Hello Guys,
Revisiting OTP demo for iOS client, I've seen some improvements that could
be done in the OTP lib itself.
1. storage of secret is done at cordova- layer [1] and [2]. It would be
better to store them in a safe storage (ie: Keychain for iOS, KeyStore for
Android etc...) or at least leave the option for end user.
2. extracting secret from URL (read from QRCode) is done on each native
client demos or in Corodva layer. See [3] for iOS and [4] for Android and
[5] for Cordova. What about moving this code snippet in the library itself.
For ex, add a new initialiser of OTP which takes an URL.
Thoughts?
++
Corinne
[1]
https://github.com/aerogear/aerogear-cordova-otp/blob/master/www/aerogear...
[2]
https://github.com/aerogear/aerogear-cordova-otp/blob/master/src/ios/CDVA...
[3]
https://github.com/corinnekrych/aerogear-ios-cookbook-1/blob/AGIOS-390.ot...
[4]
https://github.com/aerogear/aerogear-android-cookbook/blob/master/Two-Fac...
[5]
https://github.com/aerogear/aerogear-cordova-otp/blob/master/www/aerogear...