NAME
Catalyst::Plugin::Authentication::Credential::Password - Authenticate a user with a password.
SYNOPSIS
use Catalyst qw/
Authentication
Authentication::Store::Foo
Authentication::Credential::Password
/;
sub login : Local {
my ( $self, $c ) = @_;
$c->login( $c->req->param('login'), $c->req->param('password') );
}
DESCRIPTION
This authentication credential checker takes a user and a password, and tries various methods of comparing a password based on what the user supports:
- clear text password
-
If the user has clear a clear text password it will be compared directly.
- crypted password
-
If UNIX crypt hashed passwords are supported, they will be compared using perl's builtin
crypt
function. - hashed password
-
If the user object supports hashed passwords, they will be used in conjunction with Digest.
METHODS
- login $user, $password
- login
-
Try to log a user in.
$user
can be an ID or object. If it isa Catalyst::Plugin::Authentication::User it will be used as is. Otherwise$c->get_user
is used to retrieve it.$password
is a string.If
$user
or$password
are not provided the parameterslogin
,user
,username
andpassword
,passwd
,pass
will be tried instead.
SUPPORTING THIS PLUGIN
Clear Text Passwords
Predicate:
$user->supports(qw/password clear/);
Expected methods:
- password
-
Returns the user's clear text password as a string to be compared with
eq
.
Crypted Passwords
Predicate:
$user->supports(qw/password crypted/);
Expected methods:
- crypted_password
-
Return's the user's crypted password as a string, with the salt as the first two chars.
Hashed Passwords
Predicate:
$user->supports(qw/password hashed/);
Expected methods:
- hashed_password
-
Return's the hash of the user's password as binary.
- hash_algorithm
-
Returns a string suitable for feeding into "new" in Digest.
- password_pre_salt
- password_post_salt
-
Returns a string to be hashed before/after the user's password. Typically only a pre-salt is used.
Crypt::SaltedHash Passwords
Predicate:
$user->supports(qw/password salted_hash/);
Expected methods:
- hashed_password
-
Return's the hash of the user's password as returned from Crypt-SaltedHash->generate.
Optional methods:
- password_salt_len
-
Returns the length of salt used to generate the salted hash.
1 POD Error
The following errors were encountered while parsing the POD:
- Around line 213:
You forgot a '=back' before '=head2'