- 23 Oct 2024
- 5 Minutes to read
- DarkLight
- PDF
Standard secret exchange encryption
- Updated on 23 Oct 2024
- 5 Minutes to read
- DarkLight
- PDF
Mobile Authenticator Studio app can be configured to use the standard provisioning protocol to exchange the authenticator secret with the provisioning server during online activation. In this case, the authenticator secret will be encrypted with the activation password and a nonce generated by the Mobile Authenticator Studio app.
Online activation with Standard Secret Exchange Encryption (overview)
If the Mobile Authenticator Studio app is configured to use the post-activation process, it will submit the registration identifier and an OTP in clear text.
Online activation with Standard Secret Exchange Encryption and post-activ- ation (overview)
This provisioning protocol version is described for backwards-compatibility with back-end systems supporting Mobile Authenticator Studio prior to 4.0. We strongly recommend using the advanced provisioning protocol with Mobile Authenticator Studio 4.0 and later.
Registration request
The request sent by Mobile Authenticator Studio is configured in the OnlineActivationData section of the configuration file:
<ActivationData useActivationPassword="true" checksumOnActivationPassword="true">
<OnlineActivationData inputType="manual"advanced="false" useRegistrationIdentifier="true"useAuthorizationCode="true" checksumOnAuthorizationCode="true">
<!-- URL used to retrieve the activation data -->
<URL method="GET" value="http://MY_DOMAIN_NAME/MY_WEB_SERVICE?registrationIdentifier=%_RegistrationIdentifier_%&authorizationCode=%_AuthorizationCode_%&publicKey=%_PublicKey_% &deviceIdentifier=%_DeviceIdentifier_%"&rootingStatus=%_RootingStatus_%&version=%_Version_%" />
...
</OnlineActivationData>
</ActivationData>
The URL can use the HTTP POST or GET methods. For more information about URL customization, refer to the Mobile Authenticator Studio Customization Guide.
Registration response
The response expected by Mobile Authenticator Studio must be formatted as described in the DTD:
<!ELEMENT DP4Mobile (Activation?,PendingTransactions?)>
<!ATTLIST DP4Mobile retCode CDATA #REQUIRED>
<!ATTLIST DP4Mobile message CDATA #REQUIRED>
<!ATTLIST DP4Mobile serverTime CDATA #IMPLIED>
<!ELEMENT Activation EMPTY>
<!ATTLIST Activation xfad CDATA #REQUIRED>
<!ATTLIST Activation xerc CDATA #IMPLIED>
<!ATTLIST Activation userid CDATA #IMPLIED>
<!ATTLIST Activation challenge CDATA #IMPLIED>
Example
<?xml version="1.0"encoding="UTF-8"?>
<DP4Mobile retCode="0"message="Operation Successful" serverTime="1271862050" >
<Activation xfad="3806564453974A59302DD7..." xerc="55420849628260..."userid="myusername" challenge="123456" />
</DP4Mobile>
Post-activation request
The request sent by Mobile Authenticator Studio is configured in the PostActivation section of the configuration file:
<PostActivation binding="false"cryptoAppIndex="1">
<OnlinePostActivation destroyOnFailure="true" displayMessageOnSuccess="true">
<!-- URL used to retrieve the activation data -->
<URL method="GET" value="http://MY_DOMAIN_NAME/MY_WEB_SERVICE?registrationIdentifier=%_RegistrationIdentifier_%&otp=%_OTP_%&deviceIdentifier=%_DeviceIdentifier_%&version=%_Version_%" />
</OnlinePostActivation>
...
</PostActivation>
The URL can use the HTTP POST or GET methods. For more information about URL customization, refer to the Mobile Authenticator Studio Customization Guide.
The cryptographic application used to generate the authenticator response can operate the following authentication modes:
RO (Response-Only). To verify the authenticator response generated by an application with RO as the authentication mode, the AAL2VerifyPassword function of the Authentication Server Framework API must be used with an empty challenge.
CR (Challenge/Response). To use a Challenge/Response cryptographic application, Mobile Authenticator Studio must receive a challenge during its activation scenario. To verify the authenticator response, the AAL2VerifyPassword function of the Authentication Server Framework API must be used with the challenge provided during the activation scenario.
MM (multi-mode). The multi-mode applications are used as Response-Only application.
Post-activation response
The response expected by Mobile Authenticator Studio must be formatted as described in the DTD:
<!ELEMENT DP4Mobile (Activation?,PendingTransactions?)>
<!ATTLIST DP4Mobile retCode CDATA #REQUIRED>
<!ATTLIST DP4Mobile message CDATA #REQUIRED>
<!ATTLIST DP4Mobile serverTime CDATA #IMPLIED>
Example
<?xml version="1.0"encoding="UTF-8"?>
<DP4Mobile retCode="0"message="Operation Successful" />