totp
Here are 338 public repositories matching this topic...
I love the library and it has been very helpful for me.
Recently, my implementation of speakeasy.totp failed a penetration test. I wrote a writeup on my findings (with a code sample to show how common this can happen with a bad implementation+configuration).
The issue: please improve the documentation (especially arou
It would be helpful to have a comprehensive documentation of the endpoints to help configure Authelia correctly in real life environments.
What would you like to be added
Allow more url variations in "step certificate inspect".
e.g.
// this works
step certificate inspect https://www.google.com
// these don't
step certificate inspect https://www.google.com/
step certificate inspect www.google.com:443
step certificate inspect www.google.com
Why this is needed
More convenience
When editing a profile with a long
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
key, push the eyeball button. You will see
AAAAAAAAAAAAAAAAAAAAAAAAA [EYEBALL]
It is missing the ellipsis,
AAAAAAAAAAAAAAAAAAAAAAAAA… [EYEBALL]
Without the ellipsis we assume the string is only as long as it looks.
-
Updated
Jun 24, 2020 - PHP
-
Updated
Jul 23, 2018 - Python
- Operating system and version: Windows 10
- YubiKey model and version: Yubico Authenticator 5.0.2
- Bug description summary: Looks like Qt problem
Steps to reproduce
- Show in System Tray checked.
- Right click on system tray icon.
- Menu popout visible.
- Trying to close menu (without success) when click away.
Expected result
Menu hides when clicking away
Actual res
-
Updated
Jun 30, 2020 - PHP
-
Updated
May 31, 2020 - Swift
-
Updated
Jul 3, 2020 - C
-
Updated
Jun 22, 2020 - Go
When using TOTP the user password should -always- go to the TOTP app, even if wrong.
It should not say "wrong password" prior to the TOTP app for security reasons. This app should not let the attacker know they have the correct password!
Current behavior:
Attempt login - wrong password - error
Attempt login - correct password - totp - error | This lets the attacker know the password is c
-
Updated
Mar 19, 2020 - Go
-
Updated
May 23, 2020 - Python
-
Updated
Jun 1, 2020 - C#
-
Updated
Jun 21, 2020 - Rust
-
Updated
May 7, 2020 - PHP
Improve this page
Add a description, image, and links to the totp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the totp topic, visit your repo's landing page and select "manage topics."


Yahoo Japan supports one time passwords using their own app. Their info page about it: https://id.yahoo.co.jp/security/otp.html
andOTP did not recognize their QR code. It's encoded as:
Also tried copy-paste but that resulted in wrong values; I might have done something wrong.
andOTP produces the correct values when enter