New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FortiToken Mobile compatibility #106
Comments
Can you please explain more explicitly what your issue is? |
I use the FORTITOKEN MOBILE commercial product, which is an OTP Spec RFC 6238, RFC 4226 based on the OATH time algorithm. When the token generated using pyotp totp does not match the token generated by the FORTITOKEN MOBILE IOS APP. |
OK - I have no idea why this would be the case. It looks like you're setting a custom interval; have you tried using the standard interval of 30s? |
The 30 second interval is also incorrect, FORTITOKEN MOBILE defaults to 60 seconds. |
This package implements the RFC correctly, as evidenced by the test suite examples which match the RFC references. I took a quick look at the doc you linked and it does not seem to provide any information beyond what you already pasted. So I'm afraid I have no idea why you are seeing a mismatch. This thread refers to the secret being transported in an encrypted form, so perhaps you are taking an encrypted secret and passing it on to PyOTP without decrypting it first. |
Since I'm reasonably confident this is not a problem in PyOTP, I'm going to close this issue. If you need further assistance, feel free to comment here or open a new issue if there is a specific change that you would like PyOTP to implement. |
Onboard Security Algorithm: OATH time and event based
OTP generator: OTP Spec RFC 6238, RFC 4226
https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortitoken.pdf
The text was updated successfully, but these errors were encountered: