Previous Topic: ArcotID OTP-Based FlowsNext Topic: ArcotID OTP Roaming Flow


ArcotID OTP Only Flow

This section lists the steps for ArcotID OTP authentication.

Note: For detailed information about the back-end operations that take place when an end user tries to access a protected resource, see How Advanced Authentication Flows Work.

Prerequisites:

This flow is based on the following configurations:

The Flow:

  1. In a browser window, the end user attempts to access a protected resource.
  2. On the login page, the end user is prompted for their user name and OTP.
  3. The end user accesses the ArcotID OTP application installed on their smart phone or system, authenticates to it with their PIN, and then generates an OTP.
  4. The end user then returns to the login page in the browser, enters the user name and OTP, and clicks Submit.
  5. The Advanced Authentication server verifies the OTP.
  6. If OTP verification is successful, then the end user is granted access the resource.