<AuthBy SQLHOTP> authentication module
detects replay and brute-force attacks. It supports optional PIN, also
known as static password, for 2 factor authentication when the user
prefixes their static password before the HOTP one-time password.goodies/ directory of your Radiator distribution.<AuthBy SQLHOTP> supports the same
parameters as <AuthBy xxxxxx>. For more
information, see Section 3.32. <AuthBy xxxxxx>. It supports also
all the common SQL configuration parameters. For more information about
the SQL configuration parameters, see Section 3.8. SQL configuration.AuthSelect is an SQL query that fetches
HOTP token data from the SQL database. AuthSelect is
expected to return a number of fields that describe the token.Require2Factor is not set to disabled.DefaultDigits is be
used.%0 which is
SQL quoted when used in AuthSelect and unmodified
when used with AuthSelectParam.goodies/hotp.sql. The default is:select secret, counter_high, counter_low, active, pin, digits, bad_logins, unix_timestamp(accessed) from hotpkeys where username=%0
UpdateQuery is an SQL query that updates
the HOTP token data in the SQL database. After a successful or failed
authentication it will be passed the new authentication counter high in
%0, new authentication counter low in
%1, bad login count in %2, the user name
in %3, The default works with the sample database schema
provided in
goodies/hotp.sql.%0 and the
other formatters are SQL quoted, if needed, when used in
UpdateQuery and unmodified when used with
UpdateQueryParam.UpdateQuery is:update hotpkeys set accessed=now(), counter_high=%0, counter_low=%1, bad_logins=%2 where username=%3
Require2Factor is not
set to disabled, then the user must provide their static password as a
prefix to their one-time password. The correct static password is returned
by AuthSelect. If the user provides a static password
prefix, then the static password is always checked regardless of
Require2Factor setting.DefaultDigits specifies the number of
one-time password digits to use if the user record does not define digits.
Defaults to 6. Minimum allowed is 4.MaxBadLogins specifies how many
consecutive bad PINs or bad OTP codes will be tolerated in the last
BadLoginWindow seconds. If more than
MaxBadLogins bad authentication attempts occurs and
if the last one is within the last BadLoginWindow
seconds, the authentication attempt will be rejected. The user must wait
at least BadLoginWindow seconds before attempting to
authenticate again. MaxBadLogins defaults to
10.UpdateQuery and
AuthSelect.MaxBadLogins have occurred.ResyncWindow defines the maximum number
of missing authentications that will be tolerated for counter
resynchronisation. Defaults to 20.