Authenticator application types
  • 17 Jan 2025
  • 1 Minute to read
  • Dark
    Light
  • PDF

Authenticator application types

  • Dark
    Light
  • PDF

Article summary

Each authenticator is programmed with at least one authenticator application and a unique secret. The authenticator application uses this unique secret when it generates one-time password (OTP) values or an electronic signature.

Each type of authenticator application generates OTP values or signatures from different data, and in slightly different ways:

Response-Only

Creates an OTP, either based on the current date and time or on the number of uses (i.e. events).

Challenge/Response

Creates an OTP (also referred to as a response) based on a numerical challenge given on a logon page. This challenge may be either one of the following:

  • Custom-created challenge for the specific authenticator
  • Randomly-created challenge

The OTP may also be based on the date and time.

Signature

Electronic signature applications are typically used in online banking. The authenticator creates a unique code—i.e. an electronic signature—based on a number of transaction data fields entered plus (optionally) the date and time or events.

multi-mode

A multi-mode authenticator can be used on all of the above modes.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, our interactive help assistant