calling-card.   Some COM interfaces oblige you to send a hash of a userID/password combination (structured however the vendor requires) across the wire:   the receiving computer knows what the correct hash-value should be, but no one who’s looking at the transmission has any idea.

Microsoft has some trustworthy interface abilities already built-in to their IIS server which do give you a way to find out about the user without having to ask him, and these can also be applied to the case of remote interfaces if the remote in question is intra-net.

Replies are listed 'Best First'.
Re^2: Masking Windows Passwords
by nimdokk (Vicar) on Sep 29, 2011 at 18:21 UTC
    As mentioned, I have but a flea in the vendor's ear to address this. I've also found that via the COM objects they have available, we cannot authenticate with a domain account (even though we can use the same domain account via the GUI) even with hardcoded user name/password. This is not a Perl problem, but missing functionality (especially if they recommend not exposing passwords when using their COM API.