diff --git a/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py b/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py
index ed6f4197a30ccdedc280de1b1f439c4cd9cb0ab4..a277bfa5cf3898c20fa752777cd76cd361666b15 100644
--- a/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py
+++ b/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py
@@ -676,6 +676,17 @@ def test_suite():
   import AccessControl.tests.testOwned
   suite.addTest(AccessControl.tests.testOwned.test_suite())
   import AccessControl.tests.testPasswordDigest
+  # Disable crypt scheme, we don't want to use CRYPT and it fails on debian 11.
+  # This is also disabled in github.com/zopefoundation/AuthEncoding commit
+  # fbbdcf3 (Allow the CRYPT test to fail as it is the case on GHA., 2021-04-08)
+  import AccessControl.AuthEncoding
+  def setUp(self):
+    self._original_AuthEncoding_schemes = AccessControl.AuthEncoding._schemes[::]
+    AccessControl.AuthEncoding._schemes = [s for s in AccessControl.AuthEncoding._schemes if s[0] != 'CRYPT']
+  AccessControl.tests.testPasswordDigest.setUp = setUp
+  def tearDown(self):
+    AccessControl.AuthEncoding._schemes = self._original_AuthEncoding_schemes
+  AccessControl.tests.testPasswordDigest.tearDown = tearDown
   suite.addTest(AccessControl.tests.testPasswordDigest.test_suite())
   import AccessControl.tests.testPermissionMapping
   suite.addTest(AccessControl.tests.testPermissionMapping.test_suite())