<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password hash algorithm in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244942#M1985550</link>
    <description>&lt;P&gt;Hello Roy,&lt;/P&gt;&lt;P&gt;this recommendation _might_ be based on the new "secure by default" installation option SAP offer when you install new systems. You might also check RZ11 entry for parameter &lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;login/password_hash_algorithm&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;For instance, in an S/4 2020 system you will find the following new line (and a reference to SAP note "2140269 - ABAP password hash: supporting salt sizes up to 256 bits"):&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;Recommended Value = encoding=RFC2307, algorithm=iSSHA-512, iterations=15000, saltsize=256&lt;BR /&gt;&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 08 Jan 2021 12:48:36 GMT</pubDate>
    <dc:creator>Private_Member_5020</dc:creator>
    <dc:date>2021-01-08T12:48:36Z</dc:date>
    <item>
      <title>Password hash algorithm</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244941#M1985549</link>
      <description>&lt;P&gt;Hello &lt;SPAN class="mention-scrubbed"&gt;frank.buchholz&lt;/SPAN&gt; &lt;/P&gt;
  &lt;P&gt;I was wondering, when reading the updated SAP security baseline template (btw good to see that it is updated regularly), SAP advises to use the SHA-512 salt with 15.000 iterations (encoding=RFC2307, algorithm=iSSHA-512, iterations=15000, saltsize=256). &lt;/P&gt;
  &lt;P&gt;How did you determined that this number has to be 15000?&lt;/P&gt;
  &lt;P&gt;OWASP says: 'at least 10000, but values to 100000 and up may be appropriate', where I advise my clients to use 200000 and up). &lt;/P&gt;
  &lt;P&gt;&lt;A href="https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#salting" target="test_blank"&gt;https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#salting&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2020 15:24:35 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244941#M1985549</guid>
      <dc:creator>former_member667629</dc:creator>
      <dc:date>2020-11-13T15:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Password hash algorithm</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244942#M1985550</link>
      <description>&lt;P&gt;Hello Roy,&lt;/P&gt;&lt;P&gt;this recommendation _might_ be based on the new "secure by default" installation option SAP offer when you install new systems. You might also check RZ11 entry for parameter &lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;login/password_hash_algorithm&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;For instance, in an S/4 2020 system you will find the following new line (and a reference to SAP note "2140269 - ABAP password hash: supporting salt sizes up to 256 bits"):&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;Recommended Value = encoding=RFC2307, algorithm=iSSHA-512, iterations=15000, saltsize=256&lt;BR /&gt;&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 08 Jan 2021 12:48:36 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244942#M1985550</guid>
      <dc:creator>Private_Member_5020</dc:creator>
      <dc:date>2021-01-08T12:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Password hash algorithm</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244943#M1985551</link>
      <description>&lt;P&gt;The work factor for the password hashing algorithm comes down to performance versus security. Since we are talking about passwords, the user has to wait till the hashing has finished before the password is accepted. I guess the number of iterations chosen as default shall make sure that most people don’t notice a delay during an authentication. The default value must also consider a variety of different kind of available performance on the application server. &lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In the end it’s a configurable value. You are free to adjust it to the available performance on your server in dependence of the max concurrent authentication operations on a max peak business day.&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 24 Jan 2022 19:55:18 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244943#M1985551</guid>
      <dc:creator>JoeGoerlich</dc:creator>
      <dc:date>2022-01-24T19:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Password hash algorithm</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244944#M1985552</link>
      <description>&lt;P&gt;Also interesting is this new kernel-feature that was just released:&lt;/P&gt;&lt;P&gt;&lt;A href="https://launchpad.support.sap.com/#/notes/3143705"&gt;3143705 - Silent migration of iterated random-salted password hashes when configuration is hardened&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Feb 2022 07:41:31 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/password-hash-algorithm/m-p/12244944#M1985552</guid>
      <dc:creator>huberda</dc:creator>
      <dc:date>2022-02-21T07:41:31Z</dc:date>
    </item>
  </channel>
</rss>

