Closed GoogleCodeExporter closed 9 years ago
It looks like WPS will be great for passwords for shared role accounts. The WPS
admin is probably someone who should have access for those shared role accounts
too.
But there are some systems that have individual accounts, but which aren't
connected to our SSO/CSO system for whatever reason. It would be nice if
employees could store passwords for those systems in WPS, without the WPS admin
having access to them.
Original comment by d.b.mcg...@gmail.com
on 7 Mar 2013 at 7:43
I can add a configuration option to filter results out (its actually already
there, but requires a code change).
BUT I don't want people to get a false sense of security. The system
administrator in most organizations would still have access to the database,
and the encryption key/algorithm used by webpasswordsafe, so with enough manual
effort they would have the ability to decrypt all passwords. This product is
meant to be a solution for shared passwords, not a "trust no one" encryption
solution for personal passwords. The later would require a significant
redesign which I can look at for the future but in the mean time anyone worried
about that should use a different solution (LastPass, KeepPass, PasswordSafe,
OnePasssword, etc). As an information security professional it is important to
be completely transparent about the risks.
Original comment by joshdrum...@gmail.com
on 17 Mar 2013 at 1:44
What about an approach like that used by TeamPass, where personal (not shared)
passwords are encrypted with a separate key/salt provided by the user?
Original comment by d.b.mcg...@gmail.com
on 18 Mar 2013 at 4:50
Yeah that was what I was thinking, basically a bolt-on feature that keeps the
encryption of the two different types different yet integrates them both in a
consistent user interface the best it can. That wouldn't be a simple change
compared to some of the other issues but I'll definitely look into it for a
future major version.
Original comment by joshdrum...@gmail.com
on 19 Mar 2013 at 3:59
Note to self- can't really use the authentication credential as part of the
personal key, since that would only work when using the default local
authenticator. If the password changed in another system via external
authenticator (LDAP, SSO), or was using one time password / 2-factor authn it
would break. Need user to type in a different password/key at login for
personal password unlocking?
Original comment by joshdrum...@gmail.com
on 19 Mar 2013 at 4:13
I'll leave this issue as holmesd3@yahoo.com originally submitted it, just
filtering out results in the search menu. Using a different "trust no one"
encryption scheme per user for non-shared passwords I'll create a separate
enhancement request issue for.
Original comment by joshdrum...@gmail.com
on 20 Mar 2013 at 7:27
Original comment by joshdrum...@gmail.com
on 20 Mar 2013 at 7:27
Original issue reported on code.google.com by
holme...@yahoo.com
on 31 Aug 2012 at 5:26