Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

If you want to subscribe to this forum, use your Facebook account, or send us an email to forum - at - multiotp - dot - net and we will send you back an invitation.

adminf

About

Username
adminf
Joined
Visits
68
Last Active
Roles
Administrator

Comments

  • HOW CAN I UPGRADE FROM A PREVIOUS VERSION ? !!! Be careful when you upgrade your multiOTP open source Virtual Appliance !!! The multiOTP open source Virtual Appliance is using the files in raspberry/boot-part/multiotp-tree/usr/local/bin/multiotp…
  • HOW CAN I UPGRADE FROM A PREVIOUS VERSION ? !!! Be careful when you upgrade your multiOTP open source Virtual Appliance !!! The multiOTP open source Virtual Appliance is using the files in raspberry/boot-part/multiotp-tree/usr/local/bin/multiotp…
  • An ugly hack could be to simulate a DC server on the multiOTP server, and therefore, we could receive the NTLM hash of any users, and we could use them to compare the MSCHAPv2 result, but it's really not very clean. Regards
  • Hello, Unfortunately, we cannot re-use the MSCHAPv2 to authenticate against the AD using LDAP/AD, as MSCHAPv2 doesn't contains a hash of the password, but a hash (calculate using the password) of a dynamic negotiated content. Regards, Andre
  • ldap_in_group : the user must be at least in one of these groups to be synchroniued. Leave empty if you want every users of the baseDN ldap_groups_dn : is not used yet, for future use, to give another DN for the groups the users are in (now the gr…
  • Hello, If you want to upgrade the VM provided on www.multiotp.net, using the last build 5.0.3.7, please extract the following files from /raspberry/boot-part/multiotp-tree/usr/local/bin/multiotp and put them into /usr/local/bin/multiotp: index…
  • Hello, If you want to upgrade the VM provided on www.multiotp.net, using the last build 5.0.3.7, please extract the following files from /raspberry/boot-part/multiotp-tree/usr/local/bin/multiotp and put them into /usr/local/bin/multiotp: index…
  • When Seamoon will provide PSKC provisioning file, it will be possible to automatically import the seeds with multiOTP. Regards
  • Here is the answer of Seamoon: (...) Normally we based the clients requirement, we can provide the hex clear seed, or clear Based64 seed. and we plan to provide pskc format seed at 2017. So please just ask your client send one email to me, i c…
  • The RFC 4226 is the standard describing how the HOTP is calculated, this is already implemented and it's not a problem. But Seamoon don't use a standard format for their seeds file, which is the problem to import their tokens. We are waiting n…
  • Are you using a Seamoon KingKey ? Only these tokens from Seamoon have been tested, with the following parameters: TOTP, 6 digits, 60 seconds time interval. The seeds were extracted manually from the SMD file provided.
  • Hello, We have asked the question to Seamoon, previous oath/hotp SMD file was provided in this format by Seamoon: 797000942,0AGWmrbqNODDWhhVCtCD (serial number, and seed in Base64). In your example, the serial number is 795100000, followed by aga…
  • Online web interface demo is also available; http://www.multiotp.com/demo
  • Yes, the Pro version has a built in FreeRADIUS radius server, a full web based configuration interface, ... Regards
  • Hello, The log file is in the multiotp/log/ folder, the filename is multiotp.log. What is the content of the log ? What is the version of the multiOTP open source library you are using ? What is the error message in the Cisco WCL log ? Whi…
  • As you have a Windows 2012 server, you could also try the Hyper-V open source virtual appliance available here: http://download.multiotp.net/hyper-v/
  • Did you try your username/password on the web interface of multiOTP open source (or using the command line) ? Does it work ?
  • Please check the log file on multiOTP, what is written ? Same for Cisco WCL, what says the logfile ?
  • Instead of:     Username: username     Password: [password] + [OTP] You can now use:     Username: username:OTP     Password: password Example for username = john, password = myBigPassword, OTP = 123456     Username: john:123456     Password: m…
  • Hello Rager, The resolution has been treated in the initial request here. The whole source is also provided in the package. multiotp.windows.php is the same as multiotp.php, except for the first line which is removed for windows (the line containi…
  • Hello, Cool, can you please give us the issues ? Regards, Andre
  • Hello, In debug mode, the first information are expected (it's regular debug information). The exhausted memory is due to recursive groups detection. I have done a new beta build with the following limitations: - the primary group of a user cannot b…
  • Hello Rager, Have a look here : http://download.multiotp.net/beta/ 5.0.3.2-beta-1 is available Regards, Andre
  • New 5.0.3.2-beta-1 will be available in about two hours... :-)
  • We are doing some tests on the new algorithm, as huge memory consumption is not a long term solution (and not a long term too :-). Stay tuned, we come back soon to you.
  • Hello, The issue is based on the algorithm to find which users are in which groups. The algorithm is done with cache in order to have high efficiency on small/medium AD, but when there is a lot of groups, the cache is going crazy. The dfficulty is …
  • Hello Rager, Can you give us a short description of your AD, especially: - how many users in total - how many groups in total - how many users in a group (for the biggest group) Best regards, Andre
  • Hello, the CTO will evaluate your service and contact you if needed. Best regards.
  • More information requested by email directly, the ticket will be enhanced after a response will be received.
  • If you are sharing the same installation between the command line version and the PHP version, please change your encryption key: $multiotp = new Multiotp('DefaultCliEncryptionKey');