Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion en_US/access-control/authn/mnesia.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ In the EMQX Dashboard, click **Access Control** -> **Authentication** from the l
- **Salt Position**: Determines how salt (random data) is added to the password. Options are `suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: Set **Salt Position** to `disable` if `plain` is selected.
- For `bcrypt`:
- **Salt Rounds**: Defines the number of times the hash function is applied, expressed as 2^Salt Rounds, also known as the "cost factor". The default value is `10`, with a permissible range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
- For `pkbdf2`:
- For `pbkdf2`:
- **Pseudorandom Function**: Selects the hash function that generates the key, such as `sha256`.
- **Iteration Count**: Sets the number of times the hash function is executed. The default is `4096`.
- **Derived Key Length** (optional): Specifies the length of the generated key. If left blank, the length will default to that determined by the selected pseudorandom function.
Expand Down
2 changes: 1 addition & 1 deletion en_US/access-control/authn/mongodb.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ Follow the instructions below on how to configure the authentication:
- **Salt Position**: Define how salt (random data) is added to the password. Options are`suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: Set **Salt Position** to `disable` if `plain` is selected.
- For `bcrypt`:
- **Salt Rounds**: Set the number of hash function applications, expressed as 2^Salt Rounds, also known as the "cost factor". Default: `10`; Range: `5-10`. Higher values are recommended for better security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
- For `pkbdf2`:
- For `pbkdf2`:
- **Pseudorandom Function**: Specify the hash functions to generate the key, such as `sha256`.
- **Iteration Count**: Specify the iteration times; Default: `4096`.
- **Derived Key Length** (optional): Specify the generated key length. You can leave this field blank, then the key length will be determined by the pseudorandom function you selected.
Expand Down
2 changes: 1 addition & 1 deletion en_US/access-control/authn/mysql.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ Follow the instructions below on how to configure the authentication:
- **Salt Position**: Determines how salt (random data) is added to the password. Options are `suffix`, `prefix`, or `disable`. Retain the default setting unless migrating credentials from external storage to the EMQX built-in database. Note: Set to `disable` if `plain` is chosen.
- For `bcrypt`:
- **Salt Rounds**: Set the number of times the hash function executes, denoted as 2^Salt Rounds, also known as the "cost factor". The default is `10`, with a range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
- For `pkbdf2`:
- For `pbkdf2`:
- **Pseudorandom Function**: Specify the Hash functions to generate the key, such as `sha256`.
- **Iteration Count**: Specify the iteration times; Default: `4096`.
- **Derived Key Length** (optional): Specify the length of the generated password. You can leave this field blank, then the key length will be determined by the pseudorandom function you selected.
Expand Down
2 changes: 1 addition & 1 deletion en_US/access-control/authn/postgresql.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ Follow the instructions below on how to configure the authentication:
- **Salt Position**: Specify how salt (random data) should be added to the password. Options are `suffix`, `prefix`, or `disable`. Keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: For `plain`, the **Salt Position** should be set to `disable`.
- For `bcrypt`:
- **Salt Rounds**: Define the number of times the hash function is applied, represented as 2^Salt Rounds, also known as the "cost factor". The default is `10`, with a range of `5` to `10`. A higher setting is recommended for increased security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
- For `pkbdf2`:
- For `pbkdf2`:
- **Pseudorandom Function**: Select the hash function used for key generation, such as `sha256`.
- **Iteration Count**: Indicate the number of hash iterations. Default: `4096`.
- **Derived Key Length**: Set the desired length of the generated password. This field can be left blank, in which case the key length will default to the output of the selected pseudorandom function.
Expand Down
2 changes: 1 addition & 1 deletion en_US/access-control/authn/redis.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ Follow the instructions below on how to configure the authentication:
- **Salt Position**: Determine how salt (random data) is added to the password. Options are `suffix`, `prefix`, or `disable`. Keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: Set to `disable` if `plain` is selected.
- For `bcrypt`:
- **Salt Rounds**: Set the number of applications of the hash function, expressed as 2^Salt Rounds, also known as the "cost factor". The default is `10`, with a range of `5` to `10`. Opting for a higher value enhances security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
- For `pkbdf2`:
- For `pbkdf2`:
- **Pseudorandom Function**: Select the hash function for key generation, such as `sha256`.
- **Iteration Count**: Specify the number of iterations. Default: `4096`.
- **Derived Key Length** (optional): Set the desired length of the generated password. If left unspecified, the length will be determined by the selected pseudorandom function.
Expand Down
2 changes: 1 addition & 1 deletion zh_CN/access-control/authn/mnesia.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ EMQX 通过内置数据库为用户提供了一种低成本、开箱即用的密
2. 选择 **bcrypt** 算法,需配置:

- **Salt Rounds**:指定散列需要的计算次数(2^Salt Rounds),也称成本因子。默认值:**10**,可选值:**5~10**;数值越高,加密的安全性越高,因此建议采用较大的值,但相应的用户验证的耗时也会增加,您可根据业务需求进行配置。
3. 选择 **pkbdf2** 算法,需配置:
3. 选择 **pbkdf2** 算法,需配置:

- **伪随机函数**:指定生成密钥使用的散列函数,如 sha256 等。
- **迭代次数**:指定散列次数,默认值:**4096**。<!--后续补充取值范围-->
Expand Down
2 changes: 1 addition & 1 deletion zh_CN/access-control/authn/mongodb.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ MongoDB 认证器支持将认证数据存储为 MongoDB 文档。用户需要提
- **加盐方式**:用于指定盐和密码的组合方式,除需将访问凭据从外部存储迁移到 EMQX 内置数据库中外,一般不需要更改此选项;可选值:**suffix**(在密码尾部加盐)、**prefix**(在密码头部加盐)、**disable**(不启用)。注意:如选择 **plain**,加盐方式应设为 **disable**。
- 选择 **bcrypt** 算法,需配置:
- **Salt Rounds**:指定散列需要的计算次数(2^Salt Rounds),也称成本因子。默认值:**10**,可选值:**5~10**;数值越高,加密的安全性越高,因此建议采用较大的值,但相应的用户验证的耗时也会增加,您可根据业务需求进行配置。
- 选择 **pkbdf2** 算法,需配置:
- 选择 **pbkdf2** 算法,需配置:
- **伪随机函数**:指定生成密钥使用的散列函数,如 sha256 等。
- **迭代次数**:指定散列次数,默认值:**4096**。<!--后续补充取值范围-->
- **密钥长度**(可选):指定希望得到的密钥长度。如不指定,密钥长度将由**伪随机函数**确定。
Expand Down
2 changes: 1 addition & 1 deletion zh_CN/access-control/authn/mysql.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ SELECT password_hash, salt, is_superuser FROM mqtt_user WHERE username = ${usern
- **加盐方式**:用于指定盐和密码的组合方式,除需将访问凭据从外部存储迁移到 EMQX 内置数据库中外,一般不需要更改此选项;可选值:**suffix**(在密码尾部加盐)、**prefix**(在密码头部加盐)、**disable**(不启用)。注意:如选择 **plain**,加盐方式应设为 **disable**。
- 选择 **bcrypt** 算法,需配置:
- **Salt Rounds**:指定散列需要的计算次数(2^Salt Rounds),也称成本因子。默认值:**10**,可选值:**5~10**;数值越高,加密的安全性越高,因此建议采用较大的值,但相应的用户验证的耗时也会增加,您可根据业务需求进行配置。
- 选择 **pkbdf2** 算法,需配置:
- 选择 **pbkdf2** 算法,需配置:
- **伪随机函数**:指定生成密钥使用的散列函数,如 sha256 等。
- **迭代次数**:指定散列次数,默认值:**4096**。<!--后续补充取值范围-->
- **密钥长度**(可选):指定希望得到的密钥长度。如不指定,密钥长度将由**伪随机函数**确定。
Expand Down
4 changes: 2 additions & 2 deletions zh_CN/access-control/authn/postgresql.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,14 +73,14 @@ SELECT password_hash, salt, is_superuser FROM mqtt_user WHERE username = ${usern
- 如果选择 **plain**、**md5**、**sha**、**sha256** 或 **sha512** 算法,还需配置:
- **加盐方式**:用于指定盐和密码的组合方式,除需将访问凭据从外部存储迁移到 EMQX 内置数据库中外,一般不需要更改此选项;可选值:**suffix**(在密码尾部加盐)、**prefix**(在密码头部加盐)、**disable**(不启用)。注意:如选择 **plain**,加盐方式应设为 **disable**。

- 如果选择 **pkbdf2** 算法,还需配置:
- 如果选择 **pbkdf2** 算法,还需配置:

- **伪随机函数**:指定生成密钥使用的散列函数,如 sha256 等。

- **加盐方式**:用于指定盐和密码的组合方式,除需将访问凭据从外部存储迁移到 EMQX 内置数据库中外,一般不需要更改此选项;可选值:**suffix**(在密码尾部加盐)、**prefix**(在密码头部加盐)、**disable**(不启用)。注意:如选择 **plain**,加盐方式应设为 **disable**。
- 选择 **bcrypt** 算法,需配置:
- **Salt Rounds**:指定散列需要的计算次数(2^Salt Rounds),也称成本因子。默认值:**10**,可选值:**5~10**;数值越高,加密的安全性越高,因此建议采用较大的值,但相应的用户验证的耗时也会增加,您可根据业务需求进行配置。
- 选择 **pkbdf2** 算法,需配置:
- 选择 **pbkdf2** 算法,需配置:

- **密钥长度**(可选):指定希望得到的密钥长度。如不指定,密钥长度将由**伪随机函数**确定。

Expand Down
2 changes: 1 addition & 1 deletion zh_CN/access-control/authn/redis.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ Redis 认证器支持使用 [Redis hashes](https://redis.io/docs/manual/data-typ
- **加盐方式**:用于指定盐和密码的组合方式,除需将访问凭据从外部存储迁移到 EMQX 内置数据库中外,一般不需要更改此选项;可选值:**suffix**(在密码尾部加盐)、**prefix**(在密码头部加盐)、**disable**(不启用)。注意:如选择 **plain**,加盐方式应设为 **disable**。
- 选择 **bcrypt** 算法,需配置:
- **Salt Rounds**:指定散列需要的计算次数(2^Salt Rounds),也称成本因子。默认值:**10**,可选值:**5~10**;数值越高,加密的安全性越高,因此建议采用较大的值,但相应的用户验证的耗时也会增加,您可根据业务需求进行配置。
- 选择 **pkbdf2** 算法,需配置:
- 选择 **pbkdf2** 算法,需配置:
- **伪随机函数**:指定生成密钥使用的散列函数,如 sha256 等。
- **迭代次数**:指定散列次数,默认值:**4096**。<!--后续补充取值范围-->
- **密钥长度**(可选):指定希望得到的密钥长度。如不指定,密钥长度将由**伪随机函数**确定。
Expand Down