[keycloak-user] OTP Policy updates not reflects in Google Authenticator
Marek Posolda
mposolda at redhat.com
Tue Oct 3 02:22:25 EDT 2017
I am not sure if we check the current OTP policy of user and take it
into account instead of the default realm OTP policy. For password, we
are doing it (password hashing algorithm is saved together with user's
password. When realm password hashing policy is changed, then user's
password is still verified against the old algorithm during first
authentication of that user after the realm policy is changed. And then
password is updated in DB with the new algorithm).
Feel free to create JIRA with steps to reproduce. I think we can improve
for OTP and ask user to configure new OTP after the change. Not sure if
this should be configurable or not, I can see some potential security
implications of it.
Marek
On 30/09/17 14:47, forums.akurathi at gmail.com wrote:
> Dear all,
>
> We are running into a weird problem i.e., updates to OTP policy does not reflect at google authenticator app. We wonder is there any special instructions needed to get this working.
>
> A sequence of steps :
>
> 1) create realm, create user
> 2) enable OTP
> 3) login with the newly created user
> 4) system asks you to configure OTP
> 5) update OTP policy such as number of digits from 6 to 8
> 6) try login again
> 7) system asks you to enter OTP but authentication fails
>
> We expect the system should route the user to configure OTP page rather than prompting to enter OTP which anyways fails.
>
> Your response is highly appreciated !!!
>
> Thanks in advance
>
> Regards
> Krishna Kumar Akurathi
>
>
> _______________________________________________
> keycloak-user mailing list
> keycloak-user at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/keycloak-user
More information about the keycloak-user
mailing list