<div>ERROR org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator - Exception in Authentication Frameworkorg.wso2.carbon.identity.application.authentication.framework.exception.FrameworkException: No authenticator can handle the request in step : 1</div><div></div><div></div><div></div><div></div><div></div><div>inwebo authenticator 6 download for pc</div><div></div><div>Download File:
https://t.co/NFlQdVDxoC </div><div></div><div></div><div>Your second factor can either be inserted on the authenticator as described right before, or be implemented on the user DB (the LDAP server). Either of these nodes must be compatible with setting a second factor and asking for an answer, prior sending a final response to the end user.</div><div></div><div></div><div>Hello there, i opened a ticket for this error and i was refered to create a thread here here by the Tech Specialist Game Masters. I will copy/paste some of the stuff i posted and replied to my ticket down bellow, hoping for a fix or suggestion on how to make the authenticator work on my new phone.</div><div></div><div></div><div>I was having the same issue on my new device (Samsung s20) what I was assuming is some sort of bug preventing the authenticator to switch between devices and I decided to give a try to this solution even at the risk of being unprotected for a wile until the issue gets fixed.</div><div></div><div>I can confirm that in my case login in to my blizzard account, disabling the authenticator and setting up auth app fresh just worked fine.</div><div></div><div></div><div>I can in fact confirm that this worked!</div><div></div><div>Using the sms protection for the authentications needed, i detached the authenticator from my account on
blizzard.com, started the setup process on my blizzard authentication app and everything worked as intended !</div><div></div><div>Thank you sirPapaya .</div><div></div><div></div><div></div><div></div><div></div><div></div><div>What I would do is create a custom authentication scheme that collects the user credentials and have the custom auth scheme codes call the third party authenticator's API for verification. Depending on the responses returned, then the auth scheme will return either "SmAuthStatus.SMAUTH_REJECT" or "SmAuthStatus.SMAUTH_ACCEPT". That will have the SMSESSION created and given to the browser. And it gives me a lot more control over how things goes.</div><div></div><div></div><div>First- We will have to have to find a way to keep track of the initial target through all of this, which can be a challenge. We have done it for other processes, so we are pretty confident we can do it here too. Authenticate the user first using UN/PW with a target of the MFA type of your choice, the MFA target should be protected so we can ensure the user has authenticated at the lower level, and to allow for headers to be sent to it, so we can determine things like what types of authenticators the user has registered. At that point, let the third party authenticator applications do their thing, and when complete, create and send a JWT and return an smsession at the higher security level. (We will be looking at both Authenticator applications like MS/Google authenticator as well as some WebAuthN authenticators which can support Security Keys, and built-in bio-metrics like fingerprint scanners, windows hello, etc.)</div><div></div><div></div><div>If the JWT authentication scheme can in fact be used to do this type of step-up, it basically breathes new life into a product that is seriously lacking in support for modern authenticators. Fingers crossed.</div><div></div><div> dafc88bca6</div>