Challenge/Response Settings
Whenever an authentication procedure must be enhanced with a 2nd factor, some kind of challenge-/response step needs to be used. The following options are supported in the SLS:
simple- The SLS generates a secure random code that can be sent to the user by SMS and has to be entered manually.googleauth- The user has to provide a time-based response code from an authenticator app that was registered previously.webauthn- The user is identified through their client, possibly with biometric mechanisms (e.g. fingerprint scanner on a smartphone), either as a 2nd factor or in a password-less flow.
A few hints about each one:
- With the
simplechallenge adapter, the model statecreate.challengemust be used. This will execute the creation of the secure random value that is then available as a scripting variable to be sent to the user, usually by way of an HTTP call to a REST backend. - With the
googleauthchallenge adapter, nocreate.challengestep is necessary, since the SLS does not create the challenge; it's created automatically based on the current time. - With
webauthnthings get a bit more complicated as the configuration details depend heavily on how WebAuthn should be used (2FA vs password-less).
For details on how to configure each challenge/response adapter please consult the SLS Administration Guide