O'Reilly logo

APIs at Work, Second Edition by Ron Hawkins, Doug Pence, Bruce Vining

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Retrieving Encrypted Passwords

Since everything done on your system is tracked by user profile, it’s very important that access to each user’s profile be secure. Only the owner of the user profile should know his or her password. The next sample program shows you how an encrypted password may be retrieved—but not in a decipherable form. It is retrieved in its fully encrypted state. You might be wondering why encrypted information would have any value. It is valuable because, even in its encrypted state, you can use the encrypted password information to keep your passwords consistent across several other systems in a network.

Two APIs work in conjunction to accomplish this task. The first, Retrieve Encrypted User Password (QSYRUPWD), retrieves ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required