keycloak-scim/topics/threat/password-db-compromised.adoc
Bruno Oliveira 8af9af5d95
Typo
2016-09-02 15:49:29 -03:00

9 lines
484 B
Text

=== Password database compromised
{{book.project.name}} does not store passwords in raw text.
It stores a hash of them using the PBKDF2 algorithm. It actually uses
a default of 20,000 hashing iterations! This is the security community's recommended number of iterations.
This can be a rather large performance hit on your system as PBKDF2, by design, gobbles up a significant amount of CPU.
It is up to you to decide how serious you want to be to protect your password database.