01-31-2020, 07:25 PM
By default (if you are not use AD or LDAP) is that the user information is stored in the "login" table in the "sthpw" database. There is a column called "password" for every user. Depending on the version of TACTIC, it would either be "encrypted" using "md5" (terrible, I know) or using a port of the Drupal hash (which is quite complex). You will know if the password starts with a "$", in which case the password is using the Drupal hash.
You can debug by starting TACTIC in debug mode from the command line:
python3 startup_dev.py -p 9000
This will send the output to the console. Selecting a port allows you to run a debug session along with a production version. It may output any issues when trying to login.
If you wish, you can put print statements in the code to help debug. The code that controls the login is in:
<TACTIC_INSTALL_DIR>/src/pyasm/security/security.py
using the method "login_user" in the Security class.
You can debug by starting TACTIC in debug mode from the command line:
python3 startup_dev.py -p 9000
This will send the output to the console. Selecting a port allows you to run a debug session along with a production version. It may output any issues when trying to login.
If you wish, you can put print statements in the code to help debug. The code that controls the login is in:
<TACTIC_INSTALL_DIR>/src/pyasm/security/security.py
using the method "login_user" in the Security class.