- selfservice controller - This is the controller for the self service interface,
where users can manage their own tokens
All functions starting with /selfservice/user... are data functions and protected by the session key i.e. the session key must be passed as the parameter session=
return the form for an ocra token activation
In this form the user may assign an already existing Token to himself. For this, the user needs to know the serial number of the Token.
In case the user hasn’t defined a custom css, Pylons calls this action. Return an empty file instead of a 404 (which would mean hitting the debug console)
In this form the user may select a token of his own and delete this token.
In this form the user may select a token of his own and disable this token.
In this form the user may select a token of his own and enable this token.
form_access_methods= ['activateocratoken', 'assign', 'custom_style', 'delete', 'disable', 'enable', 'getotp', 'history', 'index', 'load_form', 'reset', 'resync', 'setmpin', 'setpin', 'unassign', 'webprovisiongoogletoken', 'webprovisionoathtoken']¶
In this form, the user can retrieve OTP values
This is the form to display the history table for the user
This is the redirect to the first template
This shows the enrollment form for a requested token type.
implicit parameters are:
- type – token type
- scope – defines the rendering scope
rendered html of the requested token
In this form the user can reset the Failcounter of the Token.
In this form, the user can resync an HMAC based OTP token by providing two OTP values
In this form the user my set the PIN for his mOTP application soft token on his phone. This is the pin, he needs to enter on his phone, before a otp value will be generated.
In this form the user may set the OTP PIN, which is the static password he enters when logging in in front of the otp value.
In this form the user may select a token of his own and unassign this token.
This returns a tokenlist as html output
This is the form for an google token to do web provisioning.
This is the form for an oathtoken to do web provisioning.
should be moved to token.py