keycloak-scim/docs/documentation/server_admin/topics/threat/password-db-compromised.adoc

4 lines
411 B
Text
Raw Normal View History

2016-05-31 22:00:59 +00:00
=== Password database compromised
{project_name} does not store passwords in raw text but as hashed text, using the `PBKDF2-HMAC-SHA512` message digest algorithm. {project_name} performs `210,000` hashing iterations, the number of iterations recommended by the security community. This number of hashing iterations can adversely affect performance as PBKDF2 hashing uses a significant amount of CPU resources.