2017-01-30 19:02:31 +00:00
|
|
|
<?php
|
|
|
|
namespace LAM\LIB\TWO_FACTOR;
|
2017-01-31 19:50:51 +00:00
|
|
|
use \selfServiceProfile;
|
2017-02-11 18:39:05 +00:00
|
|
|
use \LAMConfig;
|
2017-01-31 19:50:51 +00:00
|
|
|
|
2017-01-30 19:02:31 +00:00
|
|
|
/*
|
|
|
|
This code is part of LDAP Account Manager (http://www.ldap-account-manager.org/)
|
2019-01-01 09:54:31 +00:00
|
|
|
Copyright (C) 2017 - 2019 Roland Gruber
|
2017-01-30 19:02:31 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* 2-factor authentication
|
|
|
|
*
|
|
|
|
* @package two_factor
|
|
|
|
* @author Roland Gruber
|
|
|
|
*/
|
|
|
|
|
|
|
|
interface TwoFactorProvider {
|
|
|
|
|
2017-01-31 19:50:51 +00:00
|
|
|
/**
|
|
|
|
* Returns a list of serial numbers of the user's tokens.
|
|
|
|
*
|
|
|
|
* @param string $user user name
|
|
|
|
* @param string $password password
|
2018-12-26 08:39:51 +00:00
|
|
|
* @return string[] serials
|
2017-01-31 19:50:51 +00:00
|
|
|
* @throws \Exception error getting serials
|
|
|
|
*/
|
|
|
|
public function getSerials($user, $password);
|
|
|
|
|
2017-01-30 19:02:31 +00:00
|
|
|
/**
|
|
|
|
* Verifies if the provided 2nd factor is valid.
|
|
|
|
*
|
|
|
|
* @param string $user user name
|
|
|
|
* @param string $password password
|
2017-02-08 17:45:15 +00:00
|
|
|
* @param string $serial serial number of token
|
2017-01-30 19:02:31 +00:00
|
|
|
* @param string $twoFactorInput input for 2nd factor
|
2017-01-31 19:50:51 +00:00
|
|
|
* @return boolean true if verified and false if verification failed
|
2017-01-30 19:02:31 +00:00
|
|
|
* @throws \Exception error during check
|
|
|
|
*/
|
2017-02-08 17:45:15 +00:00
|
|
|
public function verify2ndFactor($user, $password, $serial, $twoFactorInput);
|
2017-01-30 19:02:31 +00:00
|
|
|
|
2018-12-31 09:51:44 +00:00
|
|
|
|
|
|
|
|
2017-01-30 19:02:31 +00:00
|
|
|
}
|
|
|
|
|
2017-01-31 19:50:51 +00:00
|
|
|
/**
|
|
|
|
* Provider for privacyIDEA.
|
|
|
|
*/
|
2017-01-30 19:02:31 +00:00
|
|
|
class PrivacyIDEAProvider implements TwoFactorProvider {
|
|
|
|
|
2017-02-11 18:39:05 +00:00
|
|
|
private $config;
|
2017-01-31 19:50:51 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Constructor.
|
|
|
|
*
|
2017-02-11 18:39:05 +00:00
|
|
|
* @param TwoFactorConfiguration $config configuration
|
2017-01-31 19:50:51 +00:00
|
|
|
*/
|
2017-02-11 18:39:05 +00:00
|
|
|
public function __construct(&$config) {
|
|
|
|
$this->config = $config;
|
2017-01-31 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* {@inheritDoc}
|
|
|
|
* @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials()
|
|
|
|
*/
|
|
|
|
public function getSerials($user, $password) {
|
|
|
|
logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Getting serials for ' . $user);
|
|
|
|
$token = $this->authenticate($user, $password);
|
|
|
|
return $this->getSerialsForUser($user, $token);
|
|
|
|
}
|
|
|
|
|
2017-01-30 19:02:31 +00:00
|
|
|
/**
|
|
|
|
* {@inheritDoc}
|
|
|
|
* @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor()
|
|
|
|
*/
|
2017-02-08 17:45:15 +00:00
|
|
|
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
|
2017-01-30 19:02:31 +00:00
|
|
|
logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Checking 2nd factor for ' . $user);
|
2017-01-31 19:50:51 +00:00
|
|
|
$token = $this->authenticate($user, $password);
|
2017-02-08 17:45:15 +00:00
|
|
|
return $this->verify($token, $serial, $twoFactorInput);
|
2017-01-30 19:02:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Authenticates against the server
|
|
|
|
*
|
2017-01-31 19:50:51 +00:00
|
|
|
* @param string $user user name
|
|
|
|
* @param string $password password
|
2017-01-30 19:02:31 +00:00
|
|
|
* @return string token
|
|
|
|
* @throws \Exception error during authentication
|
|
|
|
*/
|
2017-01-31 19:50:51 +00:00
|
|
|
private function authenticate($user, $password) {
|
|
|
|
$curl = $this->getCurl();
|
2017-02-11 18:39:05 +00:00
|
|
|
$url = $this->config->twoFactorAuthenticationURL . "/auth";
|
2017-01-31 19:50:51 +00:00
|
|
|
curl_setopt($curl, CURLOPT_URL, $url);
|
|
|
|
$header = array('Accept: application/json');
|
|
|
|
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
|
|
|
|
$options = array(
|
|
|
|
'username' => $user,
|
|
|
|
'password' => $password,
|
|
|
|
);
|
|
|
|
curl_setopt($curl, CURLOPT_POSTFIELDS, $options);
|
|
|
|
$json = curl_exec($curl);
|
|
|
|
curl_close($curl);
|
|
|
|
if (empty($json)) {
|
|
|
|
throw new \Exception("Unable to get server response from $url.");
|
|
|
|
}
|
|
|
|
$output = json_decode($json);
|
|
|
|
if (empty($output) || !isset($output->result) || !isset($output->result->status)) {
|
|
|
|
throw new \Exception("Unable to get json from $url.");
|
|
|
|
}
|
|
|
|
$status = $output->result->status;
|
|
|
|
if ($status != 1) {
|
|
|
|
$errCode = isset($output->result->error) && isset($output->result->error->code) ? $output->result->error->code : '';
|
|
|
|
$errMessage = isset($output->result->error) && isset($output->result->error->message) ? $output->result->error->message : '';
|
|
|
|
throw new \Exception("Unable to login: " . $errCode . ' ' . $errMessage);
|
|
|
|
}
|
|
|
|
if (!isset($output->result->value) || !isset($output->result->value->token)) {
|
|
|
|
throw new \Exception("Unable to get token.");
|
|
|
|
}
|
|
|
|
return $output->result->value->token;
|
2017-01-30 19:02:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the curl object.
|
|
|
|
*
|
|
|
|
* @return object curl handle
|
|
|
|
* @throws \Exception error during curl creation
|
|
|
|
*/
|
2017-01-31 19:50:51 +00:00
|
|
|
private function getCurl() {
|
2017-01-30 19:02:31 +00:00
|
|
|
$curl = curl_init();
|
2017-02-11 18:39:05 +00:00
|
|
|
if ($this->config->twoFactorAuthenticationInsecure) {
|
2017-01-31 19:50:51 +00:00
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
|
|
|
|
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 0);
|
|
|
|
}
|
|
|
|
curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
|
2017-01-30 19:02:31 +00:00
|
|
|
return $curl;
|
|
|
|
}
|
|
|
|
|
2017-01-31 19:50:51 +00:00
|
|
|
/**
|
|
|
|
* Returns the serial numbers of the user.
|
|
|
|
*
|
|
|
|
* @param string $user user name
|
|
|
|
* @param string $token login token
|
2018-12-26 08:39:51 +00:00
|
|
|
* @return string[] serials
|
2017-01-31 19:50:51 +00:00
|
|
|
* @throws \Exception error during serial reading
|
|
|
|
*/
|
|
|
|
private function getSerialsForUser($user, $token) {
|
|
|
|
$curl = $this->getCurl();
|
2017-02-11 18:39:05 +00:00
|
|
|
$url = $this->config->twoFactorAuthenticationURL . "/token/?user=" . $user;
|
2017-01-31 19:50:51 +00:00
|
|
|
curl_setopt($curl, CURLOPT_URL, $url);
|
|
|
|
$header = array('Authorization: ' . $token, 'Accept: application/json');
|
|
|
|
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
|
|
|
|
$json = curl_exec($curl);
|
|
|
|
curl_close($curl);
|
|
|
|
if (empty($json)) {
|
|
|
|
throw new \Exception("Unable to get server response from $url.");
|
|
|
|
}
|
|
|
|
$output = json_decode($json);
|
|
|
|
if (empty($output) || !isset($output->result) || !isset($output->result->status)) {
|
|
|
|
throw new \Exception("Unable to get json from $url.");
|
|
|
|
}
|
|
|
|
$status = $output->result->status;
|
|
|
|
if (($status != 1) || !isset($output->result->value) || !isset($output->result->value->tokens)) {
|
|
|
|
$errCode = isset($output->result->error) && isset($output->result->error->code) ? $output->result->error->code : '';
|
|
|
|
$errMessage = isset($output->result->error) && isset($output->result->error->message) ? $output->result->error->message : '';
|
|
|
|
throw new \Exception("Unable to get serials: " . $errCode . ' ' . $errMessage);
|
|
|
|
}
|
|
|
|
$serials = array();
|
|
|
|
foreach ($output->result->value->tokens as $tokenEntry) {
|
|
|
|
if (!isset($tokenEntry->active) || ($tokenEntry->active != 1) || !isset($tokenEntry->serial)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$serials[] = $tokenEntry->serial;
|
|
|
|
}
|
|
|
|
return $serials;
|
|
|
|
}
|
|
|
|
|
2017-02-08 17:45:15 +00:00
|
|
|
/**
|
|
|
|
* Verifies if the given 2nd factor input is valid.
|
|
|
|
*
|
|
|
|
* @param string $token login token
|
|
|
|
* @param string $serial serial number
|
|
|
|
* @param string $twoFactorInput 2factor pin + password
|
|
|
|
*/
|
|
|
|
private function verify($token, $serial, $twoFactorInput) {
|
|
|
|
$curl = $this->getCurl();
|
2017-02-11 18:39:05 +00:00
|
|
|
$url = $this->config->twoFactorAuthenticationURL . "/validate/check";
|
2017-02-08 17:45:15 +00:00
|
|
|
curl_setopt($curl, CURLOPT_URL, $url);
|
|
|
|
$options = array(
|
|
|
|
'pass' => $twoFactorInput,
|
|
|
|
'serial' => $serial,
|
|
|
|
);
|
|
|
|
curl_setopt($curl, CURLOPT_POSTFIELDS, $options);
|
|
|
|
$header = array('Authorization: ' . $token, 'Accept: application/json');
|
|
|
|
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
|
|
|
|
$json = curl_exec($curl);
|
|
|
|
curl_close($curl);
|
|
|
|
$output = json_decode($json);
|
|
|
|
if (empty($output) || !isset($output->result) || !isset($output->result->status) || !isset($output->result->value)) {
|
|
|
|
throw new \Exception("Unable to get json from $url.");
|
|
|
|
}
|
|
|
|
$status = $output->result->status;
|
|
|
|
$value = $output->result->value;
|
|
|
|
if (($status == 'true') && ($value == 'true')) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
logNewMessage(LOG_DEBUG, "Unable to verify token: " . print_r($output, true));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-01-31 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2018-12-31 09:51:44 +00:00
|
|
|
/**
|
|
|
|
* Authentication via YubiKeys.
|
|
|
|
*
|
|
|
|
* @author Roland Gruber
|
|
|
|
*/
|
|
|
|
class YubicoProvider implements TwoFactorProvider {
|
|
|
|
|
|
|
|
private $config;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Constructor.
|
|
|
|
*
|
|
|
|
* @param TwoFactorConfiguration $config configuration
|
|
|
|
*/
|
|
|
|
public function __construct(&$config) {
|
|
|
|
$this->config = $config;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* {@inheritDoc}
|
|
|
|
* @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials()
|
|
|
|
*/
|
|
|
|
public function getSerials($user, $password) {
|
2018-12-31 11:39:20 +00:00
|
|
|
$keyAttributeName = strtolower($this->config->twoFactorAuthenticationSerialAttributeName);
|
2019-01-01 09:54:31 +00:00
|
|
|
if (isset($_SESSION['selfService_clientDN'])) {
|
|
|
|
$loginDn = lamDecrypt($_SESSION['selfService_clientDN'], 'SelfService');
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$loginDn = $_SESSION['ldap']->getUserName();
|
|
|
|
}
|
2018-12-31 09:51:44 +00:00
|
|
|
$handle = getLDAPServerHandle();
|
|
|
|
$ldapData = ldapGetDN($loginDn, array($keyAttributeName), $handle);
|
|
|
|
if (empty($ldapData[$keyAttributeName])) {
|
|
|
|
return array();
|
|
|
|
}
|
|
|
|
return array(implode(', ', $ldapData[$keyAttributeName]));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* {@inheritDoc}
|
|
|
|
* @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor()
|
|
|
|
*/
|
|
|
|
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
|
|
|
|
include_once(__DIR__ . "/3rdParty/yubico/Yubico.php");
|
|
|
|
$serialData = $this->getSerials($user, $password);
|
|
|
|
if (empty($serialData)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$serials = explode(', ', $serialData[0]);
|
|
|
|
$serialMatched = false;
|
|
|
|
foreach ($serials as $serial) {
|
|
|
|
if (strpos($twoFactorInput, $serial) === 0) {
|
|
|
|
$serialMatched = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!$serialMatched) {
|
|
|
|
throw new \Exception(_('YubiKey id does not match allowed list of key ids.'));
|
|
|
|
}
|
|
|
|
$url = $this->config->twoFactorAuthenticationURL;
|
|
|
|
$httpsverify = !$this->config->twoFactorAuthenticationInsecure;
|
|
|
|
$clientId = $this->config->twoFactorAuthenticationClientId;
|
|
|
|
$secretKey = $this->config->twoFactorAuthenticationSecretKey;
|
|
|
|
$auth = new \Auth_Yubico($clientId, $secretKey, $url, $httpsverify);
|
|
|
|
$auth->verify($twoFactorInput);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-01-31 19:50:51 +00:00
|
|
|
/**
|
|
|
|
* Returns the correct 2 factor provider.
|
|
|
|
*/
|
|
|
|
class TwoFactorProviderService {
|
|
|
|
|
2017-02-11 17:16:08 +00:00
|
|
|
/** 2factor authentication disabled */
|
|
|
|
const TWO_FACTOR_NONE = 'none';
|
|
|
|
/** 2factor authentication via privacyIDEA */
|
|
|
|
const TWO_FACTOR_PRIVACYIDEA = 'privacyidea';
|
2018-12-31 09:51:44 +00:00
|
|
|
/** 2factor authentication via YubiKey */
|
|
|
|
const TWO_FACTOR_YUBICO = 'yubico';
|
2017-02-11 17:16:08 +00:00
|
|
|
|
2017-02-11 18:39:05 +00:00
|
|
|
private $config;
|
2017-01-31 19:50:51 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Constructor.
|
|
|
|
*
|
2017-02-11 18:39:05 +00:00
|
|
|
* @param selfServiceProfile|LAMConfig $configObj profile
|
2017-01-31 19:50:51 +00:00
|
|
|
*/
|
2017-02-11 18:39:05 +00:00
|
|
|
public function __construct(&$configObj) {
|
|
|
|
if ($configObj instanceof selfServiceProfile) {
|
|
|
|
$this->config = $this->getConfigSelfService($configObj);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$this->config = $this->getConfigAdmin($configObj);
|
|
|
|
}
|
2017-01-31 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the provider for the given type.
|
|
|
|
*
|
|
|
|
* @param string $type authentication type
|
|
|
|
* @return TwoFactorProvider provider
|
|
|
|
* @throws \Exception unable to get provider
|
|
|
|
*/
|
|
|
|
public function getProvider() {
|
2017-02-11 18:39:05 +00:00
|
|
|
if ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA) {
|
|
|
|
return new PrivacyIDEAProvider($this->config);
|
2017-01-31 19:50:51 +00:00
|
|
|
}
|
2018-12-31 09:51:44 +00:00
|
|
|
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
|
|
|
|
return new YubicoProvider($this->config);
|
|
|
|
}
|
2017-02-11 18:39:05 +00:00
|
|
|
throw new \Exception('Invalid provider: ' . $this->config->twoFactorAuthentication);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the configuration from self service.
|
|
|
|
*
|
|
|
|
* @param selfServiceProfile $profile profile
|
|
|
|
* @return TwoFactorConfiguration configuration
|
|
|
|
*/
|
|
|
|
private function getConfigSelfService(&$profile) {
|
2018-12-31 09:51:44 +00:00
|
|
|
$tfConfig = new TwoFactorConfiguration();
|
|
|
|
$tfConfig->twoFactorAuthentication = $profile->twoFactorAuthentication;
|
|
|
|
$tfConfig->twoFactorAuthenticationInsecure = $profile->twoFactorAuthenticationInsecure;
|
|
|
|
$tfConfig->twoFactorAuthenticationURL = $profile->twoFactorAuthenticationURL;
|
2019-01-01 09:54:31 +00:00
|
|
|
$tfConfig->twoFactorAuthenticationClientId = $profile->twoFactorAuthenticationClientId;
|
|
|
|
$tfConfig->twoFactorAuthenticationSecretKey = $profile->twoFactorAuthenticationSecretKey;
|
|
|
|
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
|
|
|
|
$moduleSettings = $profile->moduleSettings;
|
|
|
|
if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) {
|
|
|
|
$tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId';
|
|
|
|
}
|
|
|
|
}
|
2018-12-31 09:51:44 +00:00
|
|
|
return $tfConfig;
|
2017-01-31 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-02-11 18:54:57 +00:00
|
|
|
/**
|
|
|
|
* Returns the configuration for admin interface.
|
|
|
|
*
|
|
|
|
* @param LAMConfig $conf configuration
|
|
|
|
* @return TwoFactorConfiguration configuration
|
|
|
|
*/
|
|
|
|
private function getConfigAdmin($conf) {
|
2018-12-31 09:51:44 +00:00
|
|
|
$tfConfig = new TwoFactorConfiguration();
|
|
|
|
$tfConfig->twoFactorAuthentication = $conf->getTwoFactorAuthentication();
|
|
|
|
$tfConfig->twoFactorAuthenticationInsecure = $conf->getTwoFactorAuthenticationInsecure();
|
|
|
|
$tfConfig->twoFactorAuthenticationURL = $conf->getTwoFactorAuthenticationURL();
|
|
|
|
$tfConfig->twoFactorAuthenticationClientId = $conf->getTwoFactorAuthenticationClientId();
|
|
|
|
$tfConfig->twoFactorAuthenticationSecretKey = $conf->getTwoFactorAuthenticationSecretKey();
|
2018-12-31 11:39:20 +00:00
|
|
|
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
|
|
|
|
$moduleSettings = $conf->get_moduleSettings();
|
|
|
|
if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) {
|
|
|
|
$tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId';
|
|
|
|
}
|
|
|
|
}
|
2018-12-31 09:51:44 +00:00
|
|
|
return $tfConfig;
|
2017-02-11 18:54:57 +00:00
|
|
|
}
|
|
|
|
|
2017-01-30 19:02:31 +00:00
|
|
|
}
|
2017-02-11 18:39:05 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Configuration settings for 2-factor authentication.
|
|
|
|
*
|
|
|
|
* @author Roland Gruber
|
|
|
|
*/
|
|
|
|
class TwoFactorConfiguration {
|
2018-12-31 09:51:44 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var string provider id
|
|
|
|
*/
|
2017-02-11 18:39:05 +00:00
|
|
|
public $twoFactorAuthentication = null;
|
2018-12-31 09:51:44 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var service URL
|
|
|
|
*/
|
2017-02-11 18:39:05 +00:00
|
|
|
public $twoFactorAuthenticationURL = null;
|
2018-12-31 09:51:44 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var disable certificate check
|
|
|
|
*/
|
2017-02-11 18:39:05 +00:00
|
|
|
public $twoFactorAuthenticationInsecure = false;
|
2018-12-31 09:51:44 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var client ID for API access
|
|
|
|
*/
|
|
|
|
public $twoFactorAuthenticationClientId = null;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var secret key for API access
|
|
|
|
*/
|
|
|
|
public $twoFactorAuthenticationSecretKey = null;
|
|
|
|
|
2018-12-31 11:39:20 +00:00
|
|
|
/**
|
|
|
|
* @var LDAP attribute name that stores the token serials
|
|
|
|
*/
|
|
|
|
public $twoFactorAuthenticationSerialAttributeName = null;
|
|
|
|
|
2017-02-11 18:39:05 +00:00
|
|
|
}
|