Skip to content

Latest commit

 

History

History
91 lines (68 loc) · 3.71 KB

File metadata and controls

91 lines (68 loc) · 3.71 KB
description PWDCOMPARE (Transact-SQL)
title PWDCOMPARE (Transact-SQL) | Microsoft Docs
ms.custom
ms.date 03/14/2017
ms.prod sql
ms.prod_service sql-database
ms.reviewer
ms.technology t-sql
ms.topic reference
f1_keywords
PWDCOMPARE
PWDCOMPARE_TSQL
dev_langs
TSQL
helpviewer_keywords
sa account
passwords [SQL Server], blank
PWDCOMPARE function [Transact-SQL]
ms.assetid 5f84ff9e-c1ec-46aa-8501-50f854ebcc3a
author VanMSFT
ms.author vanto

PWDCOMPARE (Transact-SQL)

[!INCLUDE SQL Server SQL Database]

Hashes a password and compares the hash to the hash of an existing password. PWDCOMPARE can be used to search for blank [!INCLUDEssNoVersion] login passwords or common weak passwords.

Topic link icon Transact-SQL Syntax Conventions

Syntax

PWDCOMPARE ( 'clear_text_password'  
   , password_hash   
   [ , version ] )  

[!INCLUDEsql-server-tsql-previous-offline-documentation]

Arguments

' clear_text_password '
Is the unencrypted password. clear_text_password is sysname (nvarchar(128)).

password_hash
Is the encryption hash of a password. password_hash is varbinary(128).

version
Obsolete parameter that can be set to 1 if password_hash represents a value from a login earlier than [!INCLUDEssVersion2000] that was migrated to [!INCLUDEssVersion2005] or later but never converted to the [!INCLUDEssVersion2000] system. version is int.

Caution

This parameter is provided for backwards compatibility, but is ignored because password hash blobs now contain their own version descriptions. [!INCLUDEssNoteDepNextDontUse]

Return Types

int

Returns 1 if the hash of the clear_text_password matches the password_hash parameter, and 0 if it does not.

Remarks

The PWDCOMPARE function is not a threat against the strength of password hashes because the same test could be performed by trying to log in using the password provided as the first parameter.

PWDCOMPARE cannot be used with the passwords of contained database users. There is no contained database equivalent.

Permissions

PWDENCRYPT is available to public.

CONTROL SERVER permission is required to examine the password_hash column of sys.sql_logins.

Examples

A. Identifying logins that have no passwords

The following example identifies [!INCLUDEssNoVersion] logins that have no passwords.

SELECT name FROM sys.sql_logins   
WHERE PWDCOMPARE('', password_hash) = 1 ;  

B. Searching for common passwords

To search for common passwords that you want to identify and change, specify the password as the first parameter. For example, execute the following statement to search for a password specified as password.

SELECT name FROM sys.sql_logins   
WHERE PWDCOMPARE('password', password_hash) = 1 ;  

See Also

PWDENCRYPT (Transact-SQL)
Security Functions (Transact-SQL)