aah Password Encoders

Out-of-the-box aah supports three password encoders for authenticating users in your application. A good read about password hashing security.

Password encoders implements the interface PasswordEncoder.

// PasswordEncoder interface is used to implement generate password hash and compare given hash & password
// based chosen hashing type. Such as `bcrypt`, `scrypt` and `pbkdf2`.
//
// Good read about hashing security https://crackstation.net/hashing-security.htm
type PasswordEncoder interface {
	Generate(password []byte) ([]byte, error)
	Compare(hash, password []byte) bool
}

bcrypt Algorithm

bcrypt password hashing algorithm, good read here, here. Configure bcrypt encoder in security.conf at section password_encoder { ... }.


To hash your password

import "aahframework.org/security.v0"

// To hash your password
hashedPassword, err := security.Bcrypt.Generate([]byte(passwordString))


Configuration

bcrypt {
  # Default value is `true`
  enable = true

  # https://godoc.org/golang.org/x/crypto/bcrypt#pkg-constants
  # Default value is `12`.
  cost = 12
}

scrypt Algorithm

scrypt password hashing algorithm, good read here, here. Configure scrypt encoder in security.conf at section password_encoder { ... }.


To hash your password

import "aahframework.org/security.v0"

// To hash your password
hashedPassword, err := security.Scrypt.Generate([]byte(passwordString))


Configuration

scrypt {
  # Default value is `false`
  enable = true

  # CPU/Memory Cost
  # Default value is `2^15`
  #cpu_memory_cost = 32768

  # Default value is `8`
  #block_size = 8

  # Default value is `1`
  #parallelization = 1

  # Default value is `32`
  #derived_key_length = 32

  # Default value is `24`
  #salt_length = 24
}

pbkdf2 Algorithm

pbkdf2 password hashing algorithm, good read here, here, here. Configure pbkdf2 encoder in security.conf at section password_encoder { ... }.

Note:

It's commonly recommended to use `bcrypt` password hashing algorithm. However real world usage different per application. If you're using `pbkdf2` hashing algorithm, it's highly advised to use pbkdf2 with SHA-512 or SHA-256. Good read here, here.


To hash your password

import "aahframework.org/security.v0"

// To hash your password
hashedPassword, err := security.Pbkdf2.Generate([]byte(passwordString))


Configuration

pbkdf2 {
  # Default value is `false`
  enable = true

  # Default value is `10000`
  #iteration = 10000

  # Default value is `32`
  #derived_key_length = 32

  # Default value is `24`
  #salt_length = 24

  # Supported SHA's are `sha-1`, `sha-224`, `sha-256`, `sha-384`, `sha-512`.
  # Default value is `sha-512`
  #hash_algorithm = "sha-512"
}

Adding additional password encoder into aah

aah provides extensibility to add additional password encoder into aah easily. Implement the interface acrypto.PasswordEncoder then add it to aah.

Registering password encoder

// Choose whichever the argon2 library and implement interface `acrypto.PasswordEncoder`
// then register it here.
func init()  {
  aah.AddPasswordAlgorithm("argon2", &Argon2Encoder{})
}

Using registered encoder in auth schemes

# In your auth scheme, simply mention the name you have used for the registering. That's it very easy!
form_auth {
  #...
  password_encoder = "argon2"
  #...
}