Hi Michael, let me give you some details. The request im sending contain a username and a password. The password is composed from the user password and an OTP(two strings concatained). so if the password is "qwerty" end the otp is "546212", the password to send will be "qwerty546212". The type of script im using is Resource Owner Password Credentials, it split the password and perform the authentication with the password "qwerty" and then if ok it perform the otp verification. If ok, it return True after setting the authenticated user in context exactly like what is said in the [documentation](https://gluu.org/docs/ce/3.1.6/admin-guide/custom-script/#resource-owner-password-credentials). My script is always invoked (work very well), but the outcome of the authentication is based on the AuthenticationService result and in that case the outcome will always give authentication failed because this service is using the password "qwerty546212" wich is not the good password for the user. For that im asking how to bypass the AuthenticationService. Finally, i dont know how to get the ldif for the user but you can find the screen capture of the user information in this link.
```
https://filebin.net/86pq5y25qvby2ms7/Sans_titre.jpg?t=r1l4498n
```