PingOne

(Workforce Only) Configuring OATH token authentication for PingID

PingID allows users to pair an OATH token to their account or app and use it to sign on to your company services and applications with the added security of multi-factor authentication (MFA).

Before you begin

To configure OATH tokens, you must have the following items from each token manufacturer and for each supplied token model:

  • A token seed file. The seed file can be either:

    • A .txt file consisting of lines with a comma separating the token serial numbers and secret keys (without spaces)

    • A .csv file with the token serial numbers and secret keys in different cells (without spaces or commas)

      The secret keys are strings of hexadecimal digits.

  • For each seed file, a single associated token type of either TOTP or HOTP.

  • For TOTP types, a refresh interval of 30 - 60 seconds, and a hash algorithm of either SHA1, SHA256, or SHA512. The default values are 30 seconds, and SHA256 respectively.

For HOTP types, a start counter can be appended as an additional field in the seed file. If absent, it defaults to 0.

Supported OATH tokens

PingID supports hardware OTP tokens that are OATH compliant:

  • HOTP SHA-1 devices

  • TOTP SHA-1, SHA-256, and SHA-512 devices with 30 or 60 second OTP refresh intervals

  • Any of the above devices that use a PIN code

Ping Identity does not:

  • Sell hardware tokens

  • Recommend any particular hardware token manufacturer

The following OATH tokens have been checked for user authentication by PingID.

Manufacturer Model Type

Feitian

Display card

TOTP-60-sec

Feitian

OTP c200

TOTP-60-sec

Feitian

Display card

HOTP

Gemalto

EZIO display card

TOTP-30-sec

HyperSecu

c100 token

HOTP

HyperSecu

Edge plus

TOTP-60-sec

HyperSecu

c200 token

TOTP-30-sec

HyperSecu

HyperOTP

TOTP-60-sec

HyperSecu

Edge plus

TOTP-30-sec

Protectimus

Protectimus TWO

TOTP-30-sec

About this task

OATH hardware tokens can be used to generate a one-time passcode (OTP) with which to authenticate. OATH hardware tokens can be useful in situations where users do not or cannot have access to the internet, a USB connection, or a mobile device for security reasons.

Learn more about the user experience in the PingID End User Guide.

To add OATH tokens as an authentication method for MFA:

Steps