Sponsored Content
Full Discussion: Password encryption in RHEL
Top Forums Shell Programming and Scripting Password encryption in RHEL Post 302965972 by Skrynesaver on Friday 5th of February 2016 09:54:29 AM
Old 02-05-2016
you could put the required details in an envrypted file and decrpt it in the script (gpg would be useful here), however the user who can read the script is going to be able to follow the steps to decrypt.

Would it be possible to grant read only permissions, (or whatever permission is required), on the schema to an Oracle user and use that user in the script?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Zipping with password or encryption

We currently take files (via FTP) off of a mainframe and save them as a text file on our server. This is done via a script. The next thing that is done to that text file is it gets zipped (using ZIP). This all works fine, but it doesn't appear that ZIP (the free version) has any way to password... (2 Replies)
Discussion started by: dsimpg1
2 Replies

2. UNIX for Dummies Questions & Answers

Password safe encryption strength

I'm not sure if this is the right forum for this or not but we use a program called "Password Safe" to store the many root passwords we have for our Unix system. Now we are being called out by our security team to prove that this is a safe program to use. So far I have been able to determine... (1 Reply)
Discussion started by: keelba
1 Replies

3. AIX

File password protection/encryption

Can it be done? Ive read in a few places that the crypt program no longer exists on AIX...if its do-able please tell me how. (2 Replies)
Discussion started by: rdudejr
2 Replies

4. Programming

User name and password encryption

Hi, I have usernames and passwords (to connect oracle DB) buried in so many shell scripts. We want to externalize all usernames and passwords from those shell scripts and encrypt them and keep them in a file. So far I found two choices, 1) Use some encryption algorithms like (RC5/MD5) to... (5 Replies)
Discussion started by: satguyz
5 Replies

5. Solaris

Password Encryption (SunOS 5.8)

Hi all, I have a server in the office that we connect to via telnet. Can anyone explain please how i can encrypt the password so it cannot be picked up in plain text by sniffing software like WireShark, etc.? I'm not very experienced in Unix, so any ideas or even links would be great. ... (5 Replies)
Discussion started by: de049
5 Replies

6. Solaris

Password encryption in script

:DHi i am preparing a script to connect to oracle from solaris.... now i want that no one is able to see the password in the script. is it possible...please help Regards Ankurk (3 Replies)
Discussion started by: ankurk
3 Replies

7. UNIX for Dummies Questions & Answers

Password encryption

In unix, i know the password encrypt by using salt But how does it work? And how windows protect its password? Thank you for helping in advance (5 Replies)
Discussion started by: cryogen
5 Replies

8. Shell Programming and Scripting

Password encryption...

Hi, I have a Java app that looks for some parameters in a .properties file such as username and password. However I don't want to leave the password in a text file and I can't modify the app... Does anyone have some idea about how to encrypt/hide/etc the password so it's not freely accessible... (1 Reply)
Discussion started by: Tr0cken
1 Replies

9. Red Hat

How the Password Encryption Works in RHEL 6.4?

How the Password Encryption Works in RHEL 6.4 , And Which Encrytion is used in etc/shadow File , SHA256 , SHA512 or any other ? :confused: (3 Replies)
Discussion started by: babinlonston
3 Replies

10. UNIX for Dummies Questions & Answers

Password encryption

if I change my password on two different servers, using the same string but the encrypted password in /etc/passwd look different. If I copy an entry from one /etc/password to the other server. I can still log in to both servers using the same password. Only now both /etc/passwd entries are... (2 Replies)
Discussion started by: C0ppert0p
2 Replies
0STORE-SECURE-ADD(1)													      0STORE-SECURE-ADD(1)

NAME
0store-secure-add -- add an implementation to the system cache SYNOPSIS
0store-secure-add DIGEST DESCRIPTION
This command imports the current directory into the system-wide shared Zero Install cache, as /var/cache/0install.net/implementa- tions/DIGEST. This allows a program downloaded by one user to be shared with other users. The current directory must contain a file called '.manifest' listing all the files to be added (in the format required by DIGEST), and this file must have the given digest. If not, the import is refused. Therefore, it is only possible to add a directory to the cache if its name matches its contents. It is intended that it be safe to grant untrusted users permission to call this command with elevated privileges. To set this up, see below. SETTING UP SHARING
To enable sharing, the system administrator should follow these steps: Create a new system user to own the cache: adduser --system zeroinst Create the shared directory, owned by this new user: mkdir /var/cache/0install.net chown zeroinst /var/cache/0install.net Use visudo(8) to add these lines to /etc/sudoers: Defaults>zeroinst env_reset,always_set_home ALL ALL=(zeroinst) NOPASSWD: /usr/bin/0store-secure-add Create a script called 0store-secure-add-helper in PATH to call it. This script must be executable and contain these two lines: #!/bin/sh exec sudo -S -u zeroinst /usr/bin/0store-secure-add "$@" < /dev/null The other Zero Install programs will call this helper script automatically. FILES
/var/cache/0install.net/implementations System-wide Zero Install cache. LICENSE
Copyright (C) 2009 Thomas Leonard. You may redistribute copies of this program under the terms of the GNU Lesser General Public License. BUGS
This program is EXPERIMENTAL. It has not been audited. Do not use it yet in security-critial environments. The env_reset line in sudoers may not be required. sudo(1) seems to do it automatically. If sudo let us check whether we could call a command then we could switch to using it automatically, instead of needing to add the helper script. Currently, sudo delays for one second and writes to auth.log if we try to use this system when it hasn't been set up. Please report bugs to the developer mailing list: http://0install.net/support.html AUTHOR
Zero Install was created by Thomas Leonard. SEE ALSO
0store(1) The Zero Install web-site: http://0install.net Thomas Leonard 2010 0STORE-SECURE-ADD(1)
All times are GMT -4. The time now is 04:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy