Can EMS passwords be mangled in scripts to run scripts through the tibemsadmin so that passwords are not in plain text?

Can EMS passwords be mangled in scripts to run scripts through the tibemsadmin so that passwords are not in plain text?

book

Article ID: KB0091894

calendar_today

Updated On:

Products Versions
TIBCO Enterprise Message Service -
Not Applicable -

Description

Resolution:
No, EMS passwords cannot be mangled in scripts. This being said, mangling the password will not provide any additional security since the mangled password will be visible in the script and can be used by anybody who has access to it and can pass it into the EMS server.

The only way to really manage this is to use a scripting language that allows for interaction with a prompt, like Expect.  The same issue presents it self when you try to write a script that logs into another host machine, how do you deal with passing of the password to that machine.

Issue/Introduction

Can EMS passwords be mangled in scripts to run scripts through the tibemsadmin so that passwords are not in plain text?