This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP JOTP Project"
Rob Upcraft (talk | contribs) (→Quick Download) |
Rob Upcraft (talk | contribs) (→Description) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
==OWASP jOTP== | ==OWASP jOTP== | ||
− | OWASP jOTP is a | + | OWASP jOTP is a microservice implemented in Java that can be used to generate, validate, and automatically expire one-time use password tokens. |
==Description== | ==Description== | ||
A common use case for jOTP is as follows: | A common use case for jOTP is as follows: | ||
− | 1. Client | + | 1. Client applications displays a login page requesting the user enter his/her username and password. |
− | + | 2. If the credentials check passes, the user's email is looked up and a message containing the token is sent. | |
− | + | 3. The application then requests that the OTP token that was sent be entered in a text box. Once entered, it is sent to jOTP. | |
− | + | 4. jOTP validates the token. If the token was valid, the application finishes authenticating the user. If the token was not valid, the user is redirected to the login page. | |
− | |||
==Licensing== | ==Licensing== | ||
Line 42: | Line 41: | ||
== Quick Download == | == Quick Download == | ||
− | * [https://bintray.com/upcrob/ | + | * [https://bintray.com/upcrob/generic/jOTP/_latestVersion Bintray Download] |
* [https://github.com/upcrob/jOTP GitHub Repository] | * [https://github.com/upcrob/jOTP GitHub Repository] | ||
Latest revision as of 22:36, 13 March 2016
OWASP jOTPOWASP jOTP is a microservice implemented in Java that can be used to generate, validate, and automatically expire one-time use password tokens. DescriptionA common use case for jOTP is as follows: 1. Client applications displays a login page requesting the user enter his/her username and password. 2. If the credentials check passes, the user's email is looked up and a message containing the token is sent. 3. The application then requests that the OTP token that was sent be entered in a text box. Once entered, it is sent to jOTP. 4. jOTP validates the token. If the token was valid, the application finishes authenticating the user. If the token was not valid, the user is redirected to the login page. LicensingOWASP jOTP is available under the BSD 2-Clause License.
|
What is jOTP?OWASP jOTP provides:
Project LeaderRob Upcraft
|
Quick DownloadEmail ListOWASP jOTP Mailing List NOTE: Include "jOTP" in the subject heading of all emails to this list. News and EventsClassifications |
- Where can OWASP jOTP be downloaded?
- The source code, along with basic documentation, is located here: GitHub Repository
- I can see the /sys/monitor endpoint, but when I try to test the other endpoints (eg. /otp/validate), I don't get anything in the response.
- The endpoints under /otp only respond to POST requests, and will return an empty response if they are requested via GET.
Volunteers
OWASP jOTP is developed by a worldwide team of volunteers. The primary contributors to date have been:
- Rob Upcraft
As of April 2014, the priorities are:
Development work for jOTP is largely complete as of now. Because it is intended to be lightweight and focused on this use case, the feature set is not planned to grow significantly, if at all. Most future work will include bug fixes, and additional customization options developed on an as-needed basis.
Involvement in the development and promotion of OWASP jOTP is actively encouraged! You do not have to be a security expert in order to contribute.
Some of the ways you can help:
- Submit issues to the GitHub repository.
- Submit pull requests for fixes to the GitHub repository.