Protected password storage | Community
Skip to main content
Level 2
February 21, 2023
Solved

Protected password storage

  • February 21, 2023
  • 2 replies
  • 1365 views

Hi all! I have Adobe Campaign Classic (version 9032) installed, does anyone know if all end-user passwords are protected by a hash with a random value (salt) using a strong hashing algorithm (e.g. SHA-256)?

Thank you very much!!

This post is no longer active and is closed to new replies. Need help? Start a new post to ask your question.
Best answer by akshaaga

Hi @robertocervantes,

In ACC, passwords are hashed with the SHA-256 algorithm and a unique salt value. This helps to protect user passwords from being compromised in the event of a security breach.

Adobe Campaign Classic also supports other password security measures, such as setting password complexity requirements and password expiration policies.

2 replies

akshaaga
Adobe Employee
akshaagaAdobe EmployeeAccepted solution
Adobe Employee
February 21, 2023

Hi @robertocervantes,

In ACC, passwords are hashed with the SHA-256 algorithm and a unique salt value. This helps to protect user passwords from being compromised in the event of a security breach.

Adobe Campaign Classic also supports other password security measures, such as setting password complexity requirements and password expiration policies.

Level 2
February 21, 2023

Great!! Many thanks @akshaaga  

Ganesh5067
Level 2
February 21, 2023

Yes, Adobe Campaign Classic (version 9032) protects end-user passwords with a hash that includes a random value (salt) using a strong hashing algorithm, such as SHA-256. The hashed passwords are then stored in the Adobe Campaign database.

When a user creates or updates their password, the password is first hashed using the selected algorithm and salt. The resulting hash value is then stored in the database, while the original password is discarded.

When a user attempts to log in, the entered password is hashed using the same algorithm and salt as the stored hash. If the resulting hash matches the stored hash, the user is granted access. If the hashes do not match, the user is denied access.

This hashing mechanism provides an additional layer of security to protect end-user passwords from unauthorized access, even if the database is compromised. It is recommended that users choose strong, unique passwords and that passwords are periodically changed to maintain the security of the system.

Level 2
March 2, 2023

Ok thank you very much for the information!!!! 🙂