keycloak-scim/server_admin/topics/threat/password-db-compromised.adoc
Alexey Palazhchenko ac6d4e1e6c
Sync the number with other parts of the document (#1044)
Co-authored-by: Stian Thorgersen <stianst@gmail.com>
2021-11-10 09:01:37 +01:00

4 lines
No EOL
387 B
Text

=== Password database compromised
{project_name} does not store passwords in raw text but as hashed text, using the PBKDF2 hashing algorithm. {project_name} performs 27,500 hashing iterations, the number of iterations recommended by the security community. This number of hashing iterations can adversely affect performance as PBKDF2 hashing uses a significant amount of CPU resources.