AAL2VerifyPassword
  • 22 Jan 2025
  • 2 Minutes à lire
  • Sombre
    Lumière
  • PDF

AAL2VerifyPassword

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Function prototype

aat_int32 AAL2VerifyPassword (TDigipassBlob*   DPData,
                              TKernelParms*    CallParms,
                              aat_ascii*       Password,
                              aat_ascii*       Challenge);

Description

This function authenticates the Digipass user by verifying if a given Digipass-generated dynamic password is valid for a specified authenticator application described by its authenticator application BLOB (DPData). Optionally, the previously generated challenge is also passed to this function.

Integration specifics of one-button authenticators (e.g. Digipass GO series)

This function can also be used for static PIN management for Digipass GO devices supporting the server static PIN. In this case, a password may have different formats.

Password formats

  • Regular password authentication request: 89574526. No static PIN.
  • Same authentication request in combination with static PIN usage: 123489574526. The static PIN is entered before the dynamic password. AAL2VerifyPassword will first evaluate the static PIN and then the dynamic password.
  • Same authentication request in combination with static PIN usage and a request for PIN change: 12348957452643214321. The static PIN is entered before the dynamic password, and both the new PIN and new PIN confirmation are entered afterwards. AAL2VerifyPassword will first evaluate the static PIN and then the dynamic password. After this, the request for a PIN change is processed.

For a list of the characters that can be used for the new static password, see Supported new static password charset.

Virtual Mobile Authenticator

If Virtual Mobile Authenticator is supported for the given authenticator application BLOB, this function can be used to perform Virtual Mobile Authenticator one-time password validation.

When both backup and primary authenticator are activated, Authentication Suite Server SDK will automatically detect whether the given dynamic password is from a backup or primary authenticator application. After a successful validation it is possible to retrieve the given dynamic password type (primary/backup) by calling AAL2GetTokenProperty.

Score-based Digipass

For Digipass devices that integrate the score-based algorithm, Authentication Suite Server SDK performs a score-based authentication which allows retrieving the Digipass scoring value. Once Authentication Suite Server SDK has successfully validated the password, it returns either SUCCESS or SUCCESS with the relevant scoring warning code. See the list of return codes in Table: Return codes (AAL2VerifyPassword) for more details.

Parameters

   
 Table: Parameters (AAL2VerifyPassword)
TypeNameUseDescription
TDigipassBlob *DPDataI/Oauthenticator application BLOB. Upon return from the function call, this BLOB must be rewritten to the application database to reflect changes.
TKernelParms *CallParmsIStructure of runtime parameters to use during this function call.
aat_ascii *PasswordI

String of up to 17+24 numeric or hexadecimal characters, left-justified, null-terminated or right-padded with spaces. This is the dynamic password generated by the Digipass authenticator.

aat_ascii *ChallengeI

String of up to 17 numeric or hexadecimal characters, left-justified, null-terminated, or right-padded with spaces. This parameter holds the challenge that was proposed to the user to generate the password. If no challenge was generated, this parameter should be NULL.

Return codes

   
 Table:  Return codes (AAL2VerifyPassword)
CodeMeaningCodeMeaning
0Success603Invalid Gordian stimulus information
10001Success with context warning*802Change password mandatory
10002Success with user warning*803New password too short
10003Success with user & context warning*804New password too long
10004Success with platform warning*1039Invalid response length with DP algorithm
10005Success with platform & context warning*1040Invalid host code length with DP algorithm
10006Success with platform & user warning*1103Unlock Version 2 not supported
10007Success with platform & user & context warning*1116Response check digit not allowed
1Code not verified1117Challenge check digit not allowed
2Static password validation failed1118Unsupported BLOB
130Invalid response pointer-101Challenge too short
131Missing required challenge-102Challenge too long
132Unsupported token type-103Challenge check digit wrong
140Challenge corrupted-105Challenge minimum length not allowed
201Code replay attempt-106Challenge maximum length not allowed
202Identification error threshold reached-107Challenge number wrong
205Inactive days reached-108Challenge character invalid
208Application disabled-201Response length out of bounds
412Invalid checksum-202Response too short
413Invalid Base64 format-203Response too long
510Invalid Digipass data pointer-204Response check digit wrong
600Invalid Gordian root information-205Response character not decimal
601Invalid Gordian today information-206Response character not hexadecimal
602Invalid Gordian tomorrow information-207Response character set not specified

* Specific score-based authentication codes; for more information, refer to Score-based Digipass.


Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle