Token Generator Free

0 views
Skip to first unread message

Earlie Schwoyer

unread,
Aug 5, 2024, 6:16:58 AM8/5/24
to queedoglofes
Justto clarify I'm not looking for any random string generator, the random string has to be generated from the users details available through Javascript and can also use time to avoid potential conflicts!

According to a performance test, this method also outperforms the accepted answer by a small margin. Moreover it provides a parameter n to generate any size token length from a white list of acceptable characters. It's flexible and performs well.


It is very unlikely, but Math.random() could return 0.0. In that case, the solution of pimvdb would return "" (empty string). So, here is another solution, which returns in every case a random base36 with 10 chars length:


The Fateful Force hopes to provide the RPG community with valuable battle resources including, a free to use VTT token maker/generator, battle maps and fantasy art for your DnD, Pathfinder and other popular online role-playing games. We hope these free resources make your lives as Players and Dungeon Masters easier.


At work, years ago, I used to have a key-fob device that was about the size of a thumb-drive. It had a 4 digit LCD screen that the numbers changed every 60 seconds. When logging onto certain servers, after entering my user ID and password, it would prompt me for the 4 digit passcode.


But I doubt any of those are right. Any ideas how that was handled? I was always nervous about using a number that was about ready to expire. I don't remember if I had to push a button on the key-fob to get a code. I do remember it being fairly unreliable; worked about 80% the first try.


If it's used semi-regularly (e.g. every few weeks), you only have to account for the amount of drift that can happen in a few weeks. Whenever you use a code, based on time and a secret key, to log in, the server first checks the accurate time code.


If the code for now doesn't match, it can trivially generate one cycle in to the future, and one into the past. If either of these match, we can be fairly certain that the clock of the token has drifted over a threshold. This fact is stored, as a offset. If the token is sending back replies that is 60 seconds late, we store that, and next time we try with that as the baseline.


Lather, rinse, repeat if token continues to drift. It does not allow huge drifts, but based on the number of codes in the past or future you accept, you can accommodate for as much drift as you need. It will weaken security a tiny bit.


Wikipedia says cheap quartz clocks approach 6ppm accuracy. Thus, we can expect them to be within 60 seconds of the server for at least 115 days. If we check two codes backwards and forwards, it can go for well over 200 days.


You need to seed an unpredictable sequence based algorithm with a secret shared value and either the time or your counter. hash(time . secret) or such. Using SHA-256 and chopping off some bits would be effective.


A unified token is a token that provides equivelent authentication for all users. That is even if there are multiple physical devices, any user may use any physical device for authentication. This is convenient for support, but weak for authentication. On the other hand a per-user token may only be used by a specified user. Each user must be uniquely assigned to a different physical token device. If the user looses or damages the device the user must be assigned to a new physical device. Per-user provides stronger authentication, but operational support is more expensive.


There are some critical parameters such as delay between failed authentication and next authentication prompt. This fail delay helps protect against online attacks where the attacker has obtained the username and password, but does not have a valid token device. Another parameter is the number of failed attempts until the account is temporarily disabled. Adding the the previous setting is the temporary disabled time. That is how long after n failed attempts should the account be temporarily disabled.


Since the token device is an authentication component, the token device will be a tempting target for attackers. If you are thinking of using a mobile phone or smart phone, you need to think about how you will protect the token generating software from attempts to monitor or disrupt it. If your device is a custom device, what communication channels will it have (USB, Ethernet, RS-232) and how will those enable an attacker to analyze or modify the device?


You want to create a one-time password by hashing a key and counter (or timestamp). The token generator hashes the key and counter, truncates the result into 6 characters, and increments the counter. The server does the same to compare.


Generating the token is the easy part; authenticating securely and reliably with that token is trickier. Duo Security has open source clients for use with our two-factor service, and they might be useful for reference. Disclaimer, I am a Duo employee.


I would second looking into OATH, Google Authenticator uses it, as well as YubiKey. Actually, YubiKeys can be programmed to do a few different algorithms, as well as TOTP with a helper Windows application.


This system allows you to request a token from a Twitch user via a link. Using the scopes you selected, a link will be generated. You can share the link with a streamer or Twitch user. After they approve, their Twitch token will be emailed to you. Please provide your Twitch name and email address below.


I'm currently hoping to find something similar to this which is for infinity : -dice.ghostlords.com/markers/



I doubt i'm going to find anything for Malifaux though since there isn't really a specific 'look' for tokens etc other than what people decide to use.





Might come down to a more DIY design approach for printable tokens.


We've been having some issues lately with a few third-party applications that we believe are tracing back to issues generating portal tokens. We're doing some manual testing using the generateToken URL of our portal ( ) and getting results that seem odd (at least to me)


So we have Enterprise 10.8.1, installed on a single machine with web adaptors installed on a server in the DMZ. when I go to the above link on my local machine I'm able to enter credentials for myself, other users, the third-party tester, etc and successfully generate a token. The third-party tester attempted to use their credentials while on a virtual machine and could not generate a token. I tried to replicate their work flow and I also could not generate the token from the VM. I've since tried multiple combos of information (different username/passwords, client choices) on many different VMs, all with no success.


I've also created a built-in Portal user (all other users coming from Active Directory), and got the same results, success on local machine, errors on virtual machines. I've also tried on other devices (tablet, phone) and couldn't get the token there either.


So far this seems to be affecting only third-party apps that attempt to get data or run processes against services on our ArcGIS Server. It also is a relatively recent problem - both of the above mentioned third-party apps have had no issues until 2ish months ago. Looking for any input on what could be the issue, thanks!


LinkedIn's Developer Portal has a token inspector tool to make token validation as simple as copy and paste. The same Token validation is available through the API or the UI. The OAuth 2.0 token inspector is accessible from the developer portal under "Docs and Tools" in the navigation bar.


The tool requires you to select a developer application either from a dropdown or by entering the client ID if you have more than 10 developer applications. Make sure you have created at least one developer application or have been added as an Admin team member to a developer application before using the tool. You may only inspect tokens generated by the selected developer application.


JSON Web Tokens (JWTs), colloquially known as "jots", are the best thing since sliced bread in the identity developer space. Well, maybe that's stretching it a bit far, but they are fairly simple to work with when it comes to deserializing, passing around, and general dev friendliness compared to legacy formats. For cloud developers it's extra useful because it does not rely on things like being on the same corporate network as classic Active Directory Kerberos tickets prefer.


The first part of working with JWTs is acquiring the token. This usually involves an authentication "dance" where you need to interact with an identity provider either interactively or programmatically. This blog being themed around Microsoft means that provider will frequently be Azure AD, Azure AD B2C, or ADFS for that matter. It's all standards though, so if you rely on Google or Facebook instead it will be similar.


When developing code relying on identities it can be a hassle setting up demo accounts and all, and even if we assume there are no problems in doing so it can be annoying typing in passwords and stepping through debuggers to retrieve the token when all you want is a "simple test token".


A quick search might lead you to , and that is a good site for that purpose. The code is on GitHub as well so no complaints on my part there. Well, apart from the fact that it's done with NodeJS and things :)


Behind the scenes a certificate is used for signing the token, so in case you want to mock the validation in an API (which is part of the purpose for this tool) the necessary OpenID Connect metadata endpoints are exposed as well:


The app runs on both Windows and Linux (and Docker-based variants of these), but since certificate handling is different between the two platforms the code branches based on setting the HostEnvironment variable to "Windows" or "Linux".


The app has templates for Azure AD and Azure AD B2C tokens in addition to a generic token not specific to any identity provider. If you test the tokens at they will be interpreted as intended - the AAD-templates will generate tokens identified as being sourced from Azure AD.

3a8082e126
Reply all
Reply to author
Forward
0 new messages