diff --git a/en/identity-server/7.2.0/docs/deploy/configure/user-stores/secure-userstore-using-pbkdf2.md b/en/identity-server/7.2.0/docs/deploy/configure/user-stores/secure-userstore-using-pbkdf2.md
index eda85be3a9..42f34b3f16 100644
--- a/en/identity-server/7.2.0/docs/deploy/configure/user-stores/secure-userstore-using-pbkdf2.md
+++ b/en/identity-server/7.2.0/docs/deploy/configure/user-stores/secure-userstore-using-pbkdf2.md
@@ -18,7 +18,7 @@ PBKDF2 is supported by [primary JDBC user stores]({{base_path}}/guides/users/use
[user_store]
type = "database_unique_id"
password_digest="PBKDF2"
- hash_algorithm_properties="{pbkdf2.iteration.count:10000, pbkdf2.dkLength:256, pbkdf2.prf:PBKDF2WithHmacSHA256}"
+ hash_algorithm_properties="{pbkdf2.iteration.count:600000, pbkdf2.dkLength:256, pbkdf2.prf:PBKDF2WithHmacSHA256}"
```
### PBKDF2 for secondary JDBC user stores
@@ -49,7 +49,7 @@ To configure PBKDF2 hashing on a JDBC user store:
| UserStore Hashing Configurations |
- {pbkdf2.iteration.count:10000, pbkdf2.dkLength:256, pbkdf2.prf:PBKDF2WithHmacSHA256} |
+ {pbkdf2.iteration.count:600000, pbkdf2.dkLength:256, pbkdf2.prf:PBKDF2WithHmacSHA256} |
Additional parameters required for password hashing algorithm. This should be given in JSON format. Learn more about these [configurations](#pbkdf2-parameters). |
@@ -60,7 +60,7 @@ Successful update of these configurations will convert the password hashing algo
## PBKDF2 parameters
-When configuring the PBKDF2 hashing algorithm the following parameters must be specified in the configurations:
+When configuring the PBKDF2 hashing algorithm the following parameters must be specified in the configurations. See the latest [OWASP recommendations](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pbkdf2) for reference.
@@ -72,7 +72,7 @@ When configuring the PBKDF2 hashing algorithm the following parameters must be s
pbkdf2.iteration.count |
Iteration count |
- 10000 |
+ 600000 |
Number of times hashing is performed. |
@@ -89,7 +89,7 @@ When configuring the PBKDF2 hashing algorithm the following parameters must be s
!!! Note
- NIST recommends `PBKDF2WithHmacSHA256` as the pseudo-random function (prf) value, but the prf can also be changed. Some examples of possible prf values are as follows:
+ NIST and OWASP recommend `PBKDF2WithHmacSHA256` as the pseudo-random function (prf) value, but the prf can also be changed. Some examples of possible prf values are as follows:
- `PBKDF2WithHmacSHA512`
- `PBKDF2WithHmacSHA256`