Where are gateway user passwords stored in jumpserver?
How authentication passwords are stored.
Overview: This article explains where gateway users' passwords are securely stored in the ezeelogin SSH jump server. Web GUI authentication passwords are stored in the user table of the database in the hash format, while SSH authentication passwords are kept in the /etc/shadow file.
The UI authentication hash is stored in the database user table and the SSH authentication hash is stored in the /etc/shadow file.
For Example, we have user tom, the ssh authentication hash is stored in the /etc/shadow file as follows:
root@localhost :~# cat /etc/shadow | grep tom
tony:$6$rounds=5607$iky9BM9eKEcCCoSW$yDl/1/VuOOw0H/y6P6jZCi0G22JRF42D5r5Or91cS6VXgsFKymvF/yKaaQh8DJxgvH6UWme/O0la0CyAIOFf8.:19034:0:99999:7:::
The UI authentication hash is stored in the database user table.
To find the UI authentication table log to the database, select the user table, and run the below command:
MariaDB [ezlogin_guhi]> select username,password from lqzu_users where username='tom'\G;
*************************** 1. row ***************************
username: tom
password: $2y$10$f3cPVMQo5CxqiGDXjS3uCe0KIECEwiUZHxkrRHqHi1yqRq7CiVE6K
1 row in set (0.00 sec)
ERROR: No query specified
Related Articles: