POLICIES – DP Control Parameters (tab)
The POLICIES > DP Control Parameters tab shows the authenticator control parameter settings of the policy.
Field name | Description |
---|---|
Synchronization Windows | |
Identification Time Window |
Controls the maximum allowed number of time step variations between an authenticator and the host system during logon. This only applies to time-based authenticator applications when verifying a one-time password (OTP). The Dynamic Time Window option may be used to allow more variation according to the length of time since the last successful logon. Default value: 20. If this setting is not specified, the default value applies. |
Signature Time Window |
Controls the maximum allowed number of time step variations between an authenticator and the host system during digital signature verification. This only applies to time-based authenticator applications when validating a signature, but even then it may be used or not according to the online signature level setting. The Dynamic Time Window option may be used to allow more variation according to the length of time since the last successful logon. Default value: 24. If this setting is not specified, the default value applies. |
Initial Time Window |
When an authenticator is used for the first time, OneSpan Authentication Server calculates the initial deviation between the authenticator time and the server time. This option controls the maximum allowed time variation between an authenticator and the host system, the first time that the authenticator is used. The time is specified in hours. This Initial Time Window is also used directly after a Reset Application operation, which can be used if it appears that the internal clock in the authenticator has drifted too much since the last successful logon. This only applies to time-based authenticators when verifying an OTP. In either case, after the first successful logon, the initial time window is no longer active. Default value: 6. If this setting is not specified, the default value applies. |
Avoid Initial Time Synchronization |
This option allows you to avoid the initial time shift initialization on the server side (based on Initial Time Window). Possible values:
Default value: Software DIGIPASS only |
Event Window |
Controls the maximum allowed number of event variations between an authenticator application and the host system during login. This only applies to event-based authenticator applications and always applies for OTP verification. For signature validation, it depends on the online signature level setting whether the event window is used or not. Default value: 20. If this setting is not specified, the default value applies. |
Locking Thresholds | |
Identification Threshold |
Specifies the number of consecutive failed authentication attempts allowed before the authenticator application will be locked from future authentication attempts. Once the authenticator application is locked, the Reset Appl Lock command is required to unlock it for further authentication. This locking mechanism is separate from the User Lock Threshold and is normally not necessary. It only applies when a single authenticator application can be used for a logon, either because the user only has one authenticator with one application, or because the policy restrictions narrow the list down to one authenticator application. If policy restrictions are used in this way, the identification threshold can be used to lock users out of one logon type (e.g. a VPN) while still permitting them to use another type (e.g. a web application). If this setting is not specified, this feature is not used. |
Signature Threshold |
Specifies the number of consecutive failed signature validation attempts allowed before the authenticator application will be locked from future signature validation attempts. Once the authenticator application is locked, the Reset Appl Lock command is required to unlock it for further signature validation. This locking mechanism is separate from the User Lock Threshold and is normally not necessary. It only applies when a single authenticator application can be used for a signature validation, either because the user only has one authenticator with one application, or because the policy restrictions narrow the list down to one authenticator application. If policy restrictions are used in this way, the identification threshold can be used to lock users out of one signature validation type while still permitting them to use another type. If this setting is not specified, this feature is not used. |
Max. Days Since Last Use |
This setting specifies the maximum number of days for which an authenticator application can remain unused for authentication or signature validation. After this limit, authentication and signature validation will be rejected until an administrator performs a Reset Application operation. If this setting is not specified, this feature is not used. |
Challenge Check Mode |
This setting is for advanced control over time-based Challenge/Response authentication. Possible values:
Default value: 1. This should be used for standard RADIUS Challenge/Response. It is also the value that applies if this setting is not specified. |
Online Signature Level |
This setting is for advanced control of signature validation. Possible values:
Default value: 0. This can be used for authenticator applications that are neither time- nor event-based. This is the built-in default value if the setting is not specified at all. |