Reg: Alternate way of hashing database role passwords

From: "M, Anbazhagan" <Anbazhagan(dot)M(at)netapp(dot)com>
To: "pgsql-hackers(at)lists(dot)postgresql(dot)org" <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Reg: Alternate way of hashing database role passwords
Date: 2024-06-26 05:00:23
Message-ID: DM6PR06MB5307C5FD95521ABACB4D1D54FFD62@DM6PR06MB5307.namprd06.prod.outlook.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Hi Team,

Currently we are using SHA-256 default for password_encryption in our postgresql deployments. Is there any active work being done for adding additional hashing options like PBKDF2, HKDF, SCRYPT or Argon2 password hashing functions, either of which is only accepted as a algorithms that should be used for encrypting or hashing the password at storage as per the Organization's Cryptography Standard.

If it is not in current plan, is there a plan to include that in subsequent versions?

Thanks and Regards,
Anbazhagan M

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2024-06-26 05:12:57 Re: Should we document how column DEFAULT expressions work?
Previous Message David Rowley 2024-06-26 04:50:00 Re: Should we document how column DEFAULT expressions work?