SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Use Your Feitian C200 OTP-Token at
                                  ANY OpenID enabled Web Site

Did you know that you could use your Feitian C200 OTP token (provided as a gift for the conference participants)
on every OpenID enabled web site? In order to do so, you have to execute the following steps.

Prerequisites
    •   The Feitian C200 OTP token provided to all participants at the conference.
    •   The 40 digit seed (secret) of the token.
            If you don't have the seed (secret) of your token yet, send an e-mail containing the token's
            serial number to Sylvain Maret (smaret@maret-consulting.ch)
    •   A valid, activated Clavid OpenID account.
            If you don't have a Clavid OpenID account yet, you can get a free OpenID account at
            http://clavid.com/registration

Configuration Procedure
    1. Login to the Clavid Portal where you can modify your account settings at: http://clavid.com/portal

    2. Choose the menu item «OTP (One Time Password)»

    3. Press «Add»

    4. «OTP Add – Step 1»
                                                           - Enter a name into the «Name» field
                                                             (e.g. «Feitian C200»)
                                                           - Choose «OATH TOTP (RFC6238)» from the
                                                             dropdown menu as OTP Type
                                                           - Press «Continue»



    5. «OTP Add – Step 2»
                                                           - Enter the 40 character long seed of the C200 OTP
                                                             token into the field «Secret»
                                                           - Enter «60» into the field «Time Interval»
                                                           - Enter «6» into the field «OTP Code Digits»
                                                           - Leave the field «Time Offset» empty
                                                           - Press «Continue»


    6. «OTP Add – Step 3»
                                                           - Press the button on your Feitian C200 OTP token
                                                             and enter the generated number into the field
                                                             «One Time Password»
                                                           - Press «Save»


Congratulation, you have now added OTP authentication to your Clavid OpenID account!

If you like, you may also improve your security setting using the menu item «Account Settings».

Contenu connexe

En vedette

eStrategy Magazin Ausgabe 03-2016-Leseprobe
eStrategy Magazin Ausgabe 03-2016-LeseprobeeStrategy Magazin Ausgabe 03-2016-Leseprobe
eStrategy Magazin Ausgabe 03-2016-LeseprobeTechDivision GmbH
 
The business journey partner presentations_the auto-enrolment journey
The business journey partner presentations_the auto-enrolment journeyThe business journey partner presentations_the auto-enrolment journey
The business journey partner presentations_the auto-enrolment journeyMartin Jack
 
Musicas cifradas nivel_2 vol 2
Musicas cifradas nivel_2 vol 2Musicas cifradas nivel_2 vol 2
Musicas cifradas nivel_2 vol 2Elvis Live
 
“Cities and Science – New Challenges” 12th-14th April 2011
“Cities and Science – New Challenges” 12th-14th April 2011“Cities and Science – New Challenges” 12th-14th April 2011
“Cities and Science – New Challenges” 12th-14th April 2011mind(21)factory
 
Manual de identidad hit baby1
Manual de identidad hit baby1Manual de identidad hit baby1
Manual de identidad hit baby1Daniela R. Dioses
 
Presentación equipo no 2 (1)
Presentación  equipo no 2 (1)Presentación  equipo no 2 (1)
Presentación equipo no 2 (1)IvetTe Eli
 
El arte de la transición alimenticia
El arte de la transición alimenticiaEl arte de la transición alimenticia
El arte de la transición alimenticiaFundacion Innovacion
 
La gestion financiera del siglo xxi
La gestion financiera del siglo xxiLa gestion financiera del siglo xxi
La gestion financiera del siglo xxiCarmen Hevia Medina
 
PORTAFOLIO DE SERVICIO WEB
PORTAFOLIO DE SERVICIO WEBPORTAFOLIO DE SERVICIO WEB
PORTAFOLIO DE SERVICIO WEBmishelldana
 
Correo postal y electronico
Correo postal y electronicoCorreo postal y electronico
Correo postal y electronicoMiguel Puertas
 
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web site
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web siteApic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web site
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web siteNoor Jivraj
 
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2Teléfonos Móviles Intrínsecamente Seguros -ZONA 2
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2MECATRONICS SOLUTIONS SAC
 
That's English principio de curso
That's English principio de cursoThat's English principio de curso
That's English principio de cursoeoimarisa
 

En vedette (16)

eStrategy Magazin Ausgabe 03-2016-Leseprobe
eStrategy Magazin Ausgabe 03-2016-LeseprobeeStrategy Magazin Ausgabe 03-2016-Leseprobe
eStrategy Magazin Ausgabe 03-2016-Leseprobe
 
The business journey partner presentations_the auto-enrolment journey
The business journey partner presentations_the auto-enrolment journeyThe business journey partner presentations_the auto-enrolment journey
The business journey partner presentations_the auto-enrolment journey
 
Musicas cifradas nivel_2 vol 2
Musicas cifradas nivel_2 vol 2Musicas cifradas nivel_2 vol 2
Musicas cifradas nivel_2 vol 2
 
“Cities and Science – New Challenges” 12th-14th April 2011
“Cities and Science – New Challenges” 12th-14th April 2011“Cities and Science – New Challenges” 12th-14th April 2011
“Cities and Science – New Challenges” 12th-14th April 2011
 
ejemplo
ejemploejemplo
ejemplo
 
curso de html
curso de htmlcurso de html
curso de html
 
Manual de identidad hit baby1
Manual de identidad hit baby1Manual de identidad hit baby1
Manual de identidad hit baby1
 
Presentación equipo no 2 (1)
Presentación  equipo no 2 (1)Presentación  equipo no 2 (1)
Presentación equipo no 2 (1)
 
El arte de la transición alimenticia
El arte de la transición alimenticiaEl arte de la transición alimenticia
El arte de la transición alimenticia
 
La gestion financiera del siglo xxi
La gestion financiera del siglo xxiLa gestion financiera del siglo xxi
La gestion financiera del siglo xxi
 
PORTAFOLIO DE SERVICIO WEB
PORTAFOLIO DE SERVICIO WEBPORTAFOLIO DE SERVICIO WEB
PORTAFOLIO DE SERVICIO WEB
 
Correo postal y electronico
Correo postal y electronicoCorreo postal y electronico
Correo postal y electronico
 
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web site
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web siteApic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web site
Apic 2014 pattaya noor jivraj jacobs emerging feedstocks 18 05-2014 for web site
 
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2Teléfonos Móviles Intrínsecamente Seguros -ZONA 2
Teléfonos Móviles Intrínsecamente Seguros -ZONA 2
 
Hdb
HdbHdb
Hdb
 
That's English principio de curso
That's English principio de cursoThat's English principio de curso
That's English principio de curso
 

Plus de Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itCyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptCyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 

Plus de Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 

Dernier

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

OTP c200 How To

  • 1. Use Your Feitian C200 OTP-Token at ANY OpenID enabled Web Site Did you know that you could use your Feitian C200 OTP token (provided as a gift for the conference participants) on every OpenID enabled web site? In order to do so, you have to execute the following steps. Prerequisites • The Feitian C200 OTP token provided to all participants at the conference. • The 40 digit seed (secret) of the token. If you don't have the seed (secret) of your token yet, send an e-mail containing the token's serial number to Sylvain Maret (smaret@maret-consulting.ch) • A valid, activated Clavid OpenID account. If you don't have a Clavid OpenID account yet, you can get a free OpenID account at http://clavid.com/registration Configuration Procedure 1. Login to the Clavid Portal where you can modify your account settings at: http://clavid.com/portal 2. Choose the menu item «OTP (One Time Password)» 3. Press «Add» 4. «OTP Add – Step 1» - Enter a name into the «Name» field (e.g. «Feitian C200») - Choose «OATH TOTP (RFC6238)» from the dropdown menu as OTP Type - Press «Continue» 5. «OTP Add – Step 2» - Enter the 40 character long seed of the C200 OTP token into the field «Secret» - Enter «60» into the field «Time Interval» - Enter «6» into the field «OTP Code Digits» - Leave the field «Time Offset» empty - Press «Continue» 6. «OTP Add – Step 3» - Press the button on your Feitian C200 OTP token and enter the generated number into the field «One Time Password» - Press «Save» Congratulation, you have now added OTP authentication to your Clavid OpenID account! If you like, you may also improve your security setting using the menu item «Account Settings».