To ensure that the system does not process invalid data, to enforce business rules, and to ensure that user input is compatible with internal structures and schemas, AuthMinder Server validates the data that it receives from the APIs. The following table explains the criteria that the AuthMinder Server uses to validate this input data:
Note: Attribute length mentioned in the following table corresponds to the character length.
|
Attribute |
Parameter Name |
Validation Criteria |
|---|---|---|
|
Protocol Status |
PROTOCL_STATUS |
Checks for the following values:
|
|
Port Number |
PORT_NUMBER |
Length is between 1 and 65535 characters. |
|
Port Type |
PORT_TYPE |
|
|
Client Root ID |
CLIENT_ROOT_ID |
Checks with a set of client root IDs |
|
Server Certificate chain encoding |
SERVER_CERT_CHAIN_ENCODING |
|
|
Server Certificate Chain |
SERVER_CERT_CHAIN |
Server certificate chain is valid. |
|
Client Certificate Chain |
CLIENT_CERT_CHAIN |
Client certificate chain is valid. |
|
Client Root CA Certificate |
CLIENT_ROOT_CA_CERT |
Client root CA certificate is valid. |
|
Server Root CA Certificate |
SERVER_ROOT_CA_CERT |
Server root CA certificate is valid. |
|
Client Root CA Certificates Count |
CLIENT_ROOT_CA_CERT |
Checks the count of CA certificates is non-zero. |
|
Client Root ID |
CLIENT_ROOT_ID |
Checks with a set of client root IDs. |
|
Server Certificate Chain Encoding |
SERVER_CERT_CHAIN_ENCODING |
|
|
Server Certificate Chain |
SERVER_CERT_CHAIN |
Server certificate chain is valid. |
|
Client Certificate Chain |
CLIENT_CERT_CHAIN |
Client certificate chain is valid. |
|
Client Root CA Certificate |
CLIENT_ROOT_CA_CERT |
Client root CA certificate is valid. |
|
Server Root CA Certificate |
SERVER_ROOT_CA_CERT |
Server root CA certificate is valid. |
|
Client Root CA Certificate count |
CLIENT_ROOT_CA_CERT |
Checks the count of CA certificates is non-zero. |
|
Server Private Key Encoding |
SERVER_PRIVATE_KEY_ENCODING |
|
|
Locale Name |
LOCALE_NAME |
|
|
Client Root CA Path |
CLIENT_ROOT_CA_PATH |
Client root CA path is non-empty. |
|
Server ID |
SERVER_ID |
|
|
Client Root CA Certificate Encoding |
CLIENT_ROOT_CA_CERT_ENCODING |
|
|
Certificate Common Name |
CERT_COMMON_NAME |
|
|
Certificate Country Name |
COUNTRY_NAME |
|
|
Certificate Organization Name |
ORG_NAME |
|
|
Certificate Organization Unit Name |
ORG_UNIT_NAME |
|
|
Certificate State Name |
STATE_NAME |
|
|
Certificate Locality Name |
LOCALITY_NAME |
|
|
Certificate Start Date |
START_TIME |
Checks for valid date format. |
|
Certificate End Date |
END_TIME |
Checks for valid date format. |
|
PKI Certificate |
PKI_CERTIFICATE |
PKI certificate is valid. |
|
PKI Key |
PKI_KEY |
PKI key is valid. |
|
Certificate Chain and Key Pair |
PRIVATE_KEY_PAIR |
Certificate chain and key pair are valid. |
|
PKCS12 Certificate Chain |
PKCS12_CERT_CHAIN_KEY |
PKCS12 certificate chain is valid. |
|
PKCS7 Certificate Chain |
PKCS12_CERT_CHAIN_KEY |
PKCS7 certificate chain is valid. |
|
User ID |
USER_ID |
Minimum value of user ID must be greater than 1. |
|
Group ID |
GROUP_ID |
Minimum value of group ID must be greater than 1. |
|
Create Time |
CREATE_TIME |
Checks for valid date format. |
|
Last Modified Time |
LAST_MODIFIED_TIME |
Checks for valid date format. |
|
Start and End Date |
START_END_DATES |
Start date < End date. |
|
User Attribute Name |
USER_ATTR_NAME |
User Attribute Name is non-empty. |
|
WebFort organization name (checks for the organization name is ‘\n’, else validate) |
ORG_NAME |
|
|
User Existence Check |
USER_EXISTENCE_CHECK |
Value of user existence check is 0 or 1. |
|
User Active Check |
USER_ACTIVE_CHECK |
Value of user active check is 0 or 1. |
|
Kerberos User Name |
KERBEROS_USER_NAME |
|
|
Kerberos Domain Name |
KERBEROS_DOMAIN_NAME |
|
|
Kerberos Password |
KERBEROS_PASSWORD |
|
|
Authentication User Password |
AUTH_USER_PASSWORD |
|
|
Password Maximum Length |
PWD_MAX_LENGTH |
|
|
Password Minimum Length |
PWD_MIN_LENGTH |
|
|
Password Minimum Special Character Length |
PWD_SPECIAL_CHAR_MIN_LENGTH |
|
|
Password Minimum Alphabetic Character Length |
PWD_ALPHA_CHAR_MIN_LENGTH |
|
|
Password Minimum Numeric Character Length |
PWD_NUMERIC_CHAR_MIN_LENGTH |
|
|
Password Strength Configuration |
PASSWORD_STRENGTH |
Password strength attribute length must be less than the password length. |
|
Question |
AUTH_QUESTIONS |
|
|
Answer |
AUTH_ANSWERS |
|
|
Number of Questions |
NUM_OF_QNA |
|
|
Number of Questions to Ask |
QNA_NUM_QUESTION_TO_ASK |
|
|
Minimum Number of Correct Answers Required |
QNA_MIN_ANS_REQUIRED |
|
|
QnA Maximum Questions |
MAX_QUESTIONS |
|
|
QnA Minimum Questions |
MIN_QUESTIONS |
|
|
QnA Challenge Timeout in Seconds |
QNA_CHALLENGE_TIMEOUT_SECS |
QnA challenge timeout in seconds must be between 1 and 7200. |
|
Plain Key Type |
PLAIN_KEY_TYPE |
|
|
Arcot Key Type |
ARCOT_KEY_TYPE |
|
|
Plain Key Length |
PLAIN_KEY_LENGTH |
Plain key length value must be between 512 and 4096. |
|
Arcot Key Length |
ARCOT_KEY_LENGTH |
Arcot key length is between 512 and 4096. |
|
ArcotID Challenge Timeout in Seconds |
ARCOTID_CHALLENGE_TIMEOUT_SECS |
The ArcotID PKI challenge timeout in seconds is between 1 and 7200. |
|
ArcotID Unsigned Attribute Key Check |
AID_UNSIGNED_ATTRIB_KEY |
Unsigned attribute key is either USERID or ORG. |
|
Warning Period in Days |
WARNING_PERIOD_DAYS |
Warning period in days is greater than 0. |
|
Grace Period in Days |
GRACE_PERIOD_DAYS |
Grace period in days is greater than 0. |
|
Auto Unlock Period in Hours |
AUTO_UNLOCK_PERIOD_HOURS |
Auto-unlock period in hours is greater than 0. |
|
Authentication OTT Token |
AUTH_OTT_TOKEN |
|
|
OTT Length |
OTT_LENGTH |
Value of OTT length is between 5 and 240. |
|
OTT Timeout in Seconds |
OTT_TIMEOUT |
Value of OTT timeout in seconds is between 1 and 172800. |
|
OTP Length |
OTP_LENGTH |
Value of OTP length is between 4 and 64. |
|
OTP Type |
OTP_TYPE |
Checks for numeric and alphanumeric values. |
|
OTP Multiple Usage Count |
OTP_MULTIPLE_USAGE_COUNT |
Multiple usage count of OTP is between 1 and 99999. |
|
Global Authentication Token Timeout in Seconds |
GLOBAL_AUTH_TOKEN_TIMEOUT_SECS |
Global authentication token timeout in seconds is between 1 and 172800. |
|
Maximum Strikes |
MAX_STRIKES |
Maximum strike count is between 1 and 100. |
|
Transaction Algorithm ID |
TRANSALGO_ID |
Checks for the following values:
|
|
Organization Credential Configuration Name |
ORG_CRED_CONFIG_NAME |
Organization credential configuration name is non-empty. |
|
ArcotID Credential Configuration Name |
ARCOTID_CRED_CONFIG_NAME |
|
|
OTP Credential Configuration Name |
OTP_CRED_CONFIG_NAME |
|
|
QnA Credential Configuration Name |
QNA_CRED_CONFIG_NAME |
|
|
Password Credential Configuration Name |
UP_CRED_CONFIG_NAME |
|
|
ArcotID Authentication Policy Name |
ARCOTID_AUTH_POLICY_NAME |
|
|
OTP Authentication Policy Name
|
OTP_AUTH_POLICY_NAME |
|
|
QnA Authentication Policy Name
|
QNA_AUTH_POLICY_NAME |
|
|
Password Authentication Policy Name
|
PASSWORD_AUTH_POLICY_NAME |
|
|
General Authentication Policy Name
|
GENERAL_AUTH_POLICY_NAME |
|
|
RADIUS Authentication Policy Name
|
RADIUS_AUTH_POLICY_NAME |
|
|
Kerberos Authentication Policy Name
|
KERBEROS_AUTH_POLICY_NAME |
|
|
Mechanism Name |
MECHANISM_NAME |
|
|
Mechanism Status |
MECHANISM_STATUS |
Checks for the following values:
|
|
Radius Client IP Address |
RADIUS_CLIENT_IP |
|
|
Radius Client Shared Secret |
RADIUS_ClIENT_SHARED_SECRET |
|
|
Radius Client Description |
RADIUS_CLIENT_DESC |
|
|
Radius Client Authentication Type |
RADIUS_CLIENT_AUTH_TYPE |
|
|
Radius Client Maximum Chunk Size |
RADIUS_CLIENT_MAX_CHUNK_SIZE |
RADIUS client maximum chunk size is between 50 and 200. |
|
Radius Version |
RADIUS_VERSION |
Checks for the following values:
|
|
Duplicate Question and Answers |
DUPLICATE_QUESTION_AND_ANSWER |
|
|
Token Type |
AUTH_TOKEN_TYPE |
Checks for the following values:
|
|
Configuration Name |
CONFIG_NAME |
|
|
Pin |
PIN |
|
|
OTP Maximum Length |
OTP_MAX_LENGTH |
OTP maximum length is between 4 and 64. |
|
OTP Minimum Length |
OTP_MIN_LENGTH |
OTP minimum length is between 4 and 64. |
|
Last Strike Time |
LAST_STRIKE_TIME |
Checks for valid date format. |
|
Last Failed Time |
LAST_FAILED_TIME |
Checks for valid date format. |
|
Last Succeeded Time |
LAST_SUCCEEDED_TIME |
Checks for valid date format. |
|
Credential Status |
CRED_STATUS |
Checks for the following values:
|
|
Certificate Serial Number |
CERT_SERIAL_NUMBER |
|
|
Password Minimum and Maximum Length |
PWD_MIN_LENGTH |
Password minimum length is lesser than password maximum length. |
|
QnA Minimum and Maximum Questions |
MIN_QUESTIONS |
QnA minimum questions is lesser than QnA maximum questions. |
|
Questions and Correct Answers |
QNA_NUM_QUESTION_TO_ASK |
Number of correct answers is lesser than number of questions. |
|
Host Name |
HOST_NAME |
|
|
URI |
URI_NAME |
|
|
Connection Timeout |
CONNECTION_TIMEOUT |
Connection timeout is between 0 and 2147483647. |
|
Read Timeout |
READ_TIMEOUT |
Read timeout is between 0 and 2147483647. |
|
Idle Timeout |
IDLE_TIMEOUT |
Idle timeout is between 0 and 2147483647. |
|
Minimum Connections |
MIN_CONNECTIONS |
Minimum connections is between 0 and 2147483647. |
|
Maximum Connections |
MAX_CONNECTIONS |
Maximum connections is between 0 and 2147483647. |
|
WebFort Event ID |
WF_EVENT_ID |
Checks for the set of valid events. |
|
Instance name |
INSTANCE_NAME |
|
|
Log Level |
LOG_TXN_LOG_LEVEL |
Minimum database connections is between 1 and 3. |
|
Minimum DB Connections |
MIN_DB_CONNECTIONS |
Minimum database connections is between 1 and 128. |
|
Maximum DB Connections |
MAX_DB_CONNECTIONS |
Maximum database connections is between 1 and 512. |
|
Maximum DB Connections Against Minimum |
MAX_DB_CONNECTIONS |
Maximum database connections are less than minimum database connections. |
|
Increment DB Connections |
INC_DB_CONNECTIONS |
|
|
ArcotID Unsigned Attribute Key (No validation on value) |
AID_UNSIGNED_ATTRIB_KEY |
Attributes with name USERID and ORG are not allowed because these are created while creating ArcotID PKI. Therefore, these values cannot be modified. |
|
Custom Attributes |
NOTES_KEY/ NOTES_VALUE/ NOTES |
|
|
SSL Trust Store Group Name |
SSL_TRUST_STORE_GROUP_NAME |
|
|
Minimum Threads |
MIN_THREADS |
Minimum thread count is between 1 and 1024. |
|
Maximum Threads |
MAX_THREADS |
Maximum thread count is between 1 and 1024. |
|
Threads Minimum and Maximum Count |
MIN_THREADS |
Minimum thread count is less than maximum thread count. |
|
Additional Input |
ADDITIONAL_INPUTS_NAME |
Does not contain invalid characters (ASCII 0-31). |
|
Server Statistics Option |
STATS_OPTION |
Checks for the following values:
|
|
Numeric Instance Attribute |
parameterName that is passed to the function |
Checks only if the numeric instance attributes are used. |
|
Display Name |
DISPLAY_NAME |
|
|
Logo URL |
LOGO_URL |
Checks if the URL format is valid. |
|
Password Challenge Validity |
PASSWORD_CHALLENGE_TIMEOUT_SECS |
Password challenge validity is between 1 and 7200. |
|
ArcotID Card Name |
AUTH_CARD_NAME |
|
|
Duplicate Questions |
DUPLICATE_QUESTIONS |
Questions are not duplicate. |
|
Duplicate Answers |
DUPLICATE_ANSWERS |
Answers are not duplicate. |
|
Partial password Length |
PARTIAL_PWD_LENGTH |
Partial password length is between 0 and 64. |
|
QnA Shuffle Mode |
QNA_SHUFFLE_MODE |
Checks for the following values:
|
|
QnA Shuffle Flag |
QNA_SHUFFLE_FLAG |
Checks for the following values:
|
|
QnA Return Mode |
QNA_RETURN_MODE |
Checks for the following values:
|
|
OATH One-Time Password Length |
OATH_OTP_LENGTH |
OATH One-Time Password length is between 4 and 32. |
|
OATH One-Time Password Token Type |
OATH_OTP_TYPE |
Checks for the following values:
|
|
OATH One-Time Password Authentication Look Ahead Count |
OATH_OTP_AUTH_LOOK_AHEAD |
OATH One-Time Password Authentication look ahead count is between 0 and 99999. |
|
OATH One-Time Password Authentication Look Back Count |
OATH_OTP_AUTH_LOOK_BACK |
OATH One-Time Password Authentication look back count is between 0 and 99999. |
|
OATH One-Time Password Synchronization Look Ahead Count |
OATH_OTP_RESYNC_LOOK_AHEAD |
OATH One-Time Password Synchronization look ahead count is between 0 and 99999. |
|
OATH One-Time Password Synchronization Look Back Count |
OATH_OTP_RESYNC_LOOK_BACK |
OATH One-Time Password Synchronization look back count is between 0 and 99999. |
|
Copyright © 2013 CA.
All rights reserved.
|
|