Source code for privacyidea.lib.tokens.spasstoken

# -*- coding: utf-8 -*-
#  privacyIDEA is a fork of LinOTP
#  May 08, 2014 Cornelius Kölbel
#  License:  AGPLv3
#  contact:
#  2015-01-27 Rewrite due to flask migration
#             Cornelius Kölbel <>
#  Copyright (C) 2010 - 2014 LSE Leading Security Experts GmbH
#  License:  LSE
#  contact:
# This code is free software; you can redistribute it and/or
# modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
# License as published by the Free Software Foundation; either
# version 3 of the License, or any later version.
# This code is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# You should have received a copy of the GNU Affero General Public
# License along with this program.  If not, see <>.
__doc__="""This is the implementation of the simple pass token.
The simple pass token always returns TRUE as far as the checkOTP is concerned.
Thus a user with a simple pass token can authenticate by just providing the
OTP PIN of the token.

This code is tested in tests/test_lib_tokens_spass

import logging
from privacyidea.lib.log import log_with
from privacyidea.lib.tokenclass import TokenClass
from privacyidea.lib.decorators import check_token_locked

optional = True
required = False

log = logging.getLogger(__name__)

[docs]class SpassTokenClass(TokenClass): """ This is a simple pass token. It does have no OTP component. The OTP checking will always succeed. Of course, an OTP PIN can be used. """ def __init__(self, db_token): TokenClass.__init__(self, db_token) self.set_type(u"spass") self.mode = ['authenticate'] @classmethod
[docs] def get_class_type(cls): return "spass"
[docs] def get_class_prefix(cls): return "PISP"
@classmethod @log_with(log)
[docs] def get_class_info(cls, key=None, ret='all'): """ returns a subtree of the token definition Is used by lib.token.get_token_info :param key: subsection identifier :type key: string :param ret: default return value, if nothing is found :type ret: user defined :return: subsection if key exists or user defined :rtype: dict """ res = {'type' :'spass', 'title' :'Simple Pass Token', 'description': ('SPass: Simple Pass token. Static passwords.'), 'init': {'page': {'html': 'spasstoken.mako', 'scope': 'enroll'}, 'title': {'html': 'spasstoken.mako', 'scope': 'enroll.title'} }, 'config': {}, 'user': ['enroll'], # This tokentype is enrollable in the UI for... 'ui_enroll': ["admin", "user"], 'policy': {}, } # do we need to define the lost token policies here... if key is not None and res.has_key(key): ret = res.get(key) else: if ret == 'all': ret = res return ret
[docs] def update(self, param): if 'otpkey' not in param: param['genkey'] = 1 TokenClass.update(self, param)
[docs] def is_challenge_request(self, passw, user, options=None): """ The spass token does not support challenge response :param passw: :param user: :param options: :return: """ return False # pragma: no cover
[docs] def is_challenge_response(self, passw, user, options=None, challenges=None): return False # pragma: no cover
[docs] def check_otp(self, otpval, counter=None, window=None, options=None): """ As we have no otp value we always return true == 0 """ return 0
@log_with(log) @check_token_locked
[docs] def authenticate(self, passw, user=None, options=None): """ in case of a wrong passw, we return a bad matching pin, so the result will be an invalid token """ otp_count = -1 pin_match = self.check_pin(passw, user=user, options=options) if pin_match is True: otp_count = 0 return pin_match, otp_count, None