keystone/keystone/identity
Morgan Fainberg 8ad765e023 Support new hashing algorithms for securely storing password hashes
Support bcrypt, pbkdf2_sha512, or scrypt in password hashing for
passwords managed within keystone. sha512_crypt is insufficient to
hash passwords in a secure way for storage in the DB. Keystone defaults
now to using bcrypt but can handle scrypt and pbkdf2_sha512 with a number
of tuning options if desired.

Closes-bug: #1543048
Closes-bug: #1668503
Change-Id: Id05026720839d94de26d0e44631deb34bcc0e610
2017-05-18 20:03:25 -05:00
..
backends Support new hashing algorithms for securely storing password hashes 2017-05-18 20:03:25 -05:00
id_generators Replace six iteration methods with standard ones 2016-09-08 18:56:31 +08:00
mapping_backends Merge "Faster id mapping lookup" 2016-11-01 00:08:36 +00:00
shadow_backends Set the domain for federated users 2017-01-25 22:03:52 +00:00
__init__.py Remove exposure of routers at package level 2015-12-03 15:06:56 -03:00
controllers.py Remove log translations in keystone 2017-03-25 18:17:15 +00:00
core.py Remove usage of enforce_type 2017-04-28 10:49:43 +08:00
generator.py Replace keystone.common.config with keystone.conf package 2016-06-24 17:02:15 +00:00
routers.py Implement HEAD method for all v3 GET actions 2016-03-22 10:27:53 -07:00
schema.py Implement better validation for resource options 2017-01-29 13:19:44 -08:00