Browse Source

Fix typos in BCryptPasswordEncoder documentation

Closes gh-8586
pull/8724/head
Markus Engelbrecht 6 years ago committed by Rob Winch
parent
commit
258bd8fa09
  1. 4
      docs/manual/src/docs/asciidoc/_includes/about/authentication/password-storage.adoc

4
docs/manual/src/docs/asciidoc/_includes/about/authentication/password-storage.adoc

@ -272,8 +272,8 @@ https://docs.spring.io/spring-security/site/docs/5.0.x/api/org/springframework/s @@ -272,8 +272,8 @@ https://docs.spring.io/spring-security/site/docs/5.0.x/api/org/springframework/s
The `BCryptPasswordEncoder` implementation uses the widely supported https://en.wikipedia.org/wiki/Bcrypt[bcrypt] algorithm to hash the passwords.
In order to make it more resistent to password cracking, bcrypt is deliberately slow.
Like other adaptive one-way functions, it should be tuned to take about 1 second to verify a password on your system.
The default implementation of `BCryptPasswordEncoder` uses strength 10 as mentioned on the Javadoc of https://docs.spring.io/spring-security/site/docs/current/api/org/springframework/security/crypto/bcrypt/BCryptPasswordEncoder.html[BCryptPasswordEncoder]. Your are encouagred to
tune and test the strength parameter on your own system so that it take roughly 1 second to verify a password.
The default implementation of `BCryptPasswordEncoder` uses strength 10 as mentioned in the Javadoc of https://docs.spring.io/spring-security/site/docs/current/api/org/springframework/security/crypto/bcrypt/BCryptPasswordEncoder.html[BCryptPasswordEncoder]. You are encouraged to
tune and test the strength parameter on your own system so that it takes roughly 1 second to verify a password.
[source,java]
----

Loading…
Cancel
Save