diff --git a/docs/architecture/08_concepts/08_01_security.md b/docs/architecture/08_concepts/08_01_security.md index 1488537..2b1b026 100644 --- a/docs/architecture/08_concepts/08_01_security.md +++ b/docs/architecture/08_concepts/08_01_security.md @@ -22,7 +22,7 @@ This document outlines the proposed user roles and permissions model for the Cal ## Authentication System -The authentication system uses JWT (JSON Web Tokens) for securing API endpoints. Users can register with a username, email, and password. Passwords are hashed using bcrypt. Upon successful login, an access token is issued, which must be included in subsequent requests for protected resources. +The authentication system uses JWT (JSON Web Tokens) for securing API endpoints. Users can register with a username, email, and password. Passwords are hashed using a `passlib` CryptContext for secure, configurable hashing. Upon successful login, an access token is issued, which must be included in subsequent requests for protected resources. ## Key Components diff --git a/requirements.txt b/requirements.txt index a24ee10..5a3cc02 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,4 +1,3 @@ -bcrypt fastapi uvicorn sqlalchemy