O'Reilly logo

WildFly Cookbook by Luigi Fugaro

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing your configuration hashing passwords

In this recipe, you will learn how to mask passwords as configuration files so that they are not visible, or better, are meaningless for people looking at them.

You may have heard about transforming a text that should be secret or private, such as a password. Often times, terms such as encoding, encryption, and hashing are used indiscriminately, but they are not the same. Let's clear these concepts before we go.

Encoding a text is about transforming it to make it readable and acceptable for a different format (like the & symbol in HTML should be converted to &).

Encryption is about transforming a text to make it secret and meaningless. The transformation is based on a key and an algorithm (like AES, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required