Skip to main content
Skip table of contents

OATH For Authenticator Apps

My-Access offers authentication through OATH to generate TOTPs on mobile Authenticator Apps such as Google Authenticator, Microsoft Authenticator or any other eligible application.

Enrollment Process

Activation

Users need a specific right to be able to enroll this authentication method.

This activation can be done:

  • Manually by an administrator

  • Automatically from Memority policy (identity or role) which can use identity attributes characteristic

Enrollment

To be able to send an OTP on email address or SMS, users must be enrolled either:

  • Manually through the Memority portal

  • Automatically from Memority policy based on identity attributes

Self Service

Self-Service features may rely on the Self-Service Authentication Hub provided by My-Keys.

From the End User Memority portal, users can access the OATH enrollment feature in order to:

  • Enroll new Authenticator Apps

  • Manage enrolled Authenticator apps (rename or remove)

SCREENSHOT AUTHENTICATOR APPS FROM SECURITY TAB

When enrolling an Authenticator app, users must follow several steps:

Step 1: Download your preferred OATH-compatible Authenticator App (or the Entreprise-approved app)

Memority is compatible with major Authenticator Apps such as Google Authenticator or Microsoft Authenticator.

The interface can be customized to display download links to the Entreprise-approved application.

image-20240722-093419.png

Step 2: Scan the QR code or manually type the provided key

image-20240709-160153.png

Step 3: Confirm enrollment by entering the OTP generated on your phone in Memority.

image-20240709-160342.png

Administration

Administrators can manage enrollment(s) using the Self-Service Authentication Hub provided by My-Keys, displaying valuable information about each enrolled device:

  • Status

  • Enrollment date

  • Last Used date with some information about it (IP, …)

For each enrollment they can:

  • Disable it: While the enrollment is disabled it cannot be used by the user to authenticate, but the enrollment is not deleted so it can be used again once it has been reactivated.

  • Remove it: After the deletion, users with other enrollments will be able to use them to authenticate. Otherwise, they may have to enroll a new OATH device to authenticate using this method.

image-20240722-101144.png

By design, OATH OTPs contain 6 digits and expire every 30 seconds.

Authentication Process

As for other authentication modes, once the method activated and an OATH device is enrolled, a new module will be available.

image-20240709-160745.png

After selecting the OATH device authentication (e.g. Google Authenticator), retrieve the generated OTP on your device and enter it in the Memority login page.

image-20240709-160833.png

Once authentication is successful, users will be redirected to the application.

Read Next

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.