Oath Token

Scenario

This use case demonstrates how to add Oath as a second factor (MFA) using the Fortified ID Integrity API.

The Fortified ID Integrity API connects to the database containing the Oath token.

Prerequisite

  • FortifiedID API installed

  • Enrolled Oath Token, see the following guide for more details - Integrity Enrollment Software token

  • SQL connection details from the Integrity Enrollment configuration

Configuration

Download and add configuration

Remember that this use case does not describe installation of the products. Products are expected to be installed in advanced.

  1. Download ZIP containing configuration for Integrity API

    1. Click USE_CASE_LINK to download customer folder

  2. Add the configuration to your environment.

    1. Add the customer folder to your \..\fortifiedid\api\ folder. (Rename the existing customer folder to customer_ORG)

Update the configuration to map your environment

  1. Open config/globals.json

  2. If necessary, modify the settings in the sql1 section:

    1. "encryption_key" : Ensure it matches the one in the Enrollment configuration

    2. "url" : Please update to the correct connection URL

    3. "username", change to the correct username

    4. "password", change to the correct password

  3. Start the Fortified Integrity API services.

Test

Use the ADFS Oaht adapter guide to test the configuration

Last updated