 .
.<AuthBy SQLHOTP> authentication module
               detects replay and brute-force attacks. It supports optional PIN, also
               known as static password, for 2 factor authentication when the user
               prefixes their static password before the HOTP one-time password.goodies/ directory of your Radiator distribution.<AuthBy SQLHOTP> supports the same
               parameters as <AuthBy xxxxxx>. For more
               information, see Section 3.32. <AuthBy xxxxxx>. It supports also
               all the common SQL configuration parameters. For more information about
               the SQL configuration parameters, see Section 3.8. SQL configuration.AuthSelect is an SQL query that fetches
                  HOTP token data from the SQL database. AuthSelect is
                  expected to return a number of fields that describe the token.Require2Factor is not set to disabled.DefaultDigits is be
                     used.%0 which is
                  SQL quoted when used in AuthSelect and unmodified
                  when used with AuthSelectParam.goodies/hotp.sql. The default is:select secret, counter_high, counter_low, active, pin, digits, bad_logins, unix_timestamp(accessed) from hotpkeys where username=%0
UpdateQuery is an SQL query that updates
                  the HOTP token data in the SQL database. After a successful or failed
                  authentication it will be passed the new authentication counter high in
                  %0, new authentication counter low in
                  %1, bad login count in %2, the user name
                  in %3, The default works with the sample database schema
                  provided in
                  goodies/hotp.sql.%0 and the
                  other formatters are SQL quoted, if needed, when used in
                  UpdateQuery and unmodified when used with
                  UpdateQueryParam.UpdateQuery is:update hotpkeys set accessed=now(), counter_high=%0, counter_low=%1, bad_logins=%2 where username=%3
Require2Factor is not
                  set to disabled, then the user must provide their static password as a
                  prefix to their one-time password. The correct static password is returned
                  by AuthSelect. If the user provides a static password
                  prefix, then the static password is always checked regardless of
                  Require2Factor setting.DefaultDigits specifies the number of
                  one-time password digits to use if the user record does not define digits.
                  Defaults to 6. Minimum allowed is 4.MaxBadLogins specifies how many
                  consecutive bad PINs or bad OTP codes will be tolerated in the last
                  BadLoginWindow seconds. If more than
                  MaxBadLogins bad authentication attempts occurs and
                  if the last one is within the last BadLoginWindow
                  seconds, the authentication attempt will be rejected. The user must wait
                  at least BadLoginWindow seconds before attempting to
                  authenticate again. MaxBadLogins defaults to
                  10.UpdateQuery and
                  AuthSelect.MaxBadLogins have occurred.ResyncWindow defines the maximum number
                  of missing authentications that will be tolerated for counter
                  resynchronisation. Defaults to 20.