-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pushTAN 2.0 requires authentification on every request #149
Comments
This importer uses the nemiah/phpFinTs library. This library seems to lack full support for the workflow you describe. That's why I couldn't implement the "trustworthy" part in #145. |
The problem seems fixed in the original library as indicated in nemiah/phpFinTS#453
|
I think it is possible and could be implemented. I already have some very rough ideas how to tackle it. However, my time in the next weeks is limited, so it could be next year until I find time to implement this. (My priority is not that high right now as it currently is working; not nice but working.) |
DKB is also switching to decoupled PushTan (https://www.dkb.de/fragen-antworten/kann-ich-eine-finanzsoftware-fuers-banking-benutzen) - Currently, i can not test it as the new server is not accepting 923/921, but it is likely to be 923 starting 25.11. @JuliusFreudenberger If i understand the thread correctly, we need to persist like mentioned here: Update: It works with TAN mode 940 (which is not listed ...), but it is also decoupled and requires re-verification. I assume the 623 implementation also required pressing submit after the 2FA step? |
Regarding your update: TAN modes can be added easily to the UI. When you are using a configuration file, you can just specify this mode. I also understood the process like this. I planned to extend the configuration.json to store this persistence string. When it is set and needed for the selected TAN mode, it will be pulled from there. If it is not set, then a verification is needed and the resulting persistence string should be presented in the UI after the import is finished with a hint to put this in the configuration file. |
Decoupled TAN modes tend to ask for a TAN in every import run. Using persist on the FinTS instance and loading it from the configuration.json file prevents that. The string is presented in the done step to be pasted into the configuration file. If it is present there, it is loaded in the FinTsFactory and used for initialising the FinTS connection. Refs bnw#149
Also provide the key in the configuration example.json Refs bnw#149
Hello,
I'm using a bank account with pushTAN 2.0 (ID=923) account for which support has lately been added (many thanks to the developers!). Import works fine, however I am always challenged to authenticate every single request, making headless use impossible.
To my understanding, once confirmed to be "trustworthy" the bank should not request re-authentification for 90 days.
Is there away around this that I am not seeing?
The text was updated successfully, but these errors were encountered: