Download
| Alert*
System must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords
The system must use a strong hashing algorithm to store the password. The system must use a sufficient number of hashing rounds to ensure the required level of entropy.
|