AAL2SyncTokenAndHost
  • 22 Jan 2025
  • 3 Minutes à lire
  • Sombre
    Lumière
  • PDF

AAL2SyncTokenAndHost

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Function prototype

aat_int32 AAL2SyncTokenAndHost (TDigipassBlob*   DPData,
                                TKernelParms*    CallParms,
                                aat_ascii*       Password1,
                                aat_ascii*       Challenge1,
                                aat_ascii*       Password2,
                                aat_ascii*       Challenge2);

Description

Based on two contiguous Digipass responses, this function synchronizes

  • the host time with the Digipass time and/or
  • the host event counter with the Digipass event counter.

This function can be used for

  • time-based only algorithm
  • event-based only algorithm
  • time and-event-based algorithms

Time synchronization is no longer limited to 1 second per 6 hours (4 seconds per day). AAL2GetTokenProperty can be used to retrieve the algorithms TIME BASED, EVENT BASED, TIME AND EVENT BASED.

For time-based Challenge/Response Digipass authenticators, the CheckChallenge kernel parameter must be set to 4 for the synchronization (i.e. to allow two consecutive authentication requests in the same time step).

Time-based only algorithm

This function can be called to fix the following scenarios:

  • A valid password (response) generated by a Digipass authenticator is rejected because the Digipass authenticator has not been used for a long period of time.
  • A valid password (response) generated by a Digipass authenticator is rejected because the Digipass clock has drifted too far and is now outside the time synchronization window.

After calling AAL2SyncTokenAndHost, the new time drift is stored in the authenticator application BLOB, and a valid password will be accepted again.

With VACMAN Controller 3.7.10 and later/Authentication Suite Server SDK, this function will use the SyncWindow kernel parameter instead of iTimeWindow as a reference for the synchronization time window limit.

Event-based only algorithm

This function can be called to fix the following scenario:

  1. The Digipass authenticator generates a password (response) based on event 1000.
  2. A validation is performed on the host with this password so that this event is stored in the authenticator application BLOB.
  3. The Digipass user then generates another ten passwords without a validation on the host.
  4. The Digipass authenticator generates a password based on event 1011.
  5. A validation is attempted on the host with this password.
  6. The event window is too small and the host rejects this valid password because it is outside the event synchronization window.

After calling AAL2SyncTokenAndHost, the event used to generate the last of the two contiguous responses is stored in the authenticator application BLOB, and a valid password will be accepted again.

For event-based Digipass authenticators to work properly, AAL2SyncTokenAndHost must be used with the EventWindow kernel parameter greater than with the validation with AAL2VerifyPassword. If the same EventWindow is used, the synchronization will fail for the same reasons as the authentication (Digipass event outside the event synchronization window).

Score-based Digipass

For Digipass devices that integrate the score-based algorithm, Authentication Suite Server SDK performs a score-based authentication which allows retrieving the Digipass scoring value. Once Authentication Suite Server SDK has successfully validated the two consecutive passwords, it returns either SUCCESS or SUCCESS with the relevant scoring warning code. See the list of return codes in Table: Return codes (AAL2SyncTokenAndHost) for more details.

Parameters

  Table: Parameters (AAL2SyncTokenAndHost)
TypeNameUseDescription
TDigipassBlob *DPDataI/Oauthenticator application BLOB. Upon return from the function call, this BLOB must be rewritten to the application database to reflect changes.
TKernelParms * CallParms IStructure of runtime parameters to use during this function call.
aat_ascii * Password1I

String of up to 17+24 numeric or hexadecimal characters, left-justified, null-terminated or right-padded with spaces. This is the dynamic password generated by the Digipass device.

aat_ascii *Challenge1IString of up to 17 numeric characters, left-justified, null-terminated, or right-padded with spaces. This parameter holds the challenge that was proposed to the user to generate CodeToVerify. If no challenge was generated, this parameter should be NULL.
aat_ascii * Password2I

String of up to 17+24 numeric or hexadecimal characters, left-justified, null-terminated or right-padded with spaces. This is the next password generated by the Digipass device.

aat_ascii * Challenge2IString of up to 17 numeric characters, left-justified, null-terminated, or right-padded with spaces. This parameter holds the challenge that was proposed to the user to generate CodeToVerify. If no challenge was generated, this parameter should be NULL.

Return codes

  Table:  Return codes (AAL2SyncTokenAndHost)
CodeMeaningCodeMeaning
0Success602Invalid Gordian tomorrow information
10001Success with context warning*603Invalid Gordian stimulus information
10002Success with user warning*802Change password mandatory
10003Success with user & context warning*803New password too short
10004Success with platform warning*804New password too long
10005Success with platform & context warning*1000Function does not support EMV-CAP
10006Success with platform & user warning*1039Invalid response length with DP algorithm
10007Success with platform & user & context warning*1040Invalid host code length with DP algorithm
1Code not verified1103Unlock Version 2 not supported
2Static password validation failed1116Response check digit not allowed
130Invalid response pointer1117Challenge check digit not allowed
131Missing required challenge1118Unsupported BLOB
132Unsupported token type-101Challenge too short
140Challenge corrupted-102Challenge too long
201Code replay attempt-103Challenge check digit wrong
202Identification error threshold reached-104Challenge character not decimal
205Inactive days reached-108Challenge character invalid
208Application disabled-201Response length out of bounds
412Invalid checksum-202Response too short
413Invalid Base64 format-203Response too long
510Invalid Digipass data pointer-204Response check digit wrong
600Invalid Gordian root information-205Response character not decimal
601Invalid Gordian today information-206Response character not hexadecimal

* Specific score-based authentication codes;for more information, refer to Score-based Digipass.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle