An OATH OTP Token authentication policy can be used to specify the following attributes related to OATH OTP-based authentication:
Note: If the user status check is enabled, then the authentication for users in inactive state results in failure.
Follow these steps:
Policy Configurations
If you choose to create a new policy, then:
If you choose to update an existing policy, then select the policy that you want to update from the Select Configuration list that appears.
Enable this option if you want to create the policy by copying the configurations from an existing policy.
Note: You can also copy from configurations that belong to other organizations that you have scope on.
Select the policy from which the configurations will be copied.
Specify the number of times the OATH OTP counter on the CA AuthMinder Server is increased to verify the OATH OTP entered by the user. The OATH OTP entered by the user is compared with all the OATH OTPs that are generated from current count - Authentication Look Back Count to current count + Authentication Look Ahead Count on the server, and if the OATH OTP entered by the user matches, then the user is authenticated.
Note: If the client and server OATH OTP matches, then that count is set as the current count on the server.
Specify the number of times the OATH OTP counter on the CA AuthMinder Server is decreased to verify the OATH OTP entered by the user.
The OATH OTP entered by the user is compared with all the OATH OTPs that are generated from current count - Authentication Look Back Count to current count + Authentication Look Ahead Count on the server, and if the OATH OTP entered by the user matches, then the user is authenticated.
Note: If the client and server OATH OTP matches, then that count is set as the current count on the server.
Specify the number of times the OATH OTP counter on the CA AuthMinder Server is increased to synchronize with the OATH OTP counter on the client device.
To synchronize the client and the server OATH OTPs, the user has to provide two consecutive OATH OTPs and if these OATH OTPs match with the consecutive server OATH OTPs in the lookup range (count - Synchronization Look Back Count to current count + Synchronization Look Ahead Count), then the server counter is synchronized with the count corresponding to the second OATH OTP entered by the user.
Specify the number of times the OATH OTP counter on the CA AuthMinder Server is decreased to synchronize with the OATH OTP counter on the client device.
To synchronize the client and the server OATH OTPs, the user has to provide two consecutive OATH OTPs and if these OATH OTPs match with the consecutive server OATH OTPs in the lookup range (count - Synchronization Look Back Count to current count + Synchronization Look Ahead Count), then the server counter is synchronized with the count corresponding to the second OATH OTP entered by the user.
Specify the number of failed attempts after which the OATH OTP will be locked.
Select this option if you want to verify whether the user status is active, before authenticating them.
Advanced Configurations
Issue Warning
Specify the number of days before the warning is sent to the calling application about the user’s impending credential expiration.
Allow Successful Authentication
Specify the number of days for which the users can use an expired credential to successfully log in.
Enable Automatic Credential Unlock
Select this option if you want the credential to be automatically unlocked after the time you specify in the following field.
This field is valid only if you specify the corresponding value in the Lockout Credential After field.
Note: The credential does not get automatically unlocked after the unlock period. The credential has to be used for successful authentication after the unlock period to get it unlocked.
Unlock After
Specify the number of hours after which a locked credential can be used again for authentication.
The CA AuthMinder Server acts as a proxy and passes the authentication requests to other authentication servers, based on the following conditions:
See "Configuring CA AuthMinder as RADIUS Proxy Server" for more information to enable this feature.
If you want the users to authenticate with the particular OATH OTP credential, then enter the name of its usage type in this field.
If you do not specify the usage type, then the usage type mentioned in the default OATH OTP authentication policy is used.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|