Hello,
Thanks to both of you for your tips.
We were aware of both methods you suggested, but we were hoping there was another one we were not aware of.
I think that if we do need to implement this, we will try the custom infomap "batch".
Is there any InfoMap execution maximum time that could interfere ?
@Peter Volckaert we are evaluating what it would take to migrate TOTP management from ISAM to our dedicated backend (EAI). Today the authentication methods for our customer accounts are split between our EAI and ISAM (for TOTP and FIDO2), and we are thinking about moving everything to our EAI to minimize complexity.
------------------------------
André Leruitte
------------------------------
Original Message:
Sent: Wed April 05, 2023 01:37 AM
From: Shane Weeden
Subject: Retrieving TOTP secret keys
We don't publish information on the obfuscation algorithm - my advice would be to batch the extraction via a custom InfoMap using the
IDMappingExtUtils.retrieveTotpSecretKey(String username)
API as Peter pointed out. If there are such a number that this becomes impractical, then best reach out to support to see what they suggest an alternative might be.
------------------------------
Shane Weeden
IBM
Original Message:
Sent: Mon April 03, 2023 08:29 AM
From: André Leruitte
Subject: Retrieving TOTP secret keys
Hello everybody,
We are using ISAM (AAC) to store TOTP secret keys for our users. Everything is working as intended, our users are able to enroll and strongly authenticate using their TOTP client.
We would like to export those TOTP secret keys, but we are unable to understand the format of the table USER_ATTRIBUTES_VALUES that stores the totp secret keys. It seems that they are always starting with "{obf2}" and that there is some base64 encoding that is used, but we are unable to transform back to the secret key.
Does somebody know what transformation steps are performed in order for ISAM to store the secret totp key ?
Thanks for any help !
------------------------------
André Leruitte
------------------------------