Provisioning codes for Google Authenticator

Hi all,

Thanks for your work on this - it has proved to be a nice solution for us.

Is there any way to manually provision the Google Authenticator without a
QR code?

Thanks!

-Kris

Hi Kris,

I implemented the enrollment of the Registration token to the webui and
the displaying of the seed in the enrolled token dialog.

This is uploaded at github and will be available shortly in the unstable
ppa-repository

ppa:privacyidea/privacyidea-dev

It will be part of release 2.4 which will be released LATEST in august.

But I assume, I get bored till then, so 2.4 will be early :wink:

Kind regards
CorneliusAm Donnerstag, den 11.06.2015, 09:54 -0700 schrieb Kris Lou:

Potentially, for 2 reasons:

  1. I like to store the provisioning key for future reference, but I
    know that re-provisioning with a new key (QR) is only a minor change.
  2. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.

Thanks,
-Kris

Kris Lou
klou@themusiclink.net

On Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel <@cornelinux> wrote:
Hello Kris,

    what do you want to achieve, do you have a work flow in mind?
    
    * You can uncheck the checkbox "Generate OTP key on the
    server",
      and then you can enter a seed. Not that nice, since you must
      make up a key on your own.
    
    * You can get the data out of the link of the QR code.
      "Click _here_ to scan the QR code" contains the seed data.
      You could copy the link and extract it.
    
    So I assume you want to have the data displayed hex encoded?
    Why?
    
    Kind regards
    Cornelius
    
    
    
    Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:
    > Hi all,
    >
    >
    > Thanks for your work on this - it has proved to be a nice
    solution for
    > us.
    >
    >
    > Is there any way to manually provision the Google
    Authenticator
    > without a QR code?
    >
    >
    > Thanks!
    >
    >
    > -Kris
    > --
    > You received this message because you are subscribed to the
    Google
    > Groups "privacyidea" group.
    > To unsubscribe from this group and stop receiving emails
    from it, send
    > an email to privacyidea+unsubscribe@googlegroups.com.
    > To post to this group, send email to
    privacyidea@googlegroups.com.
    > To view this discussion on the web visit
    >
    https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com.
    > For more options, visit https://groups.google.com/d/optout.
    
    
    --
    Cornelius Kölbel
    @cornelinux
    +49 151 2960 1417
    
    NetKnights GmbH
    http://www.netknights.it
    Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    Tel: +49 561 3166797, Fax: +49 561 3166798
    
    Amtsgericht Kassel, HRB 16405
    Geschäftsführer: Cornelius Kölbel
    
    
    --
    You received this message because you are subscribed to the
    Google Groups "privacyidea" group.
    To unsubscribe from this group and stop receiving emails from
    it, send an email to privacyidea+unsubscribe@googlegroups.com.
    To post to this group, send email to
    privacyidea@googlegroups.com.
    To view this discussion on the web visit
    https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel.
    For more options, visit https://groups.google.com/d/optout.


You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/CAGyTNKEQDP6r1yy0ob5MZgeR39VD4gtGma7XOf6yTwY4FXNY2g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Hi Kris,

regarding your privacy conscious users - have you ever thought of using
hardware for this purpose of authenticating?
Especially the yubikey is cute. You can initialize it with your own key
material and authenticate against privacyIDEA.
You can be sure, that no vendor knows your secret keys and it is
hardware. You can be sure that no trojan or virus extracts the key from
the poor store on the smartphone.

If you need any more input on this, drop me a note.
CorneliusAm Donnerstag, den 11.06.2015, 13:16 -0700 schrieb Kris Lou:

Wow, that was fast.

Thanks for going this far with it, and for the suggestions - I
obviously have some reading to do (and we’re on CentOS, so will be
installing/upgrading from pip).

Also, some of my users are extremely privacy conscious - so they don’t
like installing apps that ask for access to Contact lists and the
like. Unfortunately, this also includes many QR readers (or at least
those suggested by GAuth). So, this is another reason why I was
asking for the “Manual Provisioning” methods that correlate with the
Authenticator app configs.

Thanks again,

Kris Lou
klou@themusiclink.net

On Thu, Jun 11, 2015 at 11:01 AM, Cornelius Kölbel <@cornelinux> wrote:

    Hi Kris,
    
    I implemented the enrollment of the Registration token to the
    webui and
    the displaying of the seed in the enrolled token dialog.
    
    This is uploaded at github and will be available shortly in
    the unstable
    ppa-repository
    
            ppa:privacyidea/privacyidea-dev
    
    It will be part of release 2.4 which will be released LATEST
    in august.
    
    But I assume, I get bored till then, so 2.4 will be early ;-)
    
    Kind regards
    Cornelius
    
    Am Donnerstag, den 11.06.2015, 09:54 -0700 schrieb Kris Lou:
    
    > Potentially, for 2 reasons:
    >
    >
    > 1) I like to store the provisioning key for future
    reference, but I
    > know that re-provisioning with a new key (QR) is only a
    minor change.
    > 2) For some users that do not want to use their mobile
    devices, I'll
    > give an encrypted USB key with a provisioned Google Auth app
    > (https://winauth.com/).  I also have some users at an
    off-site
    > location that is obviously more difficult to provision.
    >
    >
    > I realize that this is not a best case for 2FA, but thought
    I'd ask.
    > It seems like my boss goes through 3 phones a year.
    >
    >
    > Thanks,
    > -Kris
    >
    >
    > Kris Lou
    > klou@themusiclink.net
    >
    > On Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel <@cornelinux> wrote:
    >         Hello Kris,
    >
    >         what do you want to achieve, do you have a work flow
    in mind?
    >
    >         * You can uncheck the checkbox "Generate OTP key on
    the
    >         server",
    >           and then you can enter a seed. Not that nice,
    since you must
    >           make up a key on your own.
    >
    >         * You can get the data out of the link of the QR
    code.
    >           "Click _here_ to scan the QR code" contains the
    seed data.
    >           You could copy the link and extract it.
    >
    >         So I assume you want to have the data displayed hex
    encoded?
    >         Why?
    >
    >         Kind regards
    >         Cornelius
    >
    >
    >
    >         Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb
    Kris Lou:
    >         > Hi all,
    >         >
    >         >
    >         > Thanks for your work on this - it has proved to be
    a nice
    >         solution for
    >         > us.
    >         >
    >         >
    >         > Is there any way to manually provision the Google
    >         Authenticator
    >         > without a QR code?
    >         >
    >         >
    >         > Thanks!
    >         >
    >         >
    >         > -Kris
    >         > --
    >         > You received this message because you are
    subscribed to the
    >         Google
    >         > Groups "privacyidea" group.
    >         > To unsubscribe from this group and stop receiving
    emails
    >         from it, send
    >         > an email to privacyidea
    +unsubscribe@googlegroups.com.
    >         > To post to this group, send email to
    >         privacyidea@googlegroups.com.
    >         > To view this discussion on the web visit
    >         >
    >
     https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com.
    >         > For more options, visit
    https://groups.google.com/d/optout.
    >
    >
    >         --
    >         Cornelius Kölbel
    >         @cornelinux
    >         +49 151 2960 1417
    >
    >         NetKnights GmbH
    >         http://www.netknights.it
    >         Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    >         Tel: +49 561 3166797, Fax: +49 561 3166798
    >
    >         Amtsgericht Kassel, HRB 16405
    >         Geschäftsführer: Cornelius Kölbel
    >
    >
    >         --
    >         You received this message because you are subscribed
    to the
    >         Google Groups "privacyidea" group.
    >         To unsubscribe from this group and stop receiving
    emails from
    >         it, send an email to privacyidea
    +unsubscribe@googlegroups.com.
    >         To post to this group, send email to
    >         privacyidea@googlegroups.com.
    >         To view this discussion on the web visit
    >
     https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel.
    >         For more options, visit
    https://groups.google.com/d/optout.
    >
    >
    >
    > --
    > You received this message because you are subscribed to the
    Google
    > Groups "privacyidea" group.
    > To unsubscribe from this group and stop receiving emails
    from it, send
    > an email to privacyidea+unsubscribe@googlegroups.com.
    > To post to this group, send email to
    privacyidea@googlegroups.com.
    > To view this discussion on the web visit
    
    
    >
    https://groups.google.com/d/msgid/privacyidea/CAGyTNKEQDP6r1yy0ob5MZgeR39VD4gtGma7XOf6yTwY4FXNY2g%40mail.gmail.com.
    > For more options, visit https://groups.google.com/d/optout.
    
    --
    Cornelius Kölbel
    @cornelinux
    +49 151 2960 1417
    
    NetKnights GmbH
    http://www.netknights.it
    Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    Tel: +49 561 3166797, Fax: +49 561 3166798
    
    Amtsgericht Kassel, HRB 16405
    Geschäftsführer: Cornelius Kölbel
    
    
    --
    You received this message because you are subscribed to the
    Google Groups "privacyidea" group.
    To unsubscribe from this group and stop receiving emails from
    it, send an email to privacyidea+unsubscribe@googlegroups.com.
    To post to this group, send email to
    privacyidea@googlegroups.com.
    To view this discussion on the web visit
    https://groups.google.com/d/msgid/privacyidea/1434045696.4505.44.camel%40puckel.
    
    For more options, visit https://groups.google.com/d/optout.


You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/CAGyTNKFbUo_J1CiwvnDrMtJ-tL1hL8jhjcpHO%2B3RsFpvDuJ51g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Wow, that was fast.

Thanks for going this far with it, and for the suggestions - I obviously
have some reading to do (and we’re on CentOS, so will be
installing/upgrading from pip).

Also, some of my users are extremely privacy conscious - so they don’t like
installing apps that ask for access to Contact lists and the like.
Unfortunately, this also includes many QR readers (or at least those
suggested by GAuth). So, this is another reason why I was asking for the
“Manual Provisioning” methods that correlate with the Authenticator app
configs.

Thanks again,

Kris Lou
@Kris_LouOn Thu, Jun 11, 2015 at 11:01 AM, Cornelius Kölbel < cornelius.koelbel@netknights.it> wrote:

Hi Kris,

I implemented the enrollment of the Registration token to the webui and
the displaying of the seed in the enrolled token dialog.

This is uploaded at github and will be available shortly in the unstable
ppa-repository

    ppa:privacyidea/privacyidea-dev

It will be part of release 2.4 which will be released LATEST in august.

But I assume, I get bored till then, so 2.4 will be early :wink:

Kind regards
Cornelius

Am Donnerstag, den 11.06.2015, 09:54 -0700 schrieb Kris Lou:

Potentially, for 2 reasons:

  1. I like to store the provisioning key for future reference, but I
    know that re-provisioning with a new key (QR) is only a minor change.
  2. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.

Thanks,
-Kris

Kris Lou
@Kris_Lou

On Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel cornelius.koelbel@netknights.it wrote:
Hello Kris,

    what do you want to achieve, do you have a work flow in mind?

    * You can uncheck the checkbox "Generate OTP key on the
    server",
      and then you can enter a seed. Not that nice, since you must
      make up a key on your own.

    * You can get the data out of the link of the QR code.
      "Click _here_ to scan the QR code" contains the seed data.
      You could copy the link and extract it.

    So I assume you want to have the data displayed hex encoded?
    Why?

    Kind regards
    Cornelius



    Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:
    > Hi all,
    >
    >
    > Thanks for your work on this - it has proved to be a nice
    solution for
    > us.
    >
    >
    > Is there any way to manually provision the Google
    Authenticator
    > without a QR code?
    >
    >
    > Thanks!
    >
    >
    > -Kris
    > --
    > You received this message because you are subscribed to the
    Google
    > Groups "privacyidea" group.
    > To unsubscribe from this group and stop receiving emails
    from it, send
    > an email to privacyidea+unsubscribe@googlegroups.com.
    > To post to this group, send email to
    privacyidea@googlegroups.com.
    > To view this discussion on the web visit
    >

https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com
.

    > For more options, visit https://groups.google.com/d/optout.


    --
    Cornelius Kölbel
    cornelius.koelbel@netknights.it
    +49 151 2960 1417

    NetKnights GmbH
    http://www.netknights.it
    Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    Tel: +49 561 3166797, Fax: +49 561 3166798

    Amtsgericht Kassel, HRB 16405
    Geschäftsführer: Cornelius Kölbel


    --
    You received this message because you are subscribed to the
    Google Groups "privacyidea" group.
    To unsubscribe from this group and stop receiving emails from
    it, send an email to privacyidea+unsubscribe@googlegroups.com.
    To post to this group, send email to
    privacyidea@googlegroups.com.
    To view this discussion on the web visit

https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel
.

    For more options, visit https://groups.google.com/d/optout.


You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit

https://groups.google.com/d/msgid/privacyidea/CAGyTNKEQDP6r1yy0ob5MZgeR39VD4gtGma7XOf6yTwY4FXNY2g%40mail.gmail.com
.

For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
cornelius.koelbel@netknights.it
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel


You received this message because you are subscribed to the Google Groups
“privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send an
email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/1434045696.4505.44.camel%40puckel
.
For more options, visit https://groups.google.com/d/optout.

Potentially, for 2 reasons:

  1. I like to store the provisioning key for future reference, but I know
    that re-provisioning with a new key (QR) is only a minor change.
  2. For some users that do not want to use their mobile devices, I’ll give
    an encrypted USB key with a provisioned Google Auth app (
    https://winauth.com/). I also have some users at an off-site location that
    is obviously more difficult to provision.

I realize that this is not a best case for 2FA, but thought I’d ask. It
seems like my boss goes through 3 phones a year.

Thanks,
-Kris

Kris Lou
@Kris_LouOn Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel < cornelius.koelbel@netknights.it> wrote:

Hello Kris,

what do you want to achieve, do you have a work flow in mind?

  • You can uncheck the checkbox “Generate OTP key on the server”,
    and then you can enter a seed. Not that nice, since you must
    make up a key on your own.

  • You can get the data out of the link of the QR code.
    “Click here to scan the QR code” contains the seed data.
    You could copy the link and extract it.

So I assume you want to have the data displayed hex encoded?
Why?

Kind regards
Cornelius

Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:

Hi all,

Thanks for your work on this - it has proved to be a nice solution for
us.

Is there any way to manually provision the Google Authenticator
without a QR code?

Thanks!

-Kris

You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit

https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com
.

For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
cornelius.koelbel@netknights.it
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel


You received this message because you are subscribed to the Google Groups
“privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send an
email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel
.
For more options, visit https://groups.google.com/d/optout.

Easy.

You would be able to copy the seed to winauth…Am Donnerstag, den 11.06.2015, 19:15 +0200 schrieb Cornelius Kölbel:

Am Donnerstag, den 11.06.2015, 09:54 -0700 schrieb Kris Lou:

Potentially, for 2 reasons:

  1. I like to store the provisioning key for future reference, but I
    know that re-provisioning with a new key (QR) is only a minor
    change.

At the moment you would have to right click the image and save the
image as…

(I) But in future I could think of a workflow, that sends the
Enrollment information to the user, either via email or printed
(postal letter).
In this case this could also be saved.

It is rather similar to the enrollment letter in the commercial
product “SafeNet Authentication Manager”.

  1. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

OK, winauth needs the secret key to inserted as text into the
application.
This might be done by just adding the secret key in cleartext next to
the QR-Code, so that it can be copied and stored on the USB drive
easily.
(A) I think this can be easily implemented.

I also have suggestion for the offsite guys.
There is already a registration token type available.
Search — privacyIDEA 3.8 documentation
It is not visible at the UI at the moment, since it is intended to be
used for mass registration.
(A) Do you thin it needs to be added to the UI, so that the
administrator can pass the registration code to the users manually?

Kind regards
Cornelius

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.

Thanks,
-Kris

Kris Lou
klou@themusiclink.net

On Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel <@cornelinux> wrote:

    Hello Kris,
    
    what do you want to achieve, do you have a work flow in
    mind?
    
    * You can uncheck the checkbox "Generate OTP key on the
    server",
      and then you can enter a seed. Not that nice, since you
    must
      make up a key on your own.
    
    * You can get the data out of the link of the QR code.
      "Click _here_ to scan the QR code" contains the seed data.
      You could copy the link and extract it.
    
    So I assume you want to have the data displayed hex encoded?
    Why?
    
    Kind regards
    Cornelius 
    
    
    
    Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:
    > Hi all,
    >
    >
    > Thanks for your work on this - it has proved to be a nice
    solution for
    > us.
    >
    >
    > Is there any way to manually provision the Google
    Authenticator
    > without a QR code?
    >
    >
    > Thanks!
    >
    >
    > -Kris
    > --
    > You received this message because you are subscribed to
    the Google
    > Groups "privacyidea" group.
    > To unsubscribe from this group and stop receiving emails
    from it, send
    > an email to privacyidea+unsubscribe@googlegroups.com.
    > To post to this group, send email to
    privacyidea@googlegroups.com.
    > To view this discussion on the web visit
    >
    https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com.
    > For more options, visit
    https://groups.google.com/d/optout.
    
    
    --
    Cornelius Kölbel
    @cornelinux
    +49 151 2960 1417
    
    NetKnights GmbH
    http://www.netknights.it
    Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    Tel: +49 561 3166797, Fax: +49 561 3166798
    
    Amtsgericht Kassel, HRB 16405
    Geschäftsführer: Cornelius Kölbel
    
    
    --
    You received this message because you are subscribed to the
    Google Groups "privacyidea" group.
    To unsubscribe from this group and stop receiving emails
    from it, send an email to privacyidea
    +unsubscribe@googlegroups.com.
    To post to this group, send email to
    privacyidea@googlegroups.com.
    To view this discussion on the web visit
    https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel. 
    For more options, visit https://groups.google.com/d/optout.


You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it,
send an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/CAGyTNKEQDP6r1yy0ob5MZgeR39VD4gtGma7XOf6yTwY4FXNY2g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

unknown-HC2TZX (75.3 KB)

signature.asc (819 Bytes)

Hello Kris,

what do you want to achieve, do you have a work flow in mind?

  • You can uncheck the checkbox “Generate OTP key on the server”,
    and then you can enter a seed. Not that nice, since you must
    make up a key on your own.

  • You can get the data out of the link of the QR code.
    “Click here to scan the QR code” contains the seed data.
    You could copy the link and extract it.

So I assume you want to have the data displayed hex encoded?
Why?

Kind regards
CorneliusAm Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:

Hi all,

Thanks for your work on this - it has proved to be a nice solution for
us.

Is there any way to manually provision the Google Authenticator
without a QR code?

Thanks!

-Kris

You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Potentially, for 2 reasons:

  1. I like to store the provisioning key for future reference, but I
    know that re-provisioning with a new key (QR) is only a minor change.

At the moment you would have to right click the image and save the image
as…

(I) But in future I could think of a workflow, that sends the Enrollment
information to the user, either via email or printed (postal letter).
In this case this could also be saved.

It is rather similar to the enrollment letter in the commercial product
“SafeNet Authentication Manager”.

  1. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

OK, winauth needs the secret key to inserted as text into the
application.
This might be done by just adding the secret key in cleartext next to
the QR-Code, so that it can be copied and stored on the USB drive
easily.
(A) I think this can be easily implemented.

I also have suggestion for the offsite guys.
There is already a registration token type available.
http://privacyidea.readthedocs.org/en/latest/search.html?q=registration&check_keywords=yes&area=default
It is not visible at the UI at the moment, since it is intended to be
used for mass registration.
(A) Do you thin it needs to be added to the UI, so that the
administrator can pass the registration code to the users manually?

Kind regards
CorneliusAm Donnerstag, den 11.06.2015, 09:54 -0700 schrieb Kris Lou:

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.

Thanks,
-Kris

Kris Lou
klou@themusiclink.net

On Wed, Jun 10, 2015 at 9:42 PM, Cornelius Kölbel <@cornelinux> wrote:

    Hello Kris,
    
    what do you want to achieve, do you have a work flow in mind?
    
    * You can uncheck the checkbox "Generate OTP key on the
    server",
      and then you can enter a seed. Not that nice, since you must
      make up a key on your own.
    
    * You can get the data out of the link of the QR code.
      "Click _here_ to scan the QR code" contains the seed data.
      You could copy the link and extract it.
    
    So I assume you want to have the data displayed hex encoded?
    Why?
    
    Kind regards
    Cornelius
    
    
    
    
    Am Mittwoch, den 10.06.2015, 15:23 -0700 schrieb Kris Lou:
    > Hi all,
    >
    >
    > Thanks for your work on this - it has proved to be a nice
    solution for
    > us.
    >
    >
    > Is there any way to manually provision the Google
    Authenticator
    > without a QR code?
    >
    >
    > Thanks!
    >
    >
    > -Kris
    > --
    > You received this message because you are subscribed to the
    Google
    > Groups "privacyidea" group.
    > To unsubscribe from this group and stop receiving emails
    from it, send
    > an email to privacyidea+unsubscribe@googlegroups.com.
    > To post to this group, send email to
    privacyidea@googlegroups.com.
    > To view this discussion on the web visit
    >
    https://groups.google.com/d/msgid/privacyidea/d8695863-5974-47c0-a758-5c6a34b0cbf6%40googlegroups.com.
    > For more options, visit https://groups.google.com/d/optout.
    
    
    
    --
    Cornelius Kölbel
    @cornelinux
    +49 151 2960 1417
    
    NetKnights GmbH
    http://www.netknights.it
    Landgraf-Karl-Str. 19, 34131 Kassel, Germany
    Tel: +49 561 3166797, Fax: +49 561 3166798
    
    Amtsgericht Kassel, HRB 16405
    Geschäftsführer: Cornelius Kölbel
    
    
    --
    You received this message because you are subscribed to the
    Google Groups "privacyidea" group.
    To unsubscribe from this group and stop receiving emails from
    it, send an email to privacyidea+unsubscribe@googlegroups.com.
    To post to this group, send email to
    privacyidea@googlegroups.com.
    To view this discussion on the web visit
    https://groups.google.com/d/msgid/privacyidea/1433997737.22349.42.camel%40puckel.
    
    For more options, visit https://groups.google.com/d/optout.


You received this message because you are subscribed to the Google
Groups “privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send
an email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/CAGyTNKEQDP6r1yy0ob5MZgeR39VD4gtGma7XOf6yTwY4FXNY2g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Hi PCFreak,

yes, the sync-window is a problem for HOTP.
With privacyIDEA you can set autoresync.
(5.3. System Config — privacyIDEA 3.8 documentation)

It also uses a fail counter. Which is usually set to 10.
After 10 wrong login attempts and administrator needs to reset the
counter.

Kind regards
CorneliusAm Freitag, den 12.06.2015, 09:38 +0200 schrieb Der PCFreak:

Hi Cornelius,

On 12.06.2015 08:40, Cornelius Kölbel wrote:

Hi PCFreak, hi Kris,

thanks a lot for this good point.

Choosing between totp and hotp is always also a kind of a matter of…
…believes.

If the secret key gets compromised, you have a problem.
Many people say, you already have a problem, when using HOTP.

In the past I saw users, who were handed an HOTP hardware token.
As these users were lazy but clever, they pressed the button a hundred
times, and wrote down all the OTP values.
They generated a “TAN list”. They could use this sheet of paper to login
with these OTPs, which they crossed of the list.

Such things can not happen with TOTP.
I personally use TOTP for hardware token and HOTP for software token.
We have users that “play” with their hardware-token-button all the time
so totp is the choice here
to avoid problems.

For the HOTP our server (freeradius + oathtool +liboath + pam_oath is
configured to always fail
on “old” counters and only accept 5 passwords in the future and if one
“from the future” is used
the server adjusts itself to use this as the current, so for an attacker
with a copy of the token
has a harder job.

Also on the authentication server side you should implement a lockout
mechanism after too many
failed logins, then in my opinion, the security is sufficient but of
course (as always) not perfect.

Greets

PCFreak


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Insightful discussion. Thanks for all of your input.

Kris Lou
@Kris_LouOn Fri, Jun 12, 2015 at 1:09 AM, Cornelius Kölbel < cornelius.koelbel@netknights.it> wrote:

Hi PCFreak,

yes, the sync-window is a problem for HOTP.
With privacyIDEA you can set autoresync.
(
5.3. System Config — privacyIDEA 3.8 documentation
)

It also uses a fail counter. Which is usually set to 10.
After 10 wrong login attempts and administrator needs to reset the
counter.

Kind regards
Cornelius

Am Freitag, den 12.06.2015, 09:38 +0200 schrieb Der PCFreak:

Hi Cornelius,

On 12.06.2015 08:40, Cornelius Kölbel wrote:

Hi PCFreak, hi Kris,

thanks a lot for this good point.

Choosing between totp and hotp is always also a kind of a matter of…
…believes.

If the secret key gets compromised, you have a problem.
Many people say, you already have a problem, when using HOTP.

In the past I saw users, who were handed an HOTP hardware token.
As these users were lazy but clever, they pressed the button a hundred
times, and wrote down all the OTP values.
They generated a “TAN list”. They could use this sheet of paper to
login
with these OTPs, which they crossed of the list.

Such things can not happen with TOTP.
I personally use TOTP for hardware token and HOTP for software token.
We have users that “play” with their hardware-token-button all the time
so totp is the choice here
to avoid problems.

For the HOTP our server (freeradius + oathtool +liboath + pam_oath is
configured to always fail
on “old” counters and only accept 5 passwords in the future and if one
“from the future” is used
the server adjusts itself to use this as the current, so for an attacker
with a copy of the token
has a harder job.

Also on the authentication server side you should implement a lockout
mechanism after too many
failed logins, then in my opinion, the security is sufficient but of
course (as always) not perfect.

Greets

PCFreak


Cornelius Kölbel
cornelius.koelbel@netknights.it
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel


You received this message because you are subscribed to the Google Groups
“privacyidea” group.
To unsubscribe from this group and stop receiving emails from it, send an
email to privacyidea+unsubscribe@googlegroups.com.
To post to this group, send email to privacyidea@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/privacyidea/1434096573.4505.85.camel%40puckel
.
For more options, visit https://groups.google.com/d/optout.

Hi Kris,

I only would recommend to use event based otps (hotp) instead of time
based otps (totp) when you use software based otps.

Why?

Imagine someone is able to get a working and configured copy of a
software otp you deployed, then he/she could always use it because if
time based it always shows the same as the “original”.
When useing totp (event based), the otp is based on a counter which will
(if someone stole a copy of your app) not work if

a) the otp on the stolen device is “from the past”
b) the otp counter on the stolen device is too far away (usually
configurable on the server side) from the “original”

so you will detect if someone “stole” a hotp and used it because it will
fail sooner or later. with totp it will work like the “original”.

Maybe you already thought of this but I just wanted to mention.

Kind regards

PCFreakOn 11.06.2015 18:54, Kris Lou wrote:

  1. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.

Hi PCFreak, hi Kris,

thanks a lot for this good point.

Choosing between totp and hotp is always also a kind of a matter of…
…believes.

If the secret key gets compromised, you have a problem.
Many people say, you already have a problem, when using HOTP.

In the past I saw users, who were handed an HOTP hardware token.
As these users were lazy but clever, they pressed the button a hundred
times, and wrote down all the OTP values.
They generated a “TAN list”. They could use this sheet of paper to login
with these OTPs, which they crossed of the list.

Such things can not happen with TOTP.

You are right, that - if the seed is compromised or copied on purpose -
there can be 2, 3 or a thousands copies of the token, without realizing
it. So it is harder to tell, if you are compromised.
In addition, the user himself could scan the QR code twice. Or have his
friend and colleagues scan the QR code. In some scenarios this is a
problem. When IT knows, that the users already gave their passwords to
their co-workers. They probably will also give the TOTP seed to their
co-workers. In this case HOTP would be a better choice.

Anyway, if I was the attacker and get hold of the HOTP seed, and my
latest OTP does not work, I am smart enough to try

HOTP(current_counter + 10)
HOTP(current_counter + 20)
HOTP(current_counter + 40)
HOTP(current_counter + 80)

And I will get a hit…
Nevertheless, the original user will realize, that his next OTP value
will not work - since I used it.
The question is, if the original user is smart enough, to think of the
possibility, that his token is compromised.

It is hard to tell. I personally prefer HOTP token, since I experience
it to be more robust.

Thanks a lot for your input and bringing up this topic
CorneliusAm Freitag, den 12.06.2015, 07:26 +0200 schrieb Der PCFreak:

Hi Kris,

I only would recommend to use event based otps (hotp) instead of time
based otps (totp) when you use software based otps.

Why?

Imagine someone is able to get a working and configured copy of a
software otp you deployed, then he/she could always use it because if
time based it always shows the same as the “original”.
When useing totp (event based), the otp is based on a counter which will
(if someone stole a copy of your app) not work if

a) the otp on the stolen device is “from the past”
b) the otp counter on the stolen device is too far away (usually
configurable on the server side) from the “original”

so you will detect if someone “stole” a hotp and used it because it will
fail sooner or later. with totp it will work like the “original”.

Maybe you already thought of this but I just wanted to mention.

Kind regards

PCFreak

On 11.06.2015 18:54, Kris Lou wrote:

  1. For some users that do not want to use their mobile devices, I’ll
    give an encrypted USB key with a provisioned Google Auth app
    (https://winauth.com/). I also have some users at an off-site
    location that is obviously more difficult to provision.

I realize that this is not a best case for 2FA, but thought I’d ask.
It seems like my boss goes through 3 phones a year.


Cornelius Kölbel
@cornelinux
+49 151 2960 1417

NetKnights GmbH
http://www.netknights.it
Landgraf-Karl-Str. 19, 34131 Kassel, Germany
Tel: +49 561 3166797, Fax: +49 561 3166798

Amtsgericht Kassel, HRB 16405
Geschäftsführer: Cornelius Kölbel

signature.asc (819 Bytes)

Hi Cornelius,On 12.06.2015 08:40, Cornelius Kölbel wrote:

Hi PCFreak, hi Kris,

thanks a lot for this good point.

Choosing between totp and hotp is always also a kind of a matter of…
…believes.

If the secret key gets compromised, you have a problem.
Many people say, you already have a problem, when using HOTP.

In the past I saw users, who were handed an HOTP hardware token.
As these users were lazy but clever, they pressed the button a hundred
times, and wrote down all the OTP values.
They generated a “TAN list”. They could use this sheet of paper to login
with these OTPs, which they crossed of the list.

Such things can not happen with TOTP.
I personally use TOTP for hardware token and HOTP for software token.
We have users that “play” with their hardware-token-button all the time
so totp is the choice here
to avoid problems.

For the HOTP our server (freeradius + oathtool +liboath + pam_oath is
configured to always fail
on “old” counters and only accept 5 passwords in the future and if one
“from the future” is used
the server adjusts itself to use this as the current, so for an attacker
with a copy of the token
has a harder job.

Also on the authentication server side you should implement a lockout
mechanism after too many
failed logins, then in my opinion, the security is sufficient but of
course (as always) not perfect.

Greets

PCFreak