keycloak-scim/server_admin/topics/threat/password-db-compromised.adoc
Brian Dooley 2a82132ff5 KEYCLOAK-15790 Security Threats rewrite (#57)
* KEYCLOAK-15790 Security Threats rewrite

* KEYCLOAK-15790 Post feedback changes
2021-09-21 08:58:46 +02:00

4 lines
388 B
Text

=== Password database compromised
{project_name} does not store passwords in raw text but as hashed text, using the PBKDF2 hashing algorithm. {project_name} performs 20,000 hashing iterations, the number of iterations recommended by the security community. This number of hashing iterations can adversely affect performance as PBKDF2 hashing uses a significant amount of CPU resources.