![]() ![]() Test your token at Symantec's website to confirm you've set it up right.You can also use yubioath-gui if you prefer a GUI. We use read above to avoid saving the secret into our bash history. $ yubioath put -name VSST89795985 -oath-type totp -touch "$totpsecret" $ read -p "Enter the secret: " totpsecretĮnter the secret: KVIMXW236KKUVMSVNYKZOBFPTWMKMPKZ Then simply load the secret onto your Yubikey and test as follows:.If you want to back up the credential or also load it into a tool like Google Authenticator, now is the time to generate a QR code, see the python-vipaccess README This gives you the TOTP secret and token ID. Oathtool -v -b -totp KVIMXW236KKUVMSVNYKZOBFPTWMKMPKZ #. Oathtool -b -totp KVIMXW236KKUVMSVNYKZOBFPTWMKMPKZ # output one code You can use oathtool to generate the same OTP codesĪs would be produced by the official VIP Access apps: You will need the ID to register this credential: VSST89795985 This credential expires on this date: T16:24:42.226Z Otpauth://totp/VIP%20Access: VSST89795985?secret= KVIMXW236KKUVMSVNYKZOBFPTWMKMPKZ&digits=6&algorithm=SHA1&issuer=Symantec&period=30 Install python-vipaccess with pip3 install python-vipaccess and yubioath with sudo apt-get install yubioath-desktopĮxecute python-vipaccess from wherever pip installed it (in my case ~/.local/bin/vipaccess) like so: More difficult to back up, as counter changes on every code use.Yubikey keyboard emulation works - no software needed.Based on counter - new code every button press.Requires a program on your computer - cannot use Yubikey's keyboard emulation.Based on time - new code every 30 seconds.The other option is HOTP which uses a counter instead - this is what the Symantec VIP Hardware Authenticator does, and simplifies things on devices like the Yubikey that don't have built-in clocks. The codes generated by the Symantec VIP Access phone app (and the likes of Google Authenticator) are TOTP codes - the code depends on the time. If you don't already have a Yubikey, you might also consider a Symantec VIP Hardware Authenticator which is less than half the price of the Yubikey I used - but I already have the Yubikey and the Hardware Authenticator doesn't ship to the UK TOTP vs HOTP ![]() It does not store any personal data.You can generate Symantec VIP Access credentials and load them onto any Yubikey that supports TOTP or HOTP (i.e. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |