--- title: "PWDCOMPARE (Transact-SQL) | Microsoft Docs" ms.custom: "" ms.date: "03/14/2017" ms.prod: "sql" ms.prod_service: "sql-database" ms.service: "" ms.component: "t-sql|functions" ms.reviewer: "" ms.suite: "sql" ms.technology: - "database-engine" ms.tgt_pltfrm: "" ms.topic: "language-reference" f1_keywords: - "PWDCOMPARE" - "PWDCOMPARE_TSQL" dev_langs: - "TSQL" helpviewer_keywords: - "sa account" - "passwords [SQL Server], blank" - "PWDCOMPARE function [Transact-SQL]" ms.assetid: 5f84ff9e-c1ec-46aa-8501-50f854ebcc3a caps.latest.revision: 15 author: "edmacauley" ms.author: "edmaca" manager: "craigg" ms.workload: "On Demand" --- # PWDCOMPARE (Transact-SQL) [!INCLUDE[tsql-appliesto-ss2008-xxxx-xxxx-xxx-md](../../includes/tsql-appliesto-ss2008-xxxx-xxxx-xxx-md.md)] Hashes a password and compares the hash to the hash of an existing password. PWDCOMPARE can be used to search for blank [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] login passwords or common weak passwords. ![Topic link icon](../../database-engine/configure-windows/media/topic-link.gif "Topic link icon") [Transact-SQL Syntax Conventions](../../t-sql/language-elements/transact-sql-syntax-conventions-transact-sql.md) ## Syntax ``` PWDCOMPARE ( 'clear_text_password' , password_hash [ , version ] ) ``` ## Arguments **'** *clear_text_password* **'** Is the unencrypted password. *clear_text_password* is **sysname** (**nvarchar(128)**). *password_hash* Is the encryption hash of a password. *password_hash* is **varbinary(128)**. *version* Obsolete parameter that can be set to 1 if *password_hash* represents a value from a login earlier than [!INCLUDE[ssVersion2000](../../includes/ssversion2000-md.md)] that was migrated to [!INCLUDE[ssVersion2005](../../includes/ssversion2005-md.md)] or later but never converted to the [!INCLUDE[ssVersion2000](../../includes/ssversion2000-md.md)] system. *version* is **int**. > [!CAUTION] > This parameter is provided for backwards compatibility, but is ignored because password hash blobs now contain their own version descriptions. [!INCLUDE[ssNoteDepNextDontUse](../../includes/ssnotedepnextdontuse-md.md)] ## Return Types **int** Returns 1 if the hash of the *clear_text_password* matches the *password_hash* parameter, and 0 if it does not. ## Remarks The PWDCOMPARE function is not a threat against the strength of password hashes because the same test could be performed by trying to log in using the password provided as the first parameter. **PWDCOMPARE** cannot be used with the passwords of contained database users. There is no contained database equivalent. ## Permissions PWDENCRYPT is available to public. CONTROL SERVER permission is required to examine the password_hash column of sys.sql_logins. ## Examples ### A. Identifying logins that have no passwords The following example identifies [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] logins that have no passwords. ``` SELECT name FROM sys.sql_logins WHERE PWDCOMPARE('', password_hash) = 1 ; ``` ### B. Searching for common passwords To search for common passwords that you want to identify and change, specify the password as the first parameter. For example, execute the following statement to search for a password specified as `password`. ``` SELECT name FROM sys.sql_logins WHERE PWDCOMPARE('password', password_hash) = 1 ; ``` ## See Also [PWDENCRYPT (Transact-SQL)](../../t-sql/functions/pwdencrypt-transact-sql.md) [Security Functions (Transact-SQL)](../../t-sql/functions/security-functions-transact-sql.md)