Usage of some different types of authenticators demands that the verifier store a duplicate with the authenticator mystery. One example is, an OTP authenticator (explained in Part 5.1.four) calls for which the verifier independently make the authenticator output for comparison towards the value sent from the claimant.This doc assumes that the subsc