This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP JOTP Project"
From OWASP
Rob Upcraft (talk | contribs) (→OWASP jOTP) |
Rob Upcraft (talk | contribs) (→Description) |
||
Line 13: | Line 13: | ||
A common use case for jOTP is as follows: | A common use case for jOTP is as follows: | ||
− | 1. Client | + | 1. Client applications displays a login page requesting the user enter his/her username and password. |
− | + | 2. If the credentials check passes, the user's email is looked up and a message containing the token is sent. | |
− | + | 3. The application then requests that the OTP token that was sent be entered in a text box. Once entered, it is sent to jOTP. | |
− | + | 4. jOTP validates the token. If the token was valid, the application finishes authenticating the user. If the token was not valid, the user is redirected to the login page. | |
− | |||
==Licensing== | ==Licensing== |