<AuthBy SQLHOTP>
authentication module
detects replay and brute-force attacks. It supports optional PIN, also
known as static password, for 2 factor authentication when the user
prefixes their static password before the HOTP one-time password.goodies/
directory of your Radiator distribution.<AuthBy SQLHOTP>
supports the same
parameters as <AuthBy xxxxxx>
. For more
information, see Section 3.32. <AuthBy xxxxxx>. It supports also
all the common SQL configuration parameters. For more information about
the SQL configuration parameters, see Section 3.8. SQL configuration.AuthSelect
is an SQL query that fetches
HOTP token data from the SQL database. AuthSelect
is
expected to return a number of fields that describe the token.Require2Factor
is not set to disabled.DefaultDigits
is be
used.%0
which is
SQL quoted when used in AuthSelect
and unmodified
when used with AuthSelectParam
.goodies/hotp.sql
. The default is:select secret, counter_high, counter_low, active, pin, digits, bad_logins, unix_timestamp(accessed) from hotpkeys where username=%0
UpdateQuery
is an SQL query that updates
the HOTP token data in the SQL database. After a successful or failed
authentication it will be passed the new authentication counter high in
%0
, new authentication counter low in
%1
, bad login count in %2
, the user name
in %3
, The default works with the sample database schema
provided in
goodies/hotp.sql
.%0
and the
other formatters are SQL quoted, if needed, when used in
UpdateQuery
and unmodified when used with
UpdateQueryParam
.UpdateQuery
is:update hotpkeys set accessed=now(), counter_high=%0, counter_low=%1, bad_logins=%2 where username=%3
Require2Factor
is not
set to disabled, then the user must provide their static password as a
prefix to their one-time password. The correct static password is returned
by AuthSelect
. If the user provides a static password
prefix, then the static password is always checked regardless of
Require2Factor
setting.DefaultDigits
specifies the number of
one-time password digits to use if the user record does not define digits.
Defaults to 6. Minimum allowed is 4.MaxBadLogins
specifies how many
consecutive bad PINs or bad OTP codes will be tolerated in the last
BadLoginWindow
seconds. If more than
MaxBadLogins
bad authentication attempts occurs and
if the last one is within the last BadLoginWindow
seconds, the authentication attempt will be rejected. The user must wait
at least BadLoginWindow
seconds before attempting to
authenticate again. MaxBadLogins
defaults to
10.UpdateQuery
and
AuthSelect
.MaxBadLogins
have occurred.ResyncWindow
defines the maximum number
of missing authentications that will be tolerated for counter
resynchronisation. Defaults to 20.