{"id":2953,"date":"2025-07-04T21:51:23","date_gmt":"2025-07-04T18:51:23","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/"},"modified":"2025-07-04T21:51:23","modified_gmt":"2025-07-04T18:51:23","slug":"configuring-secure-password-hashing-algorithms-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/","title":{"rendered":"Configuring Secure Password Hashing Algorithms on Linux Servers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s digital landscape, securing user passwords is more critical than ever. Passwords are often the primary means of authentication for users, making them attractive targets for attackers. Therefore, employing secure password hashing algorithms is essential for protecting sensitive information on Linux servers. In this article, we will explore various password hashing techniques and guide you through configuring them on your Linux server.<\/p>\n<p><\/p>\n<h2>Understanding Password Hashing<\/h2>\n<p><\/p>\n<p>Password hashing is the process of transforming a plaintext password into a fixed-length string of characters. This transformation is one-way, meaning the original password cannot be retrieved from the hash. Instead, when a user attempts to log in, the system hashes the entered password and compares the hash to the stored value.<\/p>\n<p><\/p>\n<h3>Key Characteristics of Secure Hashing Algorithms<\/h3>\n<p><\/p>\n<p>When selecting a hashing algorithm, consider the following criteria:<\/p>\n<p><\/p>\n<ol><\/p>\n<li><strong>Cryptographic Security<\/strong>: The algorithm should resist attacks, such as brute force or collision attacks.<\/li>\n<p><\/p>\n<li><strong>Configurable Work Factor<\/strong>: It should allow adjustment of computational complexity to improve security as hardware capabilities evolve.<\/li>\n<p><\/p>\n<li><strong>Length of Hash Output<\/strong>: Longer hashes are generally more secure.<\/li>\n<p><\/p>\n<li><strong>Salting<\/strong>: The algorithm should support salting, which adds a unique random string to each password before hashing, making precomputed attacks (rainbow tables) less effective.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Recommended Password Hashing Algorithms<\/h2>\n<p><\/p>\n<ol><\/p>\n<li><strong>bcrypt<\/strong>: A widely used hashing algorithm that incorporates a work factor for computationally intensive hashing.<\/li>\n<p><\/p>\n<li><strong>argon2<\/strong>: The winner of the Password Hashing Competition (PHC), known for its memory-hard properties and tunable parameters for both CPU and memory costs.<\/li>\n<p><\/p>\n<li><strong>PBKDF2<\/strong>: Part of the RSA Public Key Cryptography Standards (PKCS#5) and offers adjustable iterations for increasing complexity.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Configuring Password Hashing on Linux Servers<\/h2>\n<p><\/p>\n<h3>Step 1: Install Required Packages<\/h3>\n<p><\/p>\n<p>For our examples, we will focus on <strong>bcrypt<\/strong> and <strong>argon2<\/strong>. Ensure you have the necessary packages installed. On Debian\/Ubuntu-based systems, use:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo apt update<br \/>\nsudo apt install bcrypt argon2<\/p>\n<p><\/p>\n<p>For CentOS\/RHEL:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo yum install bcrypt argon2<\/p>\n<p><\/p>\n<h3>Step 2: Hashing Passwords with bcrypt<\/h3>\n<p><\/p>\n<p>Using the <code>htpasswd<\/code> utility, you can create and manage user passwords securely. <\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p>Create a password file using bcrypt:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo htpasswd -cB \/etc\/.htpasswd username<\/p>\n<p><\/p>\n<p>The <code>-c<\/code> flag creates a new file (omit this for existing files), and <code>-B<\/code> specifies bcrypt as the hashing algorithm.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p>Follow the prompts to enter and confirm the password.<\/p>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 3: Hashing Passwords with argon2<\/h3>\n<p><\/p>\n<ol><\/p>\n<li>\n<p>You can use the <code>argon2<\/code> command line tool directly or integrate it into your applications. To hash a password, run:<\/p>\n<p><\/p>\n<p>bash<br \/>\nargon2 your_password -t 4 -m 16 -p 1<\/p>\n<p><\/p>\n<p>Here, <code>-t<\/code> represents the number of iterations, <code>-m<\/code> denotes memory in KB, and <code>-p<\/code> indicates parallelism.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p>The output format will include the parameters used and the hash, which can be stored in your database.<\/p>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 4: Updating Passwords<\/h3>\n<p><\/p>\n<p>When updating user passwords, ensure to rehash any existing passwords with the stronger algorithm:<\/p>\n<p><\/p>\n<p>bash<\/p>\n<p>sudo htpasswd -B \/etc\/.htpasswd username<\/p>\n<p><\/p>\n<h3>Step 5: Implementing in Applications<\/h3>\n<p><\/p>\n<p>When developing applications, always ensure that passwords are hashed using the selected method before storing them in a database. Here are some libraries you can use:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>PHP<\/strong>: Use <code>password_hash()<\/code> and <code>password_verify()<\/code> functions for bcrypt.<\/li>\n<p><\/p>\n<li><strong>Python<\/strong>: Utilize the <code>bcrypt<\/code> library for bcrypt or the <code>argon2-cffi<\/code> library for Argon2.<\/li>\n<p><\/p>\n<li><strong>Java<\/strong>: Use the <code>BCrypt<\/code> library for bcrypt and <code>Argon2<\/code> libraries for Argon2 hashing.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Best Practices for Password Security<\/h2>\n<p><\/p>\n<ol><\/p>\n<li><strong>Use Unique Salts<\/strong>: Always add a unique salt to each password.<\/li>\n<p><\/p>\n<li><strong>Monitor Hashing Algorithm Updates<\/strong>: Periodically review the security of chosen algorithms and update them if necessary.<\/li>\n<p><\/p>\n<li><strong>Enforce Secure Password Policies<\/strong>: Encourage users to create strong passwords and consider enabling multi-factor authentication.<\/li>\n<p><\/p>\n<li><strong>Consider Rate Limiting<\/strong>: Protect login endpoints from brute-force attacks by implementing rate limiting.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Securing passwords on Linux servers is an essential aspect of system security. By employing strong hashing algorithms like bcrypt and argon2, you can significantly reduce the risk of unauthorized access to user accounts. Regularly review and update your security practices to stay ahead of potential threats.<\/p>\n<p><\/p>\n<p>By following this guide, you can ensure that your Linux server remains a robust fortress for your user\u2019s sensitive information. For further insights, stay tuned to WafaTech Blog as we continue to explore best practices and security strategies in the evolving tech landscape.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital landscape, securing user passwords is more critical than ever. Passwords are often the primary means of authentication for users, making them attractive targets for attackers. Therefore, employing secure password hashing algorithms is essential for protecting sensitive information on Linux servers. In this article, we will explore various password hashing techniques and guide [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2954,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[1163,391,1164,265,519,447,302],"class_list":["post-2953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-algorithms","tag-configuring","tag-hashing","tag-linux","tag-password","tag-secure","tag-servers","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Configuring Secure Password Hashing Algorithms on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Configuring Secure Password Hashing Algorithms on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring Secure Password Hashing Algorithms on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Configuring Secure Password Hashing Algorithms on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-04T18:51:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Configuring Secure Password Hashing Algorithms on Linux Servers\",\"datePublished\":\"2025-07-04T18:51:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png\",\"keywords\":[\"Algorithms\",\"Configuring\",\"Hashing\",\"Linux\",\"Password\",\"Secure\",\"Servers\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/\",\"name\":\"Configuring Secure Password Hashing Algorithms on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png\",\"datePublished\":\"2025-07-04T18:51:23+00:00\",\"description\":\"Configuring Secure Password Hashing Algorithms on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server configuring secure password hashing algorithms\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/configuring-secure-password-hashing-algorithms-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuring Secure Password Hashing Algorithms on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Configuring Secure Password Hashing Algorithms on Linux Servers - WafaTech Blogs","description":"Configuring Secure Password Hashing Algorithms on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Configuring Secure Password Hashing Algorithms on Linux Servers","og_description":"Configuring Secure Password Hashing Algorithms on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-07-04T18:51:23+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Configuring Secure Password Hashing Algorithms on Linux Servers","datePublished":"2025-07-04T18:51:23+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/07\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png","keywords":["Algorithms","Configuring","Hashing","Linux","Password","Secure","Servers"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/","name":"Configuring Secure Password Hashing Algorithms on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/07\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png","datePublished":"2025-07-04T18:51:23+00:00","description":"Configuring Secure Password Hashing Algorithms on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/07\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/07\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png","width":1024,"height":1024,"caption":"linux server configuring secure password hashing algorithms"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/configuring-secure-password-hashing-algorithms-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Configuring Secure Password Hashing Algorithms on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/07\/Configuring-Secure-Password-Hashing-Algorithms-on-Linux-Servers.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2953"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2954"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}