Data in fileRegistry.xml should be not reversible – and you can not decrypt passwords from there.
However BAW stores Cell Admin and DE Admin credentials in J2C aliases (CellAdminAlias, DeAdminAlias) – and password from there are easily decryptable.
If you have access to file system just check <profile>/config/cells/<cellName>/security.xml file.
Where you can find entries like: alias="CellAdminAlias" userId="yourAdminName" password="{xor}SomeXoredDataHere"
Then you can de-XOR it using different ways e.g. using built-in IBM class.
Example:
wsadmin.sh -lang jython -conntype none -c "import com.ibm.ws.security.util.PasswordDecoder as pd; pd.main(['{xor}SomeXoredDataHere']);"
Response will be:
decoded password == "YourPlainTextPassword"
If you know password for Cell Admin you can change password of any (file based) user from WAS console.
--
Sebastian Tylko
------------------------------
Sebastian Tylko
------------------------------
Original Message:
Sent: Mon January 24, 2022 08:04 AM
From: JOAO PEDRO ALEXANDRE
Subject: BPMConfig export fileRegistry.xml
Hello, do you know if there is any way to decrypt a passwords of users in fileRegistry.xml. I have this system, where I did the export using BPMConfig command and I need to find out the password of a user, that no one seems to know.
------------------------------
JOAO PEDRO ALEXANDRE
------------------------------