-bash-4.1# cat /opt/radiusd/conf/openotp.conf
#
# OpenOTP configurations
#
# Server URL(s):
# OpenOTP SOAP service URL(s). This is the only mandatory setting.
# Two server URLs can be configured and separated by a comma.
# When two servers are configured, you may choose a request routing policy below.
# Request routing policy:
# Request routing policy when two server URLs are defined.
# Ordered: First server is preferred (default). When down, second server is used.
# Balanced: Server is chosen randomly. When down, the other is used.
# Consistent: One specific user ID is always routed to the same server (per user routing).
#server_policy = "Ordered"
# Password mode:
# 0: Let OpenOTP automatically handle passwords (default).
# 1: RADIUS Access Request transports LDAP password and Access Challenge transports OTP password.
# 2: RADIUS Access Request transports OTP password (no challenge).
# 3: RADIUS Access Request transports both LDAP and OTP passwords concatenated.
# The RADIUS password contains the LDAP password followed by the OTP password.
# Requires either password_separator or otp_length setting below.
# 4: RADIUS Access Request transports both OTP and LDAP passwords concatenated.
# The RADIUS password contains the OTP password followed by the LDAP password.
# Requires either password_separator or otp_length setting below.
# 5: RADIUS Access Request transports both user ID and OTP password concatenated.
# The RADIUS username contains the user ID followed by the OTP password.
# Requires either password_separator or otp_length setting below.
#password_mode = 0
# Password mode attribute:
# This is the RADIUS attribute in which the RADIUS client can pass a password mode and override the
# password_mode setting above. It must be a String attribute contain the value "1", "2", "3" or "4".
# By default no attribute is used.
#mode_attribute = "Called-Station-Id"
# OTP length:
# With password_mode 3 and 4, radiusd need to know the length of the OTP passwords when no
# password_separator is set in order to locate the OTP and LDAP parts in the concatenated
# password value. The otp_length and password_separator settings cannot be used at the same time.
#otp_length = 6
# Password separator:
# With password_mode 3 and 4, radiusd requires a separator character when no otp_length is set
# in order to locate the OTP and LDAP parts in the concatenated password value.
#password_separator = "+"
# Challenge suffix:
# Suffix to be added to the challenge message.
#challenge_suffix = ": "
# Default domain:
# This domain name can be used to override the default domain on the OpenOTP configuration.
#default_domain = "mydomain"
# Domain separator:
# This is the separator character to be used when the domain is provided in the username.
# For example if '\' is used then username with domain can be in the form domain\username.
# By default there is no domain sperator.
domain_separator = "\\"
# User settings:
# list of OpenOTP public settings to be passed to OpenOTP.
#user_settings = "LoginMode=LDAPOTP,OTPType=SMS"
# Settings attribute
# This is the RADIUS attribute in which the RADIUS client can pass user settings to OpenOTP.
# If the attribute is present in the RADIUS request, it will override any existing user setting
# from the user_settings setting above. Attribute must be of type String.
# By default no attribute is used.
#settings_attribute = "Filter-Id"
# Source attribute
# This is the RADIUS attribute in which the RADIUS client can pass the end user source IP address to
# OpenOTP. Attribute must be of type IPAddr.
# By default source attribute is "Login-IP-Host".
#source_attribute = "Login-IP-Host"
# Client certificate and trusted CA
#cert_file = "conf/radiusd.pem"
#cert_password = ""
#ca_file = "conf/ca.pem"
# SOAP timeout:
# This is the SOAP request TCP timeout. It should be lower than the RADIUS timeout on your RADIUS client.
#soap_timeout = 10
# Data attribute:
# This is the RADIUS attribute in which Radius Bridge will copy the content of the OpenOTP Reply Data
# attribute value. RB will also return the data value in the RADIUS response to your NAS client.
# The default data attribute is "Filter-Id".
# Note: This setting is ignored if data_is_vps is set to 'yes'.
#data_attribute = "Filter-Id"
# Data separator
# This is the separator character to be used when the multiple data are provided in the data attribute.
# Radius Bridge will create one data attributes per Reply Data in the RADIUS response.
# If no separator is specified, the Reply Data is copied to one unique data_attribute.
# Note: This setting is ignored if data_is_vps is set to 'yes'.
#data_separator = ","
# Data is value-pairs
# If set to 'yes', then the reply data is expected to contain RADIUS attribute and value pairs.
# In that case, the attributes defined in the reply data are created with their values.
#data_is_vps = no
# RADIUS reply attributes (with static value)
# This is a list of attribute and value pairs to be sent back to the RADIUS clients in Access-Accept
# packets. The syntax is the standard RADIUS value pairs (ie. attr1=value1,attr2=value2,...).
# Note: The attributes must be present in the local dictionaries (in lib/dictionaries/).
#reply_vps = "Juniper-Allow-Commands=\"XXX\",Juniper-Deny-Commands=\"YYY\""
# No success/failure message
# If set to 'yes', then no RADIUS Reply-Message attribute is sent in the Access-Success and/or
# Access-Failure response. This is useful for some broken RADIUS clients which refuse the reply
# message attributes in the Access-Request responses.
#no_success_message = no
#no_failure_message = no
# No response delay
# You can configure RB to delay its Access-Reject responses when the OpenOTP server does not respond.
# Setting a delay allows RADIUS clients to enforce a failover policy if they do not receive a RADIUS
# response within a configured timeout. Without the no_response_delay (RB default) the client gets a
# RADIUS failure response and does also not failover to a secondary server.
#no_response_delay = 15
# MS DirectAccess Probe
# Enable this setting only if you are using Microsoft VPN with DirectAccess server.
# DirectAccess check the RADIUS status via RADIUS probes which are sent to OpenOTP in Status requests.
#directaccess_probe = no
#daprobe_username = "DAProbeUser"
#daprobe_password = "DAProbePass"