O'Reilly logo

Mastering Internet of Things by Peter Waher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the password

Instead of writing the password in clear text in the configuration file, it is recommended that the password hash be used instead, if the authentication mechanism supports hashes. When the installer sets up the gateway, it authenticates the credentials during start up, and writes the hash value in the file instead. When the hash value is used, the mechanism used to create the hash must be written as well. In the following example, new-line characters are added for readability:

<Password type="SCRAM-SHA-1"> 
   rAeAYLvAa6QoP8QWyTGRLgKO/J4= 
</Password> 

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required