Authentication Code in App and Push Notification

šŸŽÆ Purpose

Provides users who have activated the REL-ID mobile application with access to the most secure and convenient authentication methods: Authentication Code in App (Time-based OTP) and Push Notification authentication.


šŸ¢ Enterprise-Grade Authentication Factors

These authentication methods represent the highest level of security available in the REL-ID system and are automatically available to users who have successfully enrolled and activated the REL-ID mobile application.


šŸ“± Authentication Code in App (Time-based OTP)

šŸŽÆ Functionality Overview

  • Purpose: Provides offline authentication capability through time-based one-time passwords
  • Technology: OATH TOTP (Time-based One-Time Password) standard
  • Availability: Automatic for REL-ID mobile app users
  • User Experience: 6-digit codes generated every 30 seconds

šŸ“Š Technical Characteristics

AspectSpecificationUser Benefit
Code Length6 digitsEasy to read and enter
Refresh Interval30 secondsFresh codes regularly
Offline Capabilityāœ… YesWorks without internet
Device DependencyMobile app requiredHighest security level
SynchronizationTime-basedNo server communication needed

šŸ”„ User Experience Flow

  1. Code Generation: REL-ID mobile app automatically generates current code
  2. Code Display: 6-digit code prominently shown in mobile app
  3. Code Entry: User enters code on web authentication portal
  4. Validation: System validates code against current time window
  5. Authentication: Valid code allows user to proceed

⚔ Key Advantages

  • Offline Operation: Works without mobile data or WiFi connection
  • High Security: Time-based algorithm prevents code reuse
  • User Control: No dependency on external communication services
  • Reliability: Not affected by network issues or service outages

šŸ”” Push Notification Authentication

šŸŽÆ Functionality Overview

  • Purpose: Provides real-time, tap-to-approve authentication
  • Technology: Push notification with cryptographic response
  • Availability: Automatic for REL-ID mobile app users
  • User Experience: Single tap to approve or deny authentication

šŸ“Š Technical Characteristics

AspectSpecificationUser Benefit
Response TimeReal-timeImmediate authentication
User ActionTap approve/denyExtremely convenient
Security LevelVery HighCryptographic validation
ConnectivityInternet requiredUses secure push channels
Context AwarenessRich informationSee login details

šŸ”„ User Experience Flow

  1. Authentication Request: User initiates login on web portal
  2. Push Delivery: Notification sent to registered mobile device
  3. Notification Display: Rich notification with login context
  4. User Review: User can see login attempt details (time, location, device)
  5. User Decision: User taps "Approve" or "Deny" in notification
  6. Response Transmission: Decision securely transmitted to web portal
  7. Authentication Result: Approval grants access, denial blocks login

⚔ Key Advantages

  • Convenience: Single tap authentication
  • Security Context: User sees login attempt details
  • Real-time: Immediate response and authentication
  • User Control: Explicit approval required for each login

šŸŽØ User Portal Display

šŸ“± Visual Representation

In the User Portal Sign In Options screen, these factors are displayed with:

  • Factor Icons: Distinctive visual identifiers
  • Factor Names: "Authentication Code in App" and "Push Notification"
  • Status Indicators: Show that factors are active and available
  • View-Only Status: No user configuration options (automatically managed)

šŸ”’ Management Characteristics

AspectAuthentication Code in AppPush Notification
User ConfigurationāŒ Not RequiredāŒ Not Required
Automatic Setupāœ… Yesāœ… Yes
Portal ManagementView OnlyView Only
Availability ControlMobile app statusMobile app status

šŸ›”ļø Security Features

šŸ” Enterprise Security Standards

  • Cryptographic Protection: Both methods use strong cryptographic algorithms
  • Device Binding: Tied to specific registered mobile devices
  • Automatic Management: No user configuration reduces security risks
  • Audit Trail: All usage logged for security monitoring

🚨 Security Considerations

Security AspectImplementationUser Impact
Device ControlMust control registered mobile deviceHigh security assurance
Time SynchronizationCritical for TOTP accuracyEnsure device clock accuracy
Network SecurityPush notifications use secure channelsReliable delivery
Access ControlDevice-level protection importantSecure mobile device

šŸŽÆ User Guidance and Best Practices

šŸ“± Mobile App Maintenance

  • App Updates: Keep REL-ID mobile app updated
  • Device Security: Use device lock screens and biometric protection
  • Time Accuracy: Ensure device clock is synchronized
  • Backup Options: Understand alternative authentication methods

šŸ”„ Usage Recommendations

  • Primary Methods: Use these as primary authentication when available
  • Backup Awareness: Understand web-based alternatives for emergencies
  • Device Care: Protect mobile device as primary security token
  • Support Knowledge: Know how to contact support for mobile app issues

āš ļø Important Considerations

šŸ“± Mobile App Dependency

  • Requirement: Both methods require active REL-ID mobile app
  • Device Status: Methods unavailable if mobile app deactivated
  • Synchronization: Mobile app must be properly synchronized with server
  • Updates: App updates may temporarily affect functionality

🌐 Connectivity Requirements

MethodInternet RequiredOffline CapableNetwork Dependency
Authentication CodeāŒ Noāœ… YesNone for code generation
Push Notificationāœ… YesāŒ NoRequired for push delivery

šŸ”§ Troubleshooting Common Issues

  • Codes Not Working: Check device time synchronization
  • Push Not Received: Verify internet connection and app permissions
  • App Not Responding: Restart mobile app or device
  • Synchronization Issues: May require app re-registration