From 41da9904f8d3308ef5591ca7ee9bbe4d3065ed9c Mon Sep 17 00:00:00 2001 From: Evan Read <eread@gitlab.com> Date: Fri, 23 Sep 2022 13:39:41 +1000 Subject: [PATCH] Remove unneeded tier badge and do small edit --- doc/security/password_storage.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/security/password_storage.md b/doc/security/password_storage.md index 518b1d9ac88e8..6b20f8619ae20 100644 --- a/doc/security/password_storage.md +++ b/doc/security/password_storage.md @@ -9,7 +9,7 @@ type: reference GitLab administrators can configure how passwords and OAuth tokens are stored. -## Password storage **(FREE)** +## Password storage > PBKDF2 and SHA512 [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/360658) in GitLab 15.2 [with flags](../administration/feature_flags.md) named `pbkdf2_password_encryption` and `pbkdf2_password_encryption_write`. Disabled by default. @@ -21,8 +21,8 @@ library to hash user passwords. Created password hashes have these attributes: - **Hashing**: - **BCrypt**: By default, the [`bcrypt`](https://en.wikipedia.org/wiki/Bcrypt) hashing - function is used to generate the hash of the provided password. This is a - strong, industry-standard cryptographic hashing function. + function is used to generate the hash of the provided password. This cryptographic hashing function is + strong and industry-standard. - **PBKDF2 and SHA512**: Starting in GitLab 15.2, PBKDF2 and SHA512 are supported behind the following feature flags (disabled by default): - `pbkdf2_password_encryption` - Enables reading and comparison of PBKDF2 + SHA512 -- GitLab