Credential Managers

Credential managers are used to communicate with data-sources, in order to validate and manage credentials. A Credential Manager is responsible for checking a password by pre-hashing it with a certain algorithm as needed or to leave it unchanged, if the back-end repository can handle verification on its own. A Credential Manager can be used in several places in the configuration, (i.e. in authenticators, SDK plugins, script procedures), to verify or update credentials; it is also used internally by OAuth flows that accept a credential directly (e.g., the Client Credentials flow and the Resource Owner Password Credentials flow).

The Curity Identity Server supports several algorithms for password transformation:

  • plaintext The plaintext algorithm doesn’t transform the password. Using this algorithm, means that the passwords will be sent in plaintext to the backend data-source, so usage of this algorithm is highly discouraged if the back-end will not do the appropriate hashing.
  • BCrypt When using this algorithm, passwords hashes are stored with the $2a$ prefix. The configuration allows to modify the expansion rounds used when hashing a password.
  • phpass When using this algorithm, passwords hashes are stored with the $P$ prefix. Hashes of the prefix $H$ can also be verified. The configuration allows to modify the number of iterations the Phpass algorithm does for password hashing.
  • Sha2WithSha256 When using this algorithm, passwords hashes are stored with the $5$ prefix. The configuration allows to set the number of times Sha256 encryption will be applied and the usage of a predefined salt (which is not recommended as it makes attacks on hashes easier if the data is compromised).
  • Sha2WithSha512 When using this algorithm, passwords hashes are stored with the $6$ prefix. The configuration allows to set the number of times Sha512 encryption will be applied and the usage of a predefined salt (which is not recommended as it makes attacks on hashes easier if the data is compromised).

Note

Keep in mind that the setting related to the cost of each algorithm is used only when creating/updating a password. Password verification doesn’t use this setting, it will work even when having a different cost configured than the one the saved password was created with, since the saved password’s hash is used to figure out how to verify it (using the cost and salt of the saved hash).

User Account Credentials

One of the use cases for Credential Managers is verifying credentials of user accounts that also exist in the system. Depending on the data source that is used for credentials (and its settings), the status of an account may or may not be considered when verifying the credentials. For scenarios where the account status is not considered at that point (e.g. credentials and accounts are stored in separate data sources), a Credential Manager can be configured to additionally check whether a user account for the given username exists and is active. In this case, a data source for user accounts must be configured, in addition to the credentials data source. Credentials for inactive accounts are deemed invalid. Refer to the documentation of the chosen credentials data source to determine whether the account status is checked when retrieving/verifying credentials.

Credential Policies

Credential Managers can be configured with a credential policy - a set of rules that are applied when setting and/or verifying a password. The following rules may be configured in a credential policy:

  • Complexity
    • Validation of password complexity rules, such as the minimum length or the number of characters of a given type.
    • This rule is applied when a new password is being set. The operation is rejected if the attempted password doesn’t meet the configured criteria.
  • History
    • Validation of previously used passwords, i.e. of the number of unique passwords that must be used before one can be reused.
    • This rule is applied when a new password is being set. The operation is rejected if the attempted password is among the last used passwords.
  • Temporary lockout
    • Applies a temporary lockout period after a given number of consecutive failed verification attempts.
    • The counter of failed attempts is reset after a successful verification or after some time has elapsed since the last failed attempt (same duration as the configured lockout period).
    • This rule is applied during password verification. If the temporary lockout period is active, the operation is rejected before the password is actually verified using the configured data source.
  • Aging
    • Validation of the maximum password age, forcing users to periodically change passwords.
    • This rule is applied during password verification. If the provided password is correct but it is too old, the operation is rejected.
    • When a new password is set, the current instant is captured and used to determine the password age during verification.

All rules that are enabled in a policy must accept a credential operation (e.g. verify) for it to go through in the system.

In the admin UI, credentials policies can be managed via the Facilities menu. An example of configuring a policy is shown in the following figure:

../../_images/credential-policy.png

Fig. 19 Configuring a credential policy in the admin UI

After creating a policy, it can be associated with a Credential Manager in the manager’s configuration screen. Refer to the configuration reference for all the details on policy configuration.

Data source requirements

Some rules in a credential policy need to store additional control data (credential attributes) alongside the subject and password. Therefore, in order to use credential policies, the Credential Manager must be configured with a data source that supports credential attributes. In some cases, it can also be configured with a Bucket for this particular purpose. Refer to each data source’s documentation for more information.