Open dan-lind opened 9 years ago
I think the main reason at least for this specific example using bcrypt would be to adapt the number of rounds for the bcrypt hashing function so that it fits your security needs and the available resources of your production environment. The following question and answers should give you a hint: http://security.stackexchange.com/questions/17207/recommended-of-rounds-for-bcrypt
Inside the
UsernamePasswordAuthUser.class
you can find the following snippets of code related to creating and checking password hashes:Isn't this code already following best practices, e.g. the OWASP Password Storage Guidelines found here: https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
What would be the main reasons to change this implementation?