Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Bcrypt hashing algorithm for Password property types

Updated on March 15, 2022

To provide extra protection against brute-force attacks, Pega Platform uses salted bcrypt as the default hashing algorithm for Password property types. Bcrypt uses a modified key setup algorithm that requires a long time to process. Key strengthening makes a password more secure against brute-force attacks, meaning potential attackers must spend a substantial amount of time testing every possible key.

Bcrypt is an adaptive hashing algorithm based on the Blowfish symmetric block cipher cryptographic algorithm.

Changing the encryption algorithm

For on-premises deployments, ensure that you are using the salted bcrypt algorithm by removing all cryptographic‑related configuration settings from the prconfig.xml file:

  • crypto/v5oneway
  • crypto/v5onewahsha1
  • crypto/v5portable
  • crypto/onewayhashalgorithm
  • crypto/updatehash

Convert preexisting password hashes to use the new algorithm by editing or creating the following Dynamic System Settings in Dev Studio:

Dynamic System SettingOwning rulesetSetting purposeValue
one way hash algorithmPega-Engineprconfig/crypto/onewayhashalgorithmbcrypt
update hashPega-Engineprconfig/crypto/updatehashtrue

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us