![]() ![]() It will be require to choose a location for the log file, unless this was already done before.Ĭontinue with configuring other YubiKeys in the same manner (make sure they have unique Identifier and secret keys). Once configuration is done, click "Write Configuration". Secret Key: Click the "generate" button to get a new key Moving Factor Seed: Any of the three options is fine (Fixed zero | Fixed | Randomize, sets the initial counter value for generating token codes) for FortiAuthenticator HOTP Length: Both options are compatible with FortiAuthenticator (controls the length of the token codes being generated) Set the first two fields to "ub" "nu", then click "Generate MUI" to generate a random identifier for the token OATH Token Identifier: “OMP + TT Modhex, rest numeric” Slot 2 - triggered after a three-second press of the buttonĬonfigure these options to ensure compatibility with FortiAuthenticator: Slot 1 - triggered after a short press of the button The slots differ in how they are triggered: In the OATH-HOTP tab, choose the advanced configuration version. In the Settings tab, ensure that Logging has enabled output and “traditional” format is set. YubiKey Personalization tool (required to configure YubiKeys): ġ) Reprogram the YubiKey to generate HOTP codes ![]() If theYubiKey does not support OATH-HOTP, it won't be possible to use it with FortiAuthenticator. Note: Only the OATH-HOTP function is supported in FortiAuthenticator. This article describes how to configure and import YubiKeys to FortiAuthenticator, for two-factor authentication. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |