
docs.PasswordCredentialHash.md Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of okta-sdk-api Show documentation
Show all versions of okta-sdk-api Show documentation
The Okta Java SDK API .jar provides a Java API that your code can use to make calls to the Okta
API. This .jar is the only compile-time dependency within the Okta SDK project that your code should
depend on. Implementations of this API (implementation .jars) should be runtime dependencies only.
# PasswordCredentialHash
Specifies a hashed password to import into Okta. This allows an existing password to be imported into Okta directly from some other store. Okta supports the BCRYPT, SHA-512, SHA-256, SHA-1, MD5, and PBKDF2 hash functions for password import. A hashed password may be specified in a Password object when creating or updating a user, but not for other operations. See [Create User with Imported Hashed Password](https://developer.okta.com/docs/reference/api/users/#create-user-with-imported-hashed-password) for information on using this object when creating a user. When updating a User with a hashed password, the User must be in the `STAGED` status.
## Properties
| Name | Type | Description | Notes |
|------------ | ------------- | ------------- | -------------|
|**algorithm** | **PasswordCredentialHashAlgorithm** | | [optional] |
|**digestAlgorithm** | **DigestAlgorithm** | | [optional] |
|**iterationCount** | **Integer** | The number of iterations used when hashing passwords using PBKDF2. Must be >= 4096. Only required for PBKDF2 algorithm. | [optional] |
|**keySize** | **Integer** | Size of the derived key in bytes. Only required for PBKDF2 algorithm. | [optional] |
|**salt** | **String** | Only required for salted hashes. For BCRYPT, this specifies Radix-64 as the encoded salt used to generate the hash, which must be 22 characters long. For other salted hashes, this specifies the Base64-encoded salt used to generate the hash. | [optional] |
|**saltOrder** | **String** | Specifies whether salt was pre- or postfixed to the password before hashing. Only required for salted algorithms. | [optional] |
|**value** | **String** | For SHA-512, SHA-256, SHA-1, MD5, and PBKDF2, this is the actual base64-encoded hash of the password (and salt, if used). This is the Base64-encoded `value` of the SHA-512/SHA-256/SHA-1/MD5/PBKDF2 digest that was computed by either pre-fixing or post-fixing the `salt` to the `password`, depending on the `saltOrder`. If a `salt` was not used in the `source` system, then this should just be the Base64-encoded `value` of the password's SHA-512/SHA-256/SHA-1/MD5/PBKDF2 digest. For BCRYPT, this is the actual Radix-64 encoded hashed password. | [optional] |
|**workFactor** | **Integer** | Governs the strength of the hash and the time required to compute it. Only required for BCRYPT algorithm. | [optional] |
## Implemented Interfaces
* Serializable
© 2015 - 2025 Weber Informatics LLC | Privacy Policy