Resources & Guides
This section provides reference material, whitepapers, and implementation guides to help you deploy OATH standards in real-world environments.
Reference Documents
-
OATH Reference Architecture
High-level overview of the OATH architecture, components, and data flows.
-
OATH Token Identifier & Manufacturer Registry
Specification and registry details for OATH token identifiers and manufacturers.
-
OATH Deployment Considerations
Guidance on integrating OATH-compliant authenticators into existing identity infrastructures.
Implementation Guides
These documents provide more detailed guidance on how to implement specific standards and profiles.
-
Implementing HOTP and TOTP
Recommended parameter choices, security considerations, and interoperability notes. -
Implementing OCRA for Transaction Signing
Design patterns, canonicalization of transaction data, and user experience considerations. -
Provisioning Keys Using PSKC and DSKPP
Secure key lifecycle management using PSKC containers and DSKPP for remote provisioning.
Where available, sample code or pseudo-code may be included to illustrate algorithm behavior and edge cases.
Additional Material
- Conference presentations and slide decks relating to OATH standards.
- Archived whitepapers describing early adoption and deployment experiences.
- Links to related initiatives and standards organizations.
Some documents in this section may be of historical interest only; always refer to the Standards & RFCs page for the definitive technical specifications.