The use case would be:
- user accesses PWM website
- user prompted for time-based password code [instead of verification steps like Q/A]
- user gets time-based code from OTP/Google Authenticator app
- user inputs code to PWM website
- user granted access and allowed to reset directory password
(this assumes the OTP secret key is already in the directory, or in the PWM database somewhere - can deal with enrollment and key storage separately)
From my read through the documentation, I'm assuming no. So the follow up question is if the PWM system were to check with some OTP calculation component, how would that be accomplished? I'm willing to code the implementation if necessary, I just need some pointers of how to accomplish this properly within the framework?
Enrollment would be a separate discussion - OTP secret key could be built into the enrollment process, the Google Authenticator style system lets a QR code be generated for easy photo scanning into a mobile app. However - for purposes of this discussion, I'd like to focus on the verification part first, and deal with enrollment later.
Appreciate your help folks!!
Regards,
Menno
--
You received this message because you are subscribed to the Google Groups "pwm-general" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pwm-general...@googlegroups.com.
To post to this group, send email to pwm-g...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/pwm-general/f92c56ee-e0f7-4435-bff1-41eb621e029e%40googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--
You received this message because you are subscribed to the Google Groups "pwm-general" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pwm-general...@googlegroups.com.
To post to this group, send email to pwm-g...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/pwm-general/eda875bf-279b-49b4-910e-2e9a07eb6314%40googlegroups.com.
- no Secret Key registration is present (this is handled by PWM)
- the dependency on com.novell.nidp.common.util.obfuscation is removed. Instead I implemented the PWM logic for decryption of the OTP secret that is stored in eDir.
- Added more properties on the Local Authetication Class. I.e. you can now define the PWM Security Key inside your NAM Admin Console
Any chance to have OTP also for user logins? Currently users cannot protect from someone getting credentials this way or another. Being able to login to pwm means, someone could change password, security questions etc. locking out the legit user. Many users do not undertsand why OTP doesnt work once setup for login. Personally I share that view. I think once setup OTP should be also enabled for login.
Additionally, even with OTP setup, when reseting password and having email or security questions enabled, user can choose which one he perefers, rendering OTP userless if attacker knows security questions or took over email.
Paul Hodgdon
Principal Consultant | Identity Works LLC
Epping | New Hampshire
03042 | USA
+1 603 661 1508 (mobile) | +1 603 734 2681 (office)
www.identityworksllc.com
Yes this is a real issue in enterprise environments, any idea on how to fix this?
On Sunday, June 30, 2019 at 7:44:46 PM UTC+2 foosa...@gmail.com wrote:
--
You received this message because you are subscribed to the Google Groups "pwm-general" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pwm-general...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/pwm-general/59a9ced4-f4b3-499d-b910-6ceeafa421e9n%40googlegroups.com.