Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2017, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
    View PDF

Running the Password Hashing Utility

This topic describes how to hash user passwords and generate salt values using the hashpwd.exe utility. The hashpwd.exe utility is located in SIEBSRVR_ROOT\bin (Siebel Server installation directory) or SIEBEL_CLIENT_ROOT\bin (Siebel Mobile or Developer Web Client installation directory).

When you have hashed user passwords using hashpwd.exe, store the hashed passwords and salt values in the directory or database, as appropriate. For information on storing hashed passwords, see "Guidelines for Password Hashing". For information about the password hashing options mentioned in the procedures in this topic, see "About Password Hashing".

You can hash passwords using the SHA-1 hashing algorithm. The following procedure describes how to hash passwords using the SHA-1 algorithm.


Note:

The SHA-1 hashing algorithm is the only algorithm supported for password hashing in Siebel Enterprise. SHA-2 must not be used for any participating node, since the enterprise supports only SHA-1.

Hashing Passwords Using the RSA SHA-1 Algorithm

The following procedure describes how to run the hashpwd.exe utility using the default password hashing algorithm, RSA SHA-1.

To hash passwords using the RSA SHA-1 algorithm 

  • To hash a password using the RSA SHA-1 algorithm, run the hashpwd.exe utility using one of the following syntaxes:

    • To hash individual passwords, use the following syntax:

      hashpwd password1 password2 ...
      hashpwd -a rsasha1 password1 password2 ...
      
    • To hash individual passwords and generate salt values for each password, use the following syntax:

      hashpwd -a rsasha1 -s salt_length password1 password2 ...
      

      where salt_length specifies the length, in bytes, of the salt value. Enter a value between 1 and 16. For example, for the clear text password, PassWord02, the hash values generated by the hashpwd.exe utility using the default rsasha1 option are as follows:

      Salt : HyviRlb2yP
      
      Password: UctMxQ+DoRlQZgiHIl7ghDy1bJM=
      
    • To hash multiple passwords using a batch file, enter the passwords into a batch file (for example, the file might be named passwords.txt), and then specify the filename using the following syntax:

      hashpwd @password_file_name