2a82132ff5
* KEYCLOAK-15790 Security Threats rewrite * KEYCLOAK-15790 Post feedback changes
4 lines
388 B
Text
4 lines
388 B
Text
|
|
=== Password database compromised
|
|
|
|
{project_name} does not store passwords in raw text but as hashed text, using the PBKDF2 hashing algorithm. {project_name} performs 20,000 hashing iterations, the number of iterations recommended by the security community. This number of hashing iterations can adversely affect performance as PBKDF2 hashing uses a significant amount of CPU resources.
|