You can share the Hashed passwords for checking in another application. it is basically password_hash('password', PASSWORD_BCRYPT, ['size' => 12]) behind the scenes.
Hash facade doesn't adds any Salt to the Encryption
Be part of JetBrains PHPverse 2026 on June 9 – a free online event bringing PHP devs worldwide together.
If I hash a Password on one Laravel project, can I use the Hash::check on another Laravel project? How does the Hash encrypt/add salt to the password?
I wouldn't bother, sending it hashed. If your app is behind SSL (using https://) the connection is encrypted anyway so there is more harm than good on doing that.
If you read that StackOverflow answer I linked the answer's author outlined some valid concerns around picking your own salt and comparing hashes generated by two different implementations (in your case one in PHP and other in JavaScript).
Let's review some of those points
1 - Salt security
...the salt needs to be cryptographically secure (i.e. unpredictable), and PHP already knows how to do that, while chances are (overwhelmingly) that you don't...
Picking a custom salt , or using a fixed salt will defeat the "cryptographically secure" aspect of using a salt, thus decreasing its efficiency.
2 - Base64 encoding differences
The salt gets encoded using base 64 encoding.
There are different base64 encoding techniques and to generate the same salt and hash you will need to be sure you have the same implementation on both your server (PHP) and client (JavaScript).
The link highlights that even in the PHP side the base64 salt encoding yields a different result than using PHP's
base64_encode, see this quote:
There are actually a few Base64 "dialects" and the one used by bcrypt is not quite the same as PHP's base64_encode()
Being sure both hashes are generated the same on PHP and JavaScript would require a lot of work to get it right, and to cover any edge cases you might not found on your first implementation.
Bottom line:
If you are using SSL/HTTPS, which you should be using on production, there is not much benefit on hashing before posting a password or other sensitive data.
Actually there are more downsides, if you decide on using a simplified hashing mechanism and, as a malicious actor have access to your client-side JavaScript code (by how web browsers work), you could expose security flaws that could be exploited on your server.
Please or to participate in this conversation.