You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Jiajia Li (JIRA)" <ji...@apache.org> on 2015/08/04 07:51:04 UTC
[jira] [Updated] (DIRKRB-279) Having master key to encrypt
principal keys
[ https://issues.apache.org/jira/browse/DIRKRB-279?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Jiajia Li updated DIRKRB-279:
-----------------------------
Fix Version/s: (was: 1.0.0-RC1)
1.0.0-RC2
> Having master key to encrypt principal keys
> -------------------------------------------
>
> Key: DIRKRB-279
> URL: https://issues.apache.org/jira/browse/DIRKRB-279
> Project: Directory Kerberos
> Issue Type: Sub-task
> Reporter: Kai Zheng
> Assignee: Xu Yaning
> Fix For: 1.0.0-RC2
>
>
> In KDC back end, principal keys should be encrypted and then stored. A strong master key could be generated and used for the purpose.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)