Time-based one-time password: Difference between revisions
No edit summary |
|||
Line 8: | Line 8: | ||
In addition, OATH also submitted the final version of the OCRA (OATH Challenge-Response Algorithms) specification to the IETF. This version incorporates all the feedback and commentary that the authors received from the technical community based on the prior versions submitted to the IETF.<ref>{{cite web |url=http://www.openauthentication.org/news/20080408|title=OATH Submits TOTP: Time-Based One Time Password Specification to IETF|last=Alexander|first=Madison|work=Open Authentication|date=|accessdate=22 February 2010}}</ref> |
In addition, OATH also submitted the final version of the OCRA (OATH Challenge-Response Algorithms) specification to the IETF. This version incorporates all the feedback and commentary that the authors received from the technical community based on the prior versions submitted to the IETF.<ref>{{cite web |url=http://www.openauthentication.org/news/20080408|title=OATH Submits TOTP: Time-Based One Time Password Specification to IETF|last=Alexander|first=Madison|work=Open Authentication|date=|accessdate=22 February 2010}}</ref> |
||
==Implementations== |
|||
[[Google]] have implemented a version of TOTP in their [[Google Authenticator]] with is the basis of their [[two-step authentication]].<ref>{{cite web |url=http://code.google.com/p/google-authenticator|title=google-authenticator - Project Hosting on Google Code |
|||
==See also== |
==See also== |
Revision as of 11:06, 22 February 2011
TOTP - Time-based One-time Password Algorithm is an extension of the HMAC-based One Time Password algorithm HOTP to support time based moving factor. TOTP was submitted to the IETF as an Internet-Draft. It is a cornerstone of Initiative For Open Authentication (OATH).
Applications
TOTP can be used to authenticate a user in a system via an authentication server. Also, if some more steps are carried out, the user can also authenticate the validation server.
History
The TOTP draft was developed through the collaboration of several OATH members in order to create an industry-backed standard. It complements the event-based one-time standard HOTP, and offers end user organizations and enterprises more choice in selecting technologies that best fit their application requirements and security guidelines.
In addition, OATH also submitted the final version of the OCRA (OATH Challenge-Response Algorithms) specification to the IETF. This version incorporates all the feedback and commentary that the authors received from the technical community based on the prior versions submitted to the IETF.[1]
Implementations
Google have implemented a version of TOTP in their Google Authenticator with is the basis of their two-step authentication.<ref>{{cite web |url=http://code.google.com/p/google-authenticator%7Ctitle=google-authenticator - Project Hosting on Google Code
See also
References
- ^ Alexander, Madison. "OATH Submits TOTP: Time-Based One Time Password Specification to IETF". Open Authentication. Retrieved 22 February 2010.
External links
- Draft from IETF web site
- Initiative for Open Authentication
- OATH Toolkit is an implementation in C as a shared library, command line tool and PAM module