we implemented and rolled out the AM TOTP Feature (which is great by the way).
Potentially many more applications, which are not integrateable directly into accessmanager for example - lack of SAML, still have the chance to benefit from the integration. One way, is to retrieve the secret's attribute value from the ldap directory (SECRET_STORE_CLASS is set to USERSTORE) and reuse it for other applications to authorize with the same profile as setup in AM. In our case the python library PyOTP in conjunction with freeradius is choosen. To do so, we need to know in what data format the TOTP impementation of AM is storing the "secret" into the directory ? Can someone help, give a hint ?

Best Regards