POLICIES – DIGIPASS (tab)
The POLICIES > DIGIPASS tab shows the authenticator-related settings of the policy.
Field name | Description |
---|---|
DIGIPASS Assignment | |
Assignment Mode |
Specifies the method of automated authenticator assignment that will be used for this policy if any. There are two methods, auto-assignment and self-assignment.
In both cases, any applicable authenticator restrictions apply to the policy. For example, it will not be permitted to self-assign a Digipass 300 if the policy restricts the types to Digipass GO 3 and Digipass GO 1. In addition, if the user already has an authenticator assigned that meets the policy restrictions, the user will not be able to self-assign another one. This setting is not applicable to provisioning or signature validation. Optionally, it is also possible to allow the user via the authenticator assignment mode settings to reset the server PIN if applicable. By default, this option is disabled. Possible values:
|
Grace Period (days) |
The grace period is the default period (in days) between the time an authenticator is assigned (manually or via auto-assignment) and the time the user has to start using the authenticator to log on (if applicable). It allows some time for users to continue using their static passwords before they receive the authenticator and learn how to use it. The grace period expires automatically when a one-time password (OTP) is used to authenticate for the first time, i.e. after the OTP has been successfully validated (if it has not been set manually to expire prior to that in the relevant policy). It also expires after a successful MDL activation, either using an OTP or a signature validation. After the grace period has expired, depending on the Local Authentication settings in the relevant policy, users can then either continue to use both their static password or their authenticator (DIGIPASS or Password), or must only use the authenticator (DIGIPASS/Password during Grace Period or DIGIPASS Only) to log on. This setting does not affect manual assignment by an administrator or provisioning. |
Serial No. Separator |
The character (or short sequence of characters) that will be included at the end of the authenticator serial number during a self-assignment logon operation. It allows OneSpan Authentication Server to easily recognize that a self-assignment attempt is being made and extract the serial number from the credentials. |
Search Upwards in Org. Unit Hierarchy |
This controls the search scope for an available authenticator for auto-assignment or provisioning registration, or for a specific authenticator for self-assignment. This setting does not affect manual assignment by an administrator. Possible values:
|
Expiration Period (days) | The length of time in days since the initial assignment until an authenticator expires. |
DIGIPASS Type Limit |
This setting allows you to restrict the maximum number of assigned authenticators per user for specific authenticator types. If you need to have more than one authenticator provided to your users, you should still limit the number to avoid that too many authenticators (and/or instances) are assigned to or activated for single users. For single-device licensing, it is possible to limit the number of assigned authenticators; for multi-device activation/multi-device licensing the setting limits the number of assigned authenticator licenses and activated authenticator instances. If the list is empty, no additional limits per authenticator type are set, except for the default limits. If specified, each item indicates the authenticator type and the maximum number of authenticators allowed for that type. If you set the limit for a specific authenticator type to 0, no instances of that authenticator type can be assigned. If you add an item and select the type from list, the list contains the authenticator types currently defined in the database only. |
Delayed Activation | |
Delay Period (hours) |
The delayed activation period (in hours), i.e. the time span after the activation until an activated (software) authenticator can effectively be used for authentication and signature operations. Possible values: 0 – 9999 For more information about delayed activation, refer to the OneSpan Authentication Server Product Guide and the OneSpan Authentication Server Administrator Guide. |
Notify user when activation process starts |
Determines whether a notification should be sent to the user when an authenticator activation is delayed (delayed activation). The notification messages are scheduled to be sent via Message Delivery Component (MDC) using the delivery method specified by Delivery Method. |
Notify user when activation completes |
Determines whether a notification should be sent to the user when a delayed authenticator activation completes (delayed activation). The notification messages are scheduled to be sent via Message Delivery Component (MDC) using the delivery method specified by Delivery Method. |
Delivery Method |
Specifies the default delivery method when sending notifications for delayed activation. The notification messages are scheduled to be sent via Message Delivery Component (MDC) and use message templates specified in the global server configuration (see Table: Global Configuration – Virtual DIGIPASS tab). Possible values:
|
Applicable DIGIPASS | |
Application Names | This controls which authenticator applications may be used. If the list is empty, there is no restriction. If there are one or more entries, they will indicate the application names that are permitted. |
Application Type |
This controls which authenticator application type (e.g. Response-Only, Challenge/Response) may be used. Possible values:
|
Secure Channel Support |
Indicates if the authenticator application should support Secure Channel operations. Possible values:
|
DIGIPASS Type | The policy can specify a restriction on which authenticator types may be used when it is effective. If the list is empty, there is no restriction. If there are one or more entries, they indicate the authenticator types that are permitted. |
Allow PIN change | Specifies whether authenticator users will be allowed to change their server PIN during authentication requests to which the current policy applies. Normally this setting is enabled, but it can be used to prevent PIN changes if required. |
Multiple DIGIPASS App Validation Mode |
Specifies whether OneSpan Authentication Server should authenticate a user with multiple assigned authenticator applications. If this option is set to Single DIGIPASS, then users with multiple authenticator applications assigned cannot log in. If there are any policy restrictions on the application type, then OneSpan Authentication Server will only detect applications of the restricted type. For more information, refer to the OneSpan Authentication Server Product Guide, Section "Multiple authenticators or authenticator applications". |
Available actions
- Edit
- Delete