How does ASP.NET Core Identity handle password hashing by default?

  • Uses SHA-1 hashing algorithm
  • Uses plain text storage
  • Uses BCrypt with a randomized salt
  • Uses PBKDF2 with a randomized salt
ASP.NET Core Identity is security-conscious and, by default, uses PBKDF2 (Password-Based Key Derivation Function 2) with a randomized salt for password hashing. This ensures that even if two users have the same password, their hashed passwords will look completely different due to the unique salt, enhancing security.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *