1 .TH SLAPPASSWD 8C "RELEASEDATE" "OpenLDAP LDVERSION"
3 .\" Copyright 1998-2002 The OpenLDAP Foundation All Rights Reserved.
4 .\" Copying restrictions apply. See COPYRIGHT/LICENSE.
6 slappasswd \- OpenLDAP password utility
19 is used to generate an userPassword value
25 configuration directive.
32 Generate RFC2307 userPassword values (the default). Future
33 versions of this program may generate alternative syntaxes
34 by default. This option is provided for forward compatibility.
37 The secret to hash. If not provided, the user will be prompted
38 for the secret to hash.
41 If -h is specified, one of the following RFC2307 schemes may
51 .BI \-c " crypt-salt-format"
52 Specify the format of the salt passed to
54 when generating {CRYPT} passwords.
55 This string needs to be in
57 format and may include one (and only one) %s conversion.
58 This conversion will be substituted with a string random
59 characters from [A\-Za\-z0\-9./]. For example, "%.2s"
60 provides a two character salt and "$1$%.8s" tells some
61 versions of crypt(3) to use an MD5 algorithm and provides
62 8 random characters of salt. The default is "%s", which
63 provides 31 characters of salt.
65 The practice storing hashed passwords in userPassword violates
66 Standard Track (RFC2256) schema specifications and may hinder
67 interoperability. A new attribute type to hold hashed
69 .SH "SECURITY CONSIDERATIONS"
70 Use of hashed passwords does not protect passwords during
71 protocol transfer. TLS or other eavesdropping protections
72 should be inplace before using LDAP simple bind. The
73 hashed password values should be protected as if they
74 were clear text passwords.
81 "OpenLDAP Administrator's Guide" (http://www.OpenLDAP.org/doc/admin/)
83 OpenLDAP is developed and maintained by
84 The OpenLDAP Project (http://www.openldap.org/).
85 OpenLDAP is derived from University of Michigan LDAP 3.3 Release.