000035206 - How to Hash Values for List ID Entries in Policy Management Application in RSA Adaptive Authentication (OnPrem) 7.X

Document created by RSA Customer Support Employee on May 31, 2017Last modified by RSA Customer Support Employee on Jun 1, 2017
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000035206
Applies ToRSA Product Set: Adaptive Authentication (OnPrem)
RSA Product/Service Type: Adaptive Authentication (OnPrem)
RSA Version/Condition: 7.X
IssueThe user asks for a way to hash user ids for the RSA AA Policy Management User ID Lists. They had an internal tool in the previous version and are looking for the same functionality in the current 7.X version.
TasksProvide web URLs or tools to hash the values.
ResolutionThere is not a hashing option available in AAOP v7.X, and probably the URL on the case information was a script developed by the customer.  It is possible to create a new script, but it should be developed again or adapted from the existing script by an internal development team.
 
The other option is to use an existing tool for hashing the user id values with the SHA-2 algorithm.  The administration screen indicates that the hashing of the user id values should be manually done:
User-added image
 
Any available tool that can hash the values using SHA-2 algorithm, like http://passwordsgenerator.net/sha256-hash-generator, can be used.
Please see below an example of hashing a User ID value:
 User-added image 
 
The hashed user id value can be added to the policy management list:
 
User-added image
 
NotesFor Customers who cannot access an external website for security or other reasons can make use of one of the below methods.
These links contain useful information on how to implement the SHA-2 hashing in java: 
  1. This example shows how to implement a class with an static method that does the hashing and can be reused inside a JSP file with a UI.  It can even be tested online, or implemented in your own environment.
    http://www.mytecbits.com/tools/cryptography/sha2generator
  2. This one demonstrate a class that executes in java, but the methods and functionality can be easily migrated to a JSP file:
    https://www.quickprogrammingtips.com/java/how-to-generate-sha256-hash-in-java.html
  3. This is a pure java example that can be executed in a console, but like the 2nd example it can be ported to JSP by extracting the hashing functionality:
    https://www.mkyong.com/java/java-sha-hashing-example/

Attachments

    Outcomes