38k Member Forum
A friend is wanting to move his forum has 38k active members and he is worried that converting direct from SMF, so I said I would ask this for him, if he would use the 2.0 converter would his members still need to reset passwords, as it is done on 2.1? If so is their a route you can think off that will save his passwords?
Re: 38k Member Forum
Reply #1 –
As far as I remember, they have a different encription, so I don't think it's possible at all...
Re: 38k Member Forum
Reply #3 –
I don't think you should have to reset the passwords. They should be updated by ElkArte as people login.
Re: 38k Member Forum
Reply #4 –
O.o how can it work at all with the old encryption?
Re: 38k Member Forum
Reply #7 –
Be sure "Allow password hash conversion" is checked, its under Admin->Configuration->Security/Moderation->General Its intended to help this issue when sites are converted
Then (to recap what others already said)
A user will attempt login, it will look liked it failed and ask for their password again, at that point it will log them in (assuming of course the password was right).
After they successfully login, the old password hash will be converted to the new (industry standard) hashing.
Re: 38k Member Forum
Reply #9 –
I don't think the stored passwords / autofill will work (not 100% sure though).
Likely they will need to use the keyboard on both screens. Those autofills look for matching form names/ids and they are likely not the same between your current platform and ElkArte.
Re: 38k Member Forum
Reply #10 –
It would be a small nuisance for those that forgot their password, they would have to reset it.
But what about those that have changed their email account and haven't updated their forum info with the new email and don't have access to their old email account anymore? It would be impossible to reset their password. They would have to message me outside the forum and I have to trust that they are who they say they are and then reset their password manually.
Re: 38k Member Forum
Reply #14 –
Because the form sends an encrypted password on the first pass, which the site then does a validation against. Once the site knows the password is valid, to one of the many hashing algorithms, it resets the form such so that it returns the password to the server in plain text. The plain text password is (assuming it once again validates) used to create the new style db hash. You could eliminate the form login encryption and make the conversion less "clunky".