Home » Developer & Programmer » Application Express, ORDS & MOD_PLSQL » Temporarily change the INTERNAL / ADMIN password (APEX 22.x)
Temporarily change the INTERNAL / ADMIN password [message #686286] Wed, 20 July 2022 06:03 Go to next message
John Watson
Messages: 8794
Registered: January 2010
Location: Global Village
Senior Member
I need to reset the ADMIN user password for the INTERNAL workspace, do a couple of things in the admin GUI, and then set the password back to what it was before. But I don't know what the current password is. This routine seems to work:

grant dba, apex_administrator_role to jw identified by jw;
conn jw/jw
alter session set current_schema=APEX_220100;

select workspace_id from apex_workspaces where workspace='INTERNAL';		--10
select WEB_PASSWORD2 from  wwv_flow_fnd_user where user_name='ADMIN' and security_group_id=10;

@apxchpwd		--change the password, do what I have to do, and then:

update wwv_flow_fnd_user set WEB_PASSWORD2='what_it_was_before' where user_name='ADMIN' and security_group_id=10;
commit;
Does that look reasonable? Would the password (or whatever the hash of it is) be stored anywhere else? Any risks you can think of?

Or is there a better technique (even a supported technique?) for doing this?

Thank you for any insight.


Re: Temporarily change the INTERNAL / ADMIN password [message #686294 is a reply to message #686286] Thu, 21 July 2022 00:16 Go to previous messageGo to next message
Littlefoot
Messages: 21756
Registered: June 2005
Location: Croatia, Europe
Senior Member
Account Moderator
That approach reminds me of changing & restoring password of Oracle users back in ... 10g? even lower? Smile

~ o ~

I don't know whether there's any risk and I don't know any other approach, so all I can say is that I wish you luck.
Re: Temporarily change the INTERNAL / ADMIN password [message #686298 is a reply to message #686294] Thu, 21 July 2022 08:21 Go to previous message
John Watson
Messages: 8794
Registered: January 2010
Location: Global Village
Senior Member
Thanks for replying. The password hack still works in 19.x:
orclz>
orclz> conn / as sysdba
Connected.
orclz> select spare4 from user$ where name='SCOTT';

SPARE4
--------------------------------------------------------------------------------
S:406C1987463E5AE09E6B2FD24A10360CECCC5FD2CACE9EA3E5F9024D1080;T:BAF7E6885884D1B
23023352E9F8ED55AD70BFAA435EE411C444726FB335943E156D93D52D098F5670D4B97CCF944035
7C6616BCEFE4B7730DED220EEB2BD3AFC8676921B476943161FD9CB27C443D416


orclz> alter user scott identified by garbage;

User altered.

orclz> rem do what you have to do....
orclz> alter user scott identified by values 'S:406C1987463E5AE09E6B2FD24A10360CECCC5FD2CACE9EA3E5F9024D1080;T:BAF7E6885884D1B23023352E9F8ED55AD70BFAA435EE411C444726FB335943E156D93D52D098F5670D4B97CCF9440357C6616BCEFE4B7730DED220EEB2BD3AFC8676921B476943161FD9CB27C443D416';

User altered.

orclz>
Previous Topic: Sending SMS
Next Topic: APEX mails retry on error
Goto Forum:
  


Current Time: Mon Jan 30 18:10:49 CST 2023