{"version":"1.0","provider_name":"NetKnights - IT-Sicherheit - Zwei-Faktor-Authentisierung - Verschl\u00fcsselung","provider_url":"https:\/\/netknights.it\/en\/","author_name":"admin","author_url":"https:\/\/netknights.it\/en\/author\/admin\/","title":"OCRA - NetKnights - IT-Sicherheit - Zwei-Faktor-Authentisierung - Verschl\u00fcsselung","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"t0PePXZEgO\"><a href=\"https:\/\/netknights.it\/en\/glossar\/ocra\/\">OCRA<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/netknights.it\/en\/glossar\/ocra\/embed\/#?secret=t0PePXZEgO\" width=\"600\" height=\"338\" title=\"&#8220;OCRA&#8221; &#8212; NetKnights - IT-Sicherheit - Zwei-Faktor-Authentisierung - Verschl\u00fcsselung\" data-secret=\"t0PePXZEgO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/netknights.it\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"OATH Challenge Response Algorithm. This is generalization of the HOTP algorithm. Flexible input data can be used instead of the counter. Such input data is the challenge and can additionally be a PIN, a timestamp, a counter etc.The kind of the required input data is defined in a so called &#8220;OCRA suite&#8221;. This algorithm can [&hellip;]"}