Learn how to build a production-ready Email OTP authentication node in ForgeRock AM 7.x using the RFC 4226 HOTP algorithm. Includes complete Java source, Maven project, SMTP delivery with TLS, rate limiting, and JUnit 5 tests validating all RFC test vectors.

https://iamdevbox.com/posts/building-an-email-otp-node-hotp-example-and-email-sending-configuration-in-forgerock-am/?utm_source=mastodon&utm_medium=social&utm_campaign=blog_post

#ForgeRock #ForgeRockAM #EmailOTP #HOTP #TwoFactorAuthenticat

Building an Email OTP Node: HOTP Example and Email Sending Configuration in ForgeRock AM

Learn to build an Email OTP node using HOTP in ForgeRock Access Management. Discover how to configure email sending for secure authentication. Dive in now!

IAMDevBox
PSA for those implementing #rfc6238: READ THE ERRATA! Maybe even before reading the RFC itself. I wasted an entire day chasing my tail because the RFC contained incorrect test vectors.
#IETF #RFC #openSource #programming #totp #hotp

#xsukax Secure #Authenticator

https://github.com/xsukax/xsukax-Secure-Authenticator

Demo: https://xsukax.github.io/xsukax-Secure-Authenticator/

A privacy-focused, #client-side #two-factor authentication (2FA) application that generates Time-based One-Time Passwords (TOTP) and #HMAC-based One-Time Passwords (HOTP) entirely within your browser. No server communication, no tracking, complete control over your authentication codes.

#totp #hotp

I have posted the initial version for the analysis on 'are #HOTP #zeroknowledge proofs'.
Although the blog post is not very mathematical in nature, I seem to have covered all relevant aspects. Previous social media posts covered the gist, but there is more detail present in the blog post.

https://dannyvanheumen.nl/post/analysis-are-hotp-zero-knowledge-proofs/

#zeroknowledgeproof #security #computerscience #MFA

Analysis: are HOTP-based one-time passwords zero-knowledge proofs? · Timelessness

Intuitive explanation for #zeroknowledge #zeroknowledgeproof analysis for #HOTP #MFA principle.

#security #analysis

Behind the 6-digit code: Building HOTP and TOTP from scratch

A while ago, I have started working on authorization and authentication at work. This taught me a lot about how modern authentication systems work. However I have always thought One-Time Password logins are the most mystical ones. A six-digit code that changes every time and can be used to verify

Dogac.dev

Are you happy with current #TOTP #HOTP mobile apps out there? #authy #google #microsoft #freeotp.

#ios #android #app

If you see a new or want to try a new unknown #TOTP #authenticator #passwordManager what factors you look for.

1. Open Source app.
2. At least core open source.
3. I try evaluate mostly features matter.
4. I love #BigTech, don't care #SmallTech.

Need some inputs selecting a different #authenticator #password #PasswordManager, any help I really appreciate.

Thanks.

I'm looking for a good overview/comparison of different #MFA/#2FA or #PasswordLess authentication protocols.

The recent #Fido2 #MitM risk made me aware that I need to learn more.

Pointers and #BoostWelcome

#fedipower #wisdomOfTheCrowd #FollowerPower

As the best way to get an answer on the internet, is to state something wrong, let's try this 😜

#FIDO and FIDO2 are actually a whole set of (related?) protocols.
FIDO includes FIDO #UAF (Universal Authentication Framework) and FIDO #U2F (Universal Second Factor).

FIDO2 is the "successor" of FIDO and consists of two parts.
#WebAuthn and #CTAP (Client to Authenticator Protocol). From the name I would guess that WebAuthn is for web stuff (requiring browser support) and CTAP is for IT infrastructure stuff (???)

#Passkey is based on #Fido2
Other related concepts or protocols are #OTP (one-time passwords), #TOTP (Time-based One-time Password) and #HOTP (“H” in HOTP stands for Hash-based Message Authentication Code (HMAC))

Not sure how #SmartCards play into this.

And not sure which of these methods would work for an offline authentication login into your laptop (and ideally also as key for whole disk encryption)

Authenticator app? What's that? I use the terminal 🔥

🔒 **cotp**: Trustworthy and encrypted TOTP/HOTP authenticator with a TUI.

🚀 Supports importing (e.g. from Aegis, Authy, Google Authenticator, etc.)

🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: https://github.com/replydev/cotp

#rustlang #ratatui #tui #totp #hotp #authentication #auth #encryption

GitHub - replydev/cotp: Trustworthy, encrypted, command-line TOTP/HOTP authenticator app with import functionality.

Trustworthy, encrypted, command-line TOTP/HOTP authenticator app with import functionality. - replydev/cotp

GitHub
#Shaarli: GitHub - beemdevelopment/Aegis: A free, secure and open source app for Android to manage your 2-step verification tokens. - Application mobile d'authentification double facteur (2FA).
Permet d'importer les jetons depuis d'autres applications (accès root) et de sauvegarder automatiquement les jetons. : https://github.com/beemdevelopment/Aegis #totp #hotp #2fa
GitHub - beemdevelopment/Aegis: A free, secure and open source app for Android to manage your 2-step verification tokens.

A free, secure and open source app for Android to manage your 2-step verification tokens. - beemdevelopment/Aegis

GitHub