ACR Rules

  1. Home
  2. Docs
  3. ACR Rules
  4. Security (28)
  5. Hash Algorithm should be BCrypt or SSHA256

Hash Algorithm should be BCrypt or SSHA256

Introduced in version 1.12 (12 August 2020)

A hash algorithm is used to encrypt sensitive information by converting text of the hashed string type to a hash value. Both hash algorithms BCrypt and SSHA256 are secure enough to protect passwords and alike. Mendix recommends to use BCrypt, because it is resistant to brute-force search attacks. However, due to this safeguard, the performance, whilst using BCrypt, might slow down. If you are using a high concurrency of hashing operations, you might consider switching to SSHA256.

See for more information the Mendix documentation.

Non-compliant examples:

SHA256 is not recommended to use as hash algorithm
MD5 is not recommended to use as hash algorithm

Compliant examples:

Mendix recommends to use the BCrypt hash algorithm
If you are using a high concurrency of hashing operations, you might consider using the SSHA256 hash algorithm

Configure the hash algorithm in Project Runtime Settings and select BCrypt or SSHA256.