ad-assurance - Re: [AD-Assurance] RE: Azure AD DirSync password sync
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: David Walker <>
- To:
- Subject: Re: [AD-Assurance] RE: Azure AD DirSync password sync
- Date: Tue, 04 Jun 2013 11:00:37 -0700
- Authentication-results: sfpop-ironport02.merit.edu; dkim=pass (signature verified)
Agreed that this is out of scope for us, other than to note that it's just yet another place that an institution needs to assess and mitigate risk. Jeff's observation that,While it may be true that “The digest of the password hash cannot be used to access resources in the customer's on-premises environment”, I think our concern was whether or not the digest could be used in offline cracking attacks (as a result of eavesdropping to capture the hash) in a manner that could be considered “practical”. is exactly right. The sentence Eric found about configuration for FIPS does lead one to believe that this will definitely be an issue if cracking the hash/encryption algorithms becomes practical. David On Tue, 2013-06-04 at 15:45 +0000, Eric Goodman wrote: I doubt this tells us much, but there’s a note up earlier in the doc stating: From: [mailto:] On Behalf Of Brian Arkills
|
- [AD-Assurance] Azure AD DirSync password sync, Brian Arkills, 06/04/2013
- [AD-Assurance] RE: Azure AD DirSync password sync, Capehart,Jeffrey D, 06/04/2013
- [AD-Assurance] RE: Azure AD DirSync password sync, Eric Goodman, 06/04/2013
- Re: [AD-Assurance] RE: Azure AD DirSync password sync, David Walker, 06/04/2013
Archive powered by MHonArc 2.6.16.