Credential managers are used to communicate with data-sources, in order to validate and manage credentials. A Credential Manager is responsible for checking a password by pre-hashing it with a certain algorithm as needed or to leave it unchanged, if the back-end repository can handle verification on its own. A Credential Manager can be used in several places in the configuration, (i.e. in authenticators, SDK plugins, script procedures), to verify or update credentials; it is also used internally by OAuth flows that accept a credential directly (e.g., the Client Credentials flow and the Resource Owner Password Credentials flow).
The Curity Identity Server supports several algorithms for password transformation:
$2a$
$P$
$H$
$5$
$6$
$pbkdf2-<hash-function>$
<hash-function>
pbkdf2-sha256
Note
Keep in mind that the setting related to the cost of each algorithm is used only when creating/updating a password. Password verification doesn’t use this setting, it will work even when having a different cost configured than the one the saved password was created with, since the saved password’s hash is used to figure out how to verify it (using the cost and salt of the saved hash).
One of the use cases for Credential Managers is verifying credentials of user accounts that also exist in the system. Depending on the data source that is used for credentials (and its settings), the status of an account may or may not be considered when verifying the credentials. For scenarios where the account status is not considered at that point (e.g. credentials and accounts are stored in separate data sources), a Credential Manager can be configured to additionally check whether a user account for the given username exists and is active. In this case, a data source for user accounts must be configured, in addition to the credentials data source. Credentials for inactive accounts are deemed invalid. Refer to the documentation of the chosen credentials data source to determine whether the account status is checked when retrieving/verifying credentials.
Credential Managers can be configured with a credential policy - a set of rules that are applied when setting and/or verifying a password. The following rules may be configured in a credential policy:
All rules that are enabled in a policy must accept a credential operation (e.g. verify) for it to go through in the system.
In the admin UI, credentials policies can be managed via the Facilities menu. An example of configuring a policy is shown in the following figure:
Fig. 19 Configuring a credential policy in the admin UI
After creating a policy, it can be associated with a Credential Manager in the manager’s configuration screen. Refer to the configuration reference for all the details on policy configuration.
Some rules in a credential policy need to store additional control data (credential attributes) alongside the subject and password. Therefore, in order to use credential policies, the Credential Manager must be configured with a data source that supports credential attributes. In some cases, it can also be configured with a Bucket for this particular purpose. Refer to each data source’s documentation for more information.
Credential Managers can be configured to migrate credentials from another Credential Manager (the source), allowing on-the-fly migration into a data source managed by the Curity Identity Server.
When a credential is presented for verification for the first time, verification fails due to the username/subject not being found. In this case verification is also attempted in the source Credential Manager and, if it succeeds, the credential is stored in the current Credential Manager and used from that moment on.
Credential migration can only be enabled in Credential Managers handling password hashing and storage, using a data source managed by the Curity Identity Server. The source Credential Manager can use any data source that supports credential access, including back-end repositories that fully handle password verification. The source Credential Manager cannot use a credential policy and credential policy data is not migrated.
After some time, the most frequently used credentials will be migrated. Depending on the usage frequency, you may want to send a communication to users inviting them to authenticate once, to trigger the credential migration. At some point, migration can be disabled and remaining credentials, if any, can be handled in some other way. For example, the User Management APIs can be used to set new random passwords which are then sent to users. Or users can be instructed to do a password reset flow via the HTML Forms authenticator.
Credential Managers can be configured to upgrade stored transformed credentials (hashes) when a credential is presented for verification and deemed valid. This allows upgrading stored hashes to use better algorithms over time, without asking users to reset their passwords.
When this feature is enabled, Credential Managers are configured as follows:
During verification, one algorithm (either the main or one of the additional sources) is selected based on the actual stored data. If verification succeeds using one of the additional source algorithms (i.e. not the main one), then the password is re-transformed using the main algorithm and updated in storage.
For example, if a Credential Manager is configured with:
Sha2WithSha512
Sha2WithSha256
phpass
Any password previously transformed using Sha2WithSha256 or phpass will be upgraded to Sha2WithSha512 upon successful verification.
Another example, if a Credential Manager is configured with:
Any password transformed using Sha2WithSha256 or Sha2WithSha512 with rounds different from 25000 will be upgraded to Sha2WithSha512 using 25000 rounds. This means that it is also possible to upgrade transformed data for the same algorithm but different settings.
Additionally, it is also possible to configure a credential transformation procedure as a source algorithm. In this case, the procedure is considered after the additional source algorithms, if any.
Verifying passwords/secrets involves executing cryptographic operations (namely hashing), which can be a resource-intensive operation. By default, the maximum allowed length for credentials provided to a Credential Manager, both for verification and updates, is 128 characters, in line with OWASP recommendations. This limit can be changed via the se.curity:identity-server:credentials:max-input-length system property.
se.curity:identity-server:credentials:max-input-length
The maximum length is enforced not only when Credential Managers are used with user credentials (e.g. in authenticators), but also during authentication of OAuth clients (i.e. client secrets sent on requests to OAuth endpoints). If a provided credential exceeds the limit, the request fails immediately.