- 23 Oct 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Online activation process
- Updated on 23 Oct 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
The Mobile Authenticator Studio application connects to a server for online activation, using a registration identifier to request an activation message. This identifier, an alphanumeric ASCII string of up to 40 characters, is managed by the integrator and stored securely within the application. To enhance security, it can be combined with an optional authorization code, also up to 40 characters, ensuring that activation data is sent to the correct user. The activation process employs an encryption protocol based on a shared activation password, with additional security measures like checksums to prevent errors. The server manages key pair generation and encryption through the DSAPP library, utilizing a Diffie-Hellman shared secret for secure communication. If the activation password is incorrect, activation fails. A unique device identifier can also be included in the activation request to verify the installation on the same or a new device. For detailed integration instructions, users can refer to the Mobile Authenticator Studio guides.
During the online activation, the Mobile Authenticator Studio application automatically connects to the server that provides the activation service, and requests the activation message.
The application may use a registration identifier by which end users are identified on the server. Based on this identifier, the server delivers the corresponding Activation Message 1. The identifier needs to be an alphanumeric ASCII string of up to 40 characters.
Online registration request
The registration identifier is generated and managed by the Mobile Authenticator Studio integrator. It is stored and remains in the authenticator application storage. It cannot be changed.
To prevent activation data from being delivered to a wrong user, the registration identifier can be combined with an authorization code. The combination of authorization code and registration identifier ensures that the authenticator data is delivered to the correct user. The authorization code needs to be a string of up to 40 characters.
The authorization code can contain all the ASCII characters between 0x20 (SPACE) and 0x7E (~).
The authorization code is configured in the online activation section of the Mobile Authenticator Studio configuration file. To increase security during the delivery process, the activation data is protected by an encryption protocol based on the activation password (customer historical secret), i.e. a secret shared between the server and the end user. Using the authorization code for data delivery is optional.
To avoid typing errors, the authorization code and activation password can use a checksum based on a Luhn-10 algorithm and can be generated using the Digipass Software Advanced Provisioning Protocol (DSAPP) SDK.
The encryption protocol uses an encryption key based on a Diffie-Hellman shared secret, which the server and the application derive from their private keys and the public key of the other party. Key pairs are generated according to an ECDH mechanism based on a NIST P-256 curve.
Online activation with advanced encryption
The activation data is generated by Authentication Server Framework. The server key pair generation, the decryption of the client public key, the session key derivation, and the encryption of the activation data are managed by the DSAPP library. For more information about how to integrate the advanced provisioning protocol with Mobile Authenticator Studio, refer to the Mobile Authenticator Studio Integration Guide and the Mobile Authenticator Studio Two-Step Integration Samples Specification.
If the activation password is incorrect, an error message will be displayed, and Mobile Authenticator Studio will not be activated.
A device unique identifier can be added to the online request to check if the end user installs the Mobile Authenticator Studio application on the same or on a new device. The presence of the device identifier in the request is indicated by the device identifier mask in the URL that is set in the application configuration file. For more information about how to send the device unique identifier to the provisioning server, refer to the Mobile Authenticator Studio Integration Guide.