<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cornelius Kölbel &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/author/cornelius/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 12 Sep 2023 09:24:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Cornelius Kölbel &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.9 available</title>
		<link>https://www.privacyidea.org/privacyidea-3-9-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 07:00:00 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Application Specific Password]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Credential Management]]></category>
		<category><![CDATA[Day Password]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2325</guid>

					<description><![CDATA[We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows.]]></description>
										<content:encoded><![CDATA[
<p><strong>Manage Login data in the most flexible way</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png"><img fetchpriority="high" decoding="async" width="1024" height="666" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png" alt="We pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows." class="wp-image-2329" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png 1024w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-300x195.png 300w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-768x499.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png 1103w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place &#8211; since successful authentication is a matter of smooth workflows.</em></p>



<p>privacyIDEA aims to be a management system where the administrator can easily manage the authentication topic for the users. You as an administrator can manage the OTP tokens (TOTP, HOTP apps, Yubikeys), tokentype like SMS or Email, even FIDO2. All you need for two factor authentication.</p>



<p>And privacyIDEA is able to also verify the first factor. The static password.</p>



<h2 class="wp-block-heading">Old authentication &#8211; new token types</h2>



<p>But sometimes you might see, that two factor authentication does not work out as expected. That applications do not play well with FIDO2/WebAuthn. Yes, sometimes applications do not play well even with OTP tokens. Take an Email client, that caches the user password and sends it, every time it fetches the emails from the server. The request will fail if it is sent with the same OTP value a second time.</p>



<p>Successful Authentication is not always a matter of choose the most modern cryptographic algorithm or the latest authentication method. </p>



<p>Sometimes there is an old, nasty application that refuses to work well with the 2FA method you are enrolling in your company. But privacyIDEA wants to help you as administrator to manage all these challenges in one system.</p>



<p>With privacyIDEA 3.9 we introduce two new token types which might sound old and insecure, but which are supposed to enable you to take a step forward, even if some old applications want to hold you back.</p>



<p>The<strong> application specific password</strong> token is simply a static password that can be bound to a specific application. The old application will send an authentication request against privacyIDEA and privacyIDEA will realize, that this auth request originated from this application and allow such application specific password tokens enrolled for this application to be used for authentication. A user can have a specific password for e.g. his email client, save this in his smartphone and privacyIDEA will accept this only for login requests by this email client resp. mail server. <br>You may check the conceptual evolution of this feature on <a href="https://github.com/privacyidea/privacyidea/issues/3260" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/issues/3260">Github</a>.</p>



<p>The <strong>day password</strong> token is a similar quirky thing. In certain situations having an OTP token that changes all 30 seconds or 60 seconds may be to changeable for some users or use cases. But using no second factor and relying on a never changing static password is also not an option.</p>



<p>Why not have a token, that can be used for one hour? Or one day? The day password token in privacyIDEA 3.9 is a token type with a variable time window between one second and many days. During this time window the given code is valid during the whole time window and can be used as often as needed. It is similar to TOTP (in fact it is inherited from the TOTP token class), but has the above mentioned special effects. <br><br>This token type has its counter part in the privacyIDEA Authenticator App, which you can find in the <a rel="noreferrer noopener" href="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" data-type="URL" data-id="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" target="_blank">Google Play Store</a> and <a rel="noreferrer noopener" href="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" data-type="URL" data-id="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" target="_blank">Apple App Store</a>. The day password token is supported in the privacyIDEA Authenticator App starting with version 4.2.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png"><img decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png" alt="" class="wp-image-2341" width="202" height="437" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png 473w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-139x300.png 139w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-768x1663.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-709x1536.png 709w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-946x2048.png 946w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png 960w" sizes="(max-width: 202px) 100vw, 202px" /></a><figcaption>The privacyIDEA Authenticator App supports the new day password token.</figcaption></figure></div>



<p></p>



<p></p>



<h2 class="wp-block-heading">Improving SSH Key Management</h2>



<p>Managing SSH keys has been a bit cumbersome in the past. You as the administrator had to assign each SSH server to the SSH key, so that the user could use the SSH key to log to this server.</p>



<p>With privacyIDEA 3.9 you can now define service identifiers, which represent the servers. E.g. you could define an identifier &#8220;web servers&#8221; and assign SSH keys to this identifier. </p>



<p>Now you can simply have the SSH server identify as &#8220;web servers&#8221; to allow the login with this SSH key. This way it is easy as configuring the corresponding server, to add a new SSH server to the &#8220;web servers&#8221;.</p>



<p>The helper script <a href="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" target="_blank" rel="noreferrer noopener">privacyidea-authorizedkeys</a>, which is supposed to run on the SSH servers has been modified so that it queires privacyIDEA for the corresponding service identifier.</p>



<h2 class="wp-block-heading">Changelog</h2>



<p>A new event handler can set the application assignment during enrollment. This helps with definding HOTP tokens as Offline-Tokens for the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" data-type="URL" data-id="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" target="_blank">privacyIDEA Credential Provider</a>. The PUSH token can do a decline, so that the authentication process is cancelled.</p>



<p>You can find the complete changelog at <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Github</a>.</p>



<h2 class="wp-block-heading">Install and Update</h2>



<p>You can download and update privacyIDEA 3.9 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 20.04LTS and Ubuntu 22.04LTS</a> or via the <a href="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" target="_blank" rel="noreferrer noopener">Python Package Index.</a></p>



<p>If you want to get involved, you can join the <a href="https://community.privacyidea.org" data-type="URL" data-id="https://community.privacyidea.org" target="_blank" rel="noreferrer noopener">discussion at the Forum</a> or coding at <a href="https://github.com/privacyidea/privacyidea" data-type="URL" data-id="https://github.com/privacyidea/privacyidea" target="_blank" rel="noreferrer noopener">Github</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.8 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-8-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 20 Dec 2022 07:49:14 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[yubik]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2318</guid>

					<description><![CDATA[With privacyIDEA 3.8 you can use the Yubikey for Smartcard domain Login. 
A generic token enrollment at any application without the need for the user to go to the selfservice portal.]]></description>
										<content:encoded><![CDATA[
<p><strong>Transparent Rollout and Smartcard Login</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg"><img decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg" alt="" class="wp-image-2319" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are happy to inform you, that we released privacyIDEA 3.8 today. 3.8 is an important milestone, since we start to support the Yubikey as a smartcard, that can also be used to login to Windows domains.</em></p>



<h2 class="wp-block-heading">Support for smartcard login on Windows systems</h2>



<p>privacyIDEA 3.8 can manage the Yubikey as a smartcard that holds a smartcard logon certificate. To obtain the smartcard logon certificate, the privacyIDEA server has a new certificate connector to communicate to all Microsoft Active Directory Certiticate Services in the connected Windows domain.</p>



<p>Thus the certificate on the Yubikey can directly be obtained from the Micrsoft CA but be managed within privacyIDEA.</p>



<h2 class="wp-block-heading">Rollout during authentication</h2>



<p>privacyIDEA supports Multi-Challenge-Response for a while. This mechanism can be used to reset an OTP PIN or authenticate with 4-eyes tokens or index-secret tokens. </p>



<p>In version 3.8 this same mechanism can now be used to enroll a token during authentication. The administrator can define a policy, which token type should be enrolled by the user. In several challenge-response steps thus the user can enroll HOTP, TOTP, email, SMS or PUSH tokens. Email and SMS tokens can even be enrolled in standard applications like the Netscaler.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png"><img loading="lazy" decoding="async" width="663" height="358" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png" alt="" class="wp-image-2320" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png 663w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix-300x162.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /></a><figcaption>SMS token enrollment during the login to Citrix ADC</figcaption></figure></div>



<p>HOTP, TOTP and PUSH enrollment require the application to display a QR code. This mechanism will be supported by all privacyIDEA plugins for e.g. Keycloak, simpleSAMLphp or ADFS.</p>



<h2 class="wp-block-heading">Fast login, fast debugging, token groups</h2>



<p>Using a new &#8220;preferred client mode&#8221; the administrator can define, which should be the preferred way for a user to authenticate, in case the user has more than one token type.</p>



<p>The audit log has been greatly improved for bug tracking. It now also records the thread ID of an API request.<br>Since the threat ID is also contained in the debug log file, this is a great handle to find the relevant detailed information to a specific request in the logs.</p>



<p>privacyIDEA 3.8 comes with the new conecpt of &#8220;token groups&#8221;. We plan to use this to improve SSH key management and the management of offline tokens.</p>



<p>For more details see the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noreferrer noopener">changelog at Github</a>.</p>



<h2 class="wp-block-heading">Install or Update</h2>



<p>You can download and update privacyIDEA 3.8 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/master/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 18.04, 20.04 and now also 22.04 or via the python package index</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA Authenticator 4.0 with Push Poll</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-4-0-with-push-poll/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 13 Jun 2022 09:04:34 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2311</guid>

					<description><![CDATA[The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.]]></description>
										<content:encoded><![CDATA[
<p>The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.</p>



<p>If you are not using your own source code but use the precompiled <a rel="noreferrer noopener" href="https://netknights.it/en/produkte/privacyidea-authenticator-app/" target="_blank">privacyIDEA Authenticator released by the company NetKnights</a>, this has the following meaning for you.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png" alt="" class="wp-image-2313" width="593" height="395" srcset="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png 1000w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-768x512.png 768w" sizes="auto, (max-width: 593px) 100vw, 593px" /></a></figure></div>



<p><br></p>



<h3 class="wp-block-heading">Breaking Change in Push-Functionality</h3>



<p>In order to increase the stability of the push functionality and the reliability of the delivery of the push messages, we decided to revise the configuration of the Firebase project. As of version 4.0, the app works with a central Firebase project that is managed by NetKnights.</p>



<p>That means your privacyIDEA server will no longer be able to notify the push tokens in the app version 4.0 via the Firebase project you have configure individually. To enable the new and more stable notification feature, you either need to recompile the App or get a subscription from NetKnights to gain access to the central Firebase project.</p>



<p>However, you can also use the precompiled and released Authenticator App without the need for a Firebase project. </p>



<h3 class="wp-block-heading">Using Push-Token without Firebase project</h3>



<p>In this scenario you will use the Push-Poll functionality, where the Authenticator polls the challenges from the privacyIDEA server. Users will have to have the privacyIDEA Authenticator App in the foreground to receive messages.</p>



<p>You need to proceed as follows.</p>



<ol class="wp-block-list"><li>Update the privacyIDEA server to version 3.7.1. This will ensure a flawless polling functionality</li><li>If not yet configured, create a policy in scope “Authentication” with the setting “push_allow_polling” = “allow”.</li><li>If not yet configured, create a policy in scope “Enrollment” with the setting “push_firebase_configuration” = “poll only”. </li><li>If you already have a “push_firebase_configuration” policy, change it to “poll only”.</li><li>To receive the Push notification, the user must open the privacyIDEA Authenticator. The notifications will be polled or the user can actively poll the notifications by swiping downwards.</li><li>The configuration of the Firebase project in your privacyIDEA server can be deleted.</li></ol>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.7 Released</title>
		<link>https://www.privacyidea.org/privacyidea-3-7-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 06:46:42 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[HSM]]></category>
		<category><![CDATA[offline]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2293</guid>

					<description><![CDATA[Offline Login without IP restrictions and verified enrollment We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Offline Login without IP restrictions and verified enrollment</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png" alt="" class="wp-image-2294" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-768x512.png 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment and a new supported way for encrypting the sensive data in privacyIDEA with a hardware security module.</em></p>



<h2 class="wp-block-heading">Hardware Security Modules</h2>



<p>Hardware Security Modules (HSMs) are expensive. Especially if you need a network attached HSM that provides the necessary performance to encrypt the OTP seed for each authentication request. This is the way how privacyIDEA currently supported HSMs. It is secure &#8211; but it is slow (unless you have the right hardware) and costly.</p>



<p>In privacyIDEA 3.7 we provide a new security module with a different approach. The idea was born in discussing security and speed with an enterprise community member.</p>



<p>The new security module <code>encryptkey.py</code> still holds the encryption keys in a keyfile. But this keyfile again is encypted with an assymmetric key on an HSM. The keyfile is decrypted by the HSM on startup and then the encryption keys from the keyfile are stored in memory. This way the slow HSM operation will only occur when starting or restarting the web server process. This allows you to use much cheaper HSMs or even Smartcards  to protect your key material.</p>



<p>Still &#8211; you should be familiar with smartcards or HSMs and know what you are doing, to avoid wrecking your senstive data.</p>



<h2 class="wp-block-heading">Offline Token</h2>



<p>privacyIDEA allows clients like the privacyIDEA Credential Provider to fetch offline information to allow a user to login with a specific HOTP token, even if the privacyIDEA server can not be reached. However, this was always bound to the IP address of the client machine.</p>



<p>We removed the IP binding and redesigned the process. This way it is now much easier and more robust to use an HOTP token for offline authentication at your Windows notebook.</p>



<h2 class="wp-block-heading">Verify Enrollment</h2>



<p>When enrolling a smartphone HOTP or TOTP token, the user needs to scan a QR code that was generated by privacyIDEA. Only after scanning this QR code with a authenticator smartphone app, the token is technically enrolled on the user side. Administrators reported that sometimes some users forgot to scan the QR code. Thus privacyIDEA deemed the token as enrolled, while nothing existed on the user&#8217;s smartphone.</p>



<p>With 3.7 the administrator can now force the user to enter a valid OTP value during the enrollment process. This way the user is required to scan the QR code to be able to provide the valid OTP value. Only then privacyIDEA deems the token as successfully enrolled.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png"><img loading="lazy" decoding="async" width="698" height="492" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png" alt="" class="wp-image-2299" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png 698w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment-300x211.png 300w" sizes="auto, (max-width: 698px) 100vw, 698px" /></a><figcaption>privacyIDEA 3.7 can require the user to enter a valid OTP value before the token is successfully enrolled.</figcaption></figure></div>



<h2 class="wp-block-heading">Further Enhancements</h2>



<p>There are a lot of further enhancements.</p>



<p>Policies can now also use web server environment variables as conditions.</p>



<p>In version 3.6 custom user attributes have been introduced. In 3.7 the administrator can now define event handlers to set or delete custom user attributes. This way, you could e.g. set an attribute to a user as soon as the user enrolls a certain token type. Then you could have authentication policies, that take this token type as a condition, only allowing those users to do certain things. </p>



<p>Possibilities are many. We do not know them all! Find yours!</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">changelog at Github</a>.</p>



<p>If you are running privacyIDEA in mission critical environments, the company NetKnights which staffs the core developers, also provides <a href="https://netknights.it" target="_blank" rel="noreferrer noopener">services and support</a>.</p>



<p>If you want to get involved with privacyIDEA you can also visit the <a href="https://community.privacyidea.org">community forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA simpleSAMLphp Plugin 2.1 available</title>
		<link>https://www.privacyidea.org/privacyidea-simplesamlphp-plugin-2-1-available/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 16:16:02 +0000</pubDate>
				<category><![CDATA[privacyIDEA Plugins]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[simplesamlphp]]></category>
		<category><![CDATA[SSO]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2286</guid>

					<description><![CDATA[We are proud to release the privacyIDEA simpleSAMLphp Plugin 2.1. We added a new feature, that allows the administrator to configure real Single Sign-On or secure 2FA requirement. In Single Sign-On mode, the user is asked for the second factor only once. In the secure 2FA requirement, the user is required to provide his second [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1024x666.jpg" alt="" class="wp-image-2288" width="602" height="391" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1024x666.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-300x195.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-768x499.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1536x998.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On.jpg 2000w" sizes="auto, (max-width: 602px) 100vw, 602px" /></a></figure></div>



<p>We are proud to release the privacyIDEA simpleSAMLphp Plugin 2.1. We added a new feature, that allows the administrator to configure real Single Sign-On or secure 2FA requirement.</p>



<p>In Single Sign-On mode, the user is asked for the second factor only once. In the secure 2FA requirement, the user is required to provide his second factor for each application where he wants to log in.</p>



<p>The administrator can configure this behavirour in the config file with the parameter &#8220;SSO&#8221;.</p>



<p>The new version of the privacyIDEA simpleSAMLphp plugin is available via <a rel="noreferrer noopener" href="https://github.com/privacyidea/simplesamlphp-module-privacyidea/releases/tag/v2.1.0" target="_blank">Github</a>. You can download the code there and add it to your installation.<br></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.6 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-6-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-6-released/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 08:32:19 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Custom Attributes]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2271</guid>

					<description><![CDATA[Custom User Attributes and Token Attributes in Policies allow for more control We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Custom User Attributes and Token Attributes in Policies allow for more control</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg"><img loading="lazy" decoding="async" width="1024" height="682" src="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg" alt="" class="wp-image-2273" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1536x1024.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg 2000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional possibilities to manage the users and to manage the user rights. These user attributes can be used within privacyIDEA policies. In addition policies can now also contain any token attribute like tokentype or fail counter. These attributes and policy conditions help administrators to keep control in larger setups by logically grouping users and tokens.</em></p>



<h3 class="wp-block-heading">Policies with Custom User Attributes and Token Attributes </h3>



<p>privacyIDEA is no Identity Management. Users are usually managed in an IdM, or only in LDAP or Active Directory. Nevertheless it can be important to add attributes to users &#8211; in case the token administrator has no access rights to the IdM or user directory. The administrator can now do so in privacyIDEA 3.6 using custom user attributes. The administrator can even allow users to manage their own attributes. This way the user can e.g. update his mobile number himself, without the need to contact the help desk or the administrator.</p>



<p>Based on these user attributes the administrator can now define policies and thus the access rights can be tuned in more detail.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png"><img loading="lazy" decoding="async" width="956" height="439" src="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png" alt="" class="wp-image-2276" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png 956w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-300x138.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-768x353.png 768w" sizes="auto, (max-width: 956px) 100vw, 956px" /></a><figcaption>The token administrator can set the mobile number of the user.</figcaption></figure>



<p>In addition policies can now have conditions on each and every token attribute like description, serial, tokentype, otp length, maximum failcounter, failcounter, active state and more.</p>



<p>This way the administrator could allow helpdesk users to only delete tokens, that have previously been disabled by the user himself. Possibilities are endless.</p>



<h3 class="wp-block-heading">Simple PUSH Token</h3>



<p>Starting with privacyIDEA 3.0 we introduced the <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/" data-type="post" data-id="1533">PUSH token</a>. If everything works out fine, the PUSH token can work like a charm. But setting it up is quite complicated. Also the Push services by Google and Apple actually do not work that reliably. With privacyIDEA 3.6 the administrator can now configure the PUSH token to only work in a polling method. In this scenario no external 3rd party service is needed and the user&#8217;s smartphone only communicates with the privacyIDEA server.</p>



<p>By giving up some comfort such a setup can gain stability and improve the privacy aspect.</p>



<h3 class="wp-block-heading">Token Rollover</h3>



<p>The administrator can now configure a WebUI policy to allow users to roll over their tokens. This means that the key material is generated anew and the user can enroll the token again, e.g. by scanning a new QR code. This comes in handy, if the user is only allowed to have one token, but wants to move his token to a new smartphone or if the company decides to increase the key size of the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png"><img loading="lazy" decoding="async" width="1024" height="260" src="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png" alt="" class="wp-image-2280" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-300x76.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-768x195.png 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png 1119w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption>The user can regenerate the seed of his existing token: Rollover.</figcaption></figure>



<h3 class="wp-block-heading">Enhancements</h3>



<p>Besides these main features there are a lot of enhancements. The administrator can use pi-manage to export and import the system configuration. This can be used to move configuration from testing environments to productive environments. You can have different PIN policies for different tokentypes. </p>



<p>In pi.cfg the system administrator can define a custom entry point for the WebUI. This way you can create your complete own WebUI without changing anything in the code.</p>



<p>The token janitor received several improvements. It can export arbitrary user attributes, the seed can either be exported in hex or base32 to increase the interoperability with other MFA systems. The token export can now also contain the user assignment. This way tokens can easily be transferred between different privacyIDEA installations.</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Changelog at Github</a>.</p>



<h3 class="wp-block-heading">Availability</h3>



<p>You can download privacyIDEA 3.6 from Github or install it from the Python Package Index. For easy deployment you can use the community repositories for Ubuntu 16.04, 18.04 and 20.04. You can find the installation guidline in the <a rel="noreferrer noopener" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">online documentation</a>. If you are updating, it is crucial to read the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, which contains important information about LDAP resolvers and TLS.</p>



<p>If you want to get involved, be sure to drop by at the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a>. You can also take a look at Weblate, were the community can translate to different languages. We are grateful for the community effort to be able to ship translations in Dutch and French!</p>



<p>For mission critical scenarios the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener">company NetKnights provides an Enterprise Edition with Support</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-6-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Results of privacyIDEA User Survey 1/2021</title>
		<link>https://www.privacyidea.org/results-of-privacyidea-user-survey-1-2021/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 14:23:03 +0000</pubDate>
				<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[Survey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2251</guid>

					<description><![CDATA[We had launched a survey about the satisfaction and experience with privacyIDEA. 95% of the respondents said they had gerneral experience with two-factor authentication. Most of them found privacyIDEA via Google, a quarter via recommendations from friends and acquaintances. In most cases, privacyIDEA is used for VPN and web applications. The use for Single Sign-On [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png"><img loading="lazy" decoding="async" width="940" height="346" src="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png" alt="" class="wp-image-2265" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png 940w, https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04-300x110.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04-768x283.png 768w" sizes="auto, (max-width: 940px) 100vw, 940px" /></a></figure>



<p>We had launched a survey about the satisfaction and experience with privacyIDEA. 95% of the respondents said they had gerneral experience with two-factor authentication. Most of them found privacyIDEA via Google, a quarter via recommendations from friends and acquaintances.</p>



<p>In most cases, privacyIDEA is used for VPN and web applications. The use for Single Sign-On like via Keycloak, SimplSAMLphp or ADFS is at about 40% but is catching up.</p>



<p>privacyIDEA is a true open source project. Planning and development is <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea" data-type="URL" data-id="https://github.com/privacyidea/privacyidea" target="_blank">actively done on Github</a>. Just over half of the respondents have either starred the Github repository, posted an issue, or even contributed code.</p>



<h2 class="wp-block-heading">Documentation and plugins</h2>



<p>We received individual feedback that the user could not easily and quickly find the information in documentation he was looking for. This is understandable for us, since privacyIDEA is a complex product that can be approached from many different angles. If you give us feedback on the documentation, please always let us know, what info you need and where you were looking for it. These details help us to understand how you are reading the docs and improve the documentation at the right place.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1024x721.jpg" alt="" class="wp-image-2253" width="517" height="363" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1024x721.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-300x211.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-768x541.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1536x1082.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920.jpg 1920w" sizes="auto, (max-width: 517px) 100vw, 517px" /></a><figcaption>The privacyIDEA documentation contains a lot of information.</figcaption></figure></div>



<p>We have received feedback on the <a rel="noreferrer noopener" href="https://github.com/privacyidea/keycloak-provider" data-type="URL" data-id="https://github.com/privacyidea/keycloak-provider" target="_blank">Keycloak plugin</a> and the ADFS plugin. For the Keycloak plugin we are currently working on a new version. The ADFS plugin has been so far developed by a single developer in the community. We now started <a href="https://github.com/privacyidea/adfs-provider" data-type="URL" data-id="https://github.com/privacyidea/adfs-provider" target="_blank" rel="noreferrer noopener">a new ADFS plugin in the privacyIDEA project</a>, which will then seamlessly integrate like the plugins for Keycloak or simpleSAMLphp into the privacyIDEA universe.</p>



<p>Specifically, the flexibility and the many authentication possibilities of privacyIDEA were praised. We continue to expand these. The reason for this survey was the evaluation of biometrics via facial recognition or typing behavior and the consideration of whether to extend privacyIDEA with a corresponding token type. </p>



<h2 class="wp-block-heading">Biometrics</h2>



<p>The two biometric methods work the same in terms of the rough principle. During registration, biometric data is captured (face or typing behavior) as a mathematical representation; this mathematical representation is then stored in the cloud by the vendor of the method. privacyIDEA takes care of the assignment of the user to the corresponding data set within  the vendor&#8217;s cloud service. So while privacyIDEA itself with the user assignment is running on premises, the mathematical representation would be stored outside of privacyIDEA.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-1024x431.jpg" alt="" class="wp-image-2256" width="501" height="211" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-1024x431.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-300x126.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-768x323.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280.jpg 1280w" sizes="auto, (max-width: 501px) 100vw, 501px" /></a><figcaption>Should privacyIDEA support cloud based face recognition?</figcaption></figure></div>



<p>Facial recognition or a typing token could be used in privacyIDEA self service portal when a user has lost his primary token.</p>



<p>When logging in to self service, to Keycloak or ADFS, a Javascript library would capture the data and compute a new mathematical representation. privacyIDEA would send this with an appropriate handle to the cloud service, which would check for equality with appropriate thresholds. Accordingly, privacyIDEA would grant access. Unfortunately, in order to protect their IP and monetize it, today&#8217;s vendors prefer to provide the verification service online.</p>



<p>The privacyIDEA users have a similar feeling like ourselves. 65% are pragmatically and see biometric authentication simply as an additional token type, that can be used or not. 40% even see it as a good extension.</p>



<p>However, some users also completely reject the support of biometrics.</p>



<p>Only just over 10% of the respondents would use such a biometric method for self-service login. The rest are undecided; just over half would not use it.</p>



<p>Even more interesting is the willingness to pay money for such a service. These biometric systems are offered as cloud services and are correspondingly expensive. 70% of the respondents would not spend money on a biometrics service. 25% of the respondents would be willing to spend an amount that would not cover the costs. Only 5% would possibly be willing to afford such a service.</p>



<h1 class="wp-block-heading">Conclusion for Biometrics</h1>



<p>Biometrics in the enterprise, centrally managed for its own infrastructure, seems to be a niche market. Many end users like to unlock smartphone with a finger or face. In this survey, nearly 2/3 of the respondents said they use biometrics on laptops or smartphones. But apparently it behaves differently with Single Sign-On or VPN.</p>



<p>Or is it simply the group of respondents? The people who participated in this survey are most likely the administrators and IT guys. We didn&#8217;t ask directly about the reasons, but you can guess from some of the answers. Sometimes it has been suggested that biometrics is considered too insecure. Definitely, the way biometrics is offered in the enterprise context, is seen by respondents as too expensive.</p>



<p>While we actually have a use case for biometrics, there might not be a market.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enroll a Yubikey as PIV smartcard</title>
		<link>https://www.privacyidea.org/enroll-a-yubikey-as-piv-smartcard/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 28 Dec 2020 10:35:08 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[smartcards]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2235</guid>

					<description><![CDATA[privacyIDEA supports enrollment of PIV smartcards. A from the scratch howto to enroll x509 certificates on Yubikeys.]]></description>
										<content:encoded><![CDATA[
<p>In this blog post we will show, how you can enroll a Yubikey as a PIV smartcard. privacyIDEA will issue the certificate request sent by the Yubikey but at the same time require an attestation certificate. This way privacyIDEA will assure, that the key pair indeed has been generated on the smartcard.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1000" height="469" src="https://www.privacyidea.org/wp-content/uploads/2020/12/enroll-yubikey.jpg" alt="" class="wp-image-2238" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/enroll-yubikey.jpg 1000w, https://www.privacyidea.org/wp-content/uploads/2020/12/enroll-yubikey-300x141.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2020/12/enroll-yubikey-768x360.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>



<p>You could then use the Yubikey with the x509 certificate to login to you desktop, sign or decrypt emails. These application examples are not topic of this blog post and might be covered in later posts.</p>



<p>You will need a Yubikey 5 and a <a href="https://www.privacyidea.org/multi-factor-authentication-privacyidea-3-5-released/" data-type="post" data-id="2223">privacyIDEA installation with version 3.5</a>. We also assume in this example, that you are running Linux on your desktop.</p>



<h2 class="wp-block-heading">Setup CA in privacyIDEA</h2>



<p>First we have to setup a certificate authority (CA), that will sign the certificate signing request (CSR) generated by the Yubikey. privacyIDEA currently only supports local openssl based CAs. This could however be a sub CA to your existing enterprise CA. In this example, we create a new root CA.</p>



<p><strong>Note: You need read access to pi.cfg and write access to /etc/privacyidea/ca</strong></p>



<pre class="wp-block-code"><code># pi-manage ca create -t local myLocalCA</code></pre>



<p>This pi-manage command will create the CA files and also the CA configuration within privacyIDEA. You are asked a couple of questions and answer them accordingly:</p>



<pre class="wp-block-code"><code># pi-manage  ca create -t local  myLocalCA

             _                    _______  _______
   ___  ____(_)  _____ _______ __/  _/ _ \/ __/ _ |
  / _ \/ __/ / |/ / _ `/ __/ // // // // / _// __ |
 / .__/_/ /_/|___/\_,_/\__/\_, /___/____/___/_/ |_|
/_/                       /___/

Creating CA connector of type local.
In which directory do you want to create the CA &#91;./ca]: /etc/privacyidea/ca
What should be the keysize of the CA (2048/4096/8192)&#91;4096]: 
How many days should the CA be valid &#91;1800]: 
What is the DN of the CA &#91;/CN=myLocalCA]: 
How many days should the CRL be valid &#91;30]: 
What should be the overlap period of the CRL in days &#91;5]: 
============================================================

        Directory  : /etc/privacyidea/ca
        CA DN      : /CN=myLocalCA
        CA Keysize : 4096
        CA Validity: 1800

        Validity of issued certificates: 365

        CRL validity: 30
        CRL overlap : 5

Is this configuration correct? &#91;y/n] y</code></pre>



<p>You also need to fix the access to the directory</p>



<pre class="wp-block-code"><code>chown privacyidea -R /etc/privacyidea/ca</code></pre>



<p>and create a file <code>/etc/privacyidea/ca/templates.yaml</code> with the contents:</p>



<pre class="wp-block-code"><code>user:
    extenstions: "user"
    days: 365</code></pre>



<p>which will ensure, that the certificate will created as a user certificate with a validity period of 365 days.</p>



<p>You need to do some minor fixtues:</p>



<pre class="wp-block-code"><code>cd /etc/privacyidea/ca
openssl rand -writerand .rnd 
touch index.txt.attr 
chown privacyidea .rnd index.txt.attr</code></pre>



<p>For simplicity comment out two lines (crlDistributionPoints and authorityInformationAccess) in the section &#8220;user&#8221; in the file /etc/privacyidea/ca/openssl.cnf</p>



<pre class="wp-block-code"><code>&#91; user ]
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
basicConstraints = CA:FALSE
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer:always
#crlDistributionPoints = @crl_dp_policy
#authorityInfoAccess = caIssuers;URI:http://www.example.com/yourCA.crt</code></pre>



<p>As a last step, go to the Web UI in Config->CA and add the &#8220;Certificate template file&#8221; <code>/etc/privacyidea/ca/templates.yaml</code>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="673" height="692" src="https://www.privacyidea.org/wp-content/uploads/2020/12/ca-templates.png" alt="" class="wp-image-2240" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/ca-templates.png 673w, https://www.privacyidea.org/wp-content/uploads/2020/12/ca-templates-292x300.png 292w" sizes="auto, (max-width: 673px) 100vw, 673px" /></figure>



<p>Now your CA is ready to go.</p>



<h2 class="wp-block-heading">Setup PIV trusted certificates</h2>



<p>The attestation certificate verifies that the private key was generated on the Yubikey. You can tell privacyIDEA, which attestation certificates should be trusted. Here we will use the Yubikey, so we need to fetch the <a href="https://developers.yubico.com/yubico-piv-tool/Attestation.html" target="_blank" rel="noreferrer noopener">Yubico PIV CA from their web site</a>.</p>



<pre class="wp-block-code"><code>mkdir /etc/privacyidea/attestation    
wget https://developers.yubico.com/PIV/Introduction/piv-attestation-ca.pem \
     -O /etc/privacyidea/attestation/yubico.pem</code></pre>



<p>The PIV Root CA has signed the attestation CA, that is contained on each Yubikey. We need to retrieve this from the Yubikey. Do do so insert a Yubikey and run the following command:</p>



<pre class="wp-block-code"><code>yubico-piv-tool --action=read-certificate \ 
      --slot=f9 >> /etc/privacyidea/attestation/yubico.pem</code></pre>



<p>The certificate we read from the Yubikey from slot f9 is the attestation CA, that was signed by the Yubico CA. The attestation CA will sign the attestation certificate, that testifies, that the CSR was created on the yubikey. The file yubico.pem now contains the certificate chain of the PIV Root CA and the Attestation CA.</p>



<p><strong>Note: With new production charges Yubico might put a new attestation CA on the yubikeys. So if you buy 100 yubikeys, they will most probably have the same attestation CA, but if you buy another 100 yubikeys several month later, they might have another attestation CA, so you need to repeat this step and put the new certificate chain in a second file.</strong></p>



<h2 class="wp-block-heading">Configure privacyIDEA policies</h2>



<p>privacyIDEA can already enroll x509 certificates. But to ensure, that it will only enroll certificates from CSRs, that are created on the Yubikey, we need to define a new policy, which is available starting with privacyIDEA 3.5.</p>



<p>We create a policy to require an attestation certificate</p>



<pre class="wp-block-code"><code>scope: enrollment
action: certificate_require_attestation=require_and_verify</code></pre>



<p>In this example we will have the administrator enroll yubikeys, so we set an admin policy, that specifies, where the trusted CA chains can be found:</p>



<pre class="wp-block-code"><code>scope: admin
action: certificate_trusted_Attestation_CA_path=/etc/privacyidea/attestation/</code></pre>



<h2 class="wp-block-heading">Enroll certificate</h2>



<p>Now the admin needs to pass the CSR and in addition an attestation certificate, if he wants to have the CSR signed and receive a certificate. The admin could do this manually with the yubico own tools and using the privacyIDEA REST API. </p>



<p>However, in this example we use the <em>privacyidea admin client</em>, which can be <a href="https://github.com/privacyidea/privacyideaadm" target="_blank" rel="noreferrer noopener">found at github</a>.</p>



<p><strong>Note: You can run the command line client on any other computer, it does not need to be your privacyIDEA server.</strong></p>



<p>In this case we are running it on an Ubuntu Linux desktop.</p>



<p>Prepare dependencies:</p>



<pre class="wp-block-code"><code>sudo apt-add-repository ppa:yubico/stable
sudo apt update
sudo apt install yubikey-manager
sudo apt install ykcs11</code></pre>



<p>Create a virtualenv:</p>



<pre class="wp-block-code"><code>virtualenv -p /usr/bin/python3 piv-test</code></pre>



<p>Enter the environment:</p>



<pre class="wp-block-code"><code>source piv-test/bin/activate</code></pre>



<p>Install the privacyidea admin client:</p>



<pre class="wp-block-code"><code>git clone https://github.com/privacyidea/privacyideaadm
cd privacyideaadm
pip install .</code></pre>



<p>Now you can use the current development branch of the admin client in your virtualenv.</p>



<p><strong>Note: You need to have enough hardware access rights, otherwise you might get errors like &#8221; Failed to transmit with protocol T1. Reader is unavailable&#8221;</strong></p>



<p>If necessary, you can reset the PIV data on your yubikey:</p>



<pre class="wp-block-code"><code>ykman piv reset</code></pre>



<p>Now you can enroll the yubikey certificate:</p>



<pre class="wp-block-code"><code>privacyidea-enroll-yubikey-piv init-cert -s cornelius -u cornelius \
     -U https://localhost -a super -p test -c myLocalCA -n -P 123456</code></pre>



<p>This will create a CSR on the Yubikey, with the subject &#8220;CN=cornelius&#8221; and access the Yubikey with the PIN &#8220;123456&#8221;. The CSR and the attestation certificate will be sent to privacyIDEA at &#8220;https://localhost&#8221;, the admin will authenticate as user &#8220;super&#8221; with the password &#8220;test&#8221; and enroll the certificate to the user &#8220;cornelius&#8221;. privacyIDEA will verify the attestation certificate, sign the CSR and the certificate will be imported to the Yubikey.</p>



<p><strong>Note: If you have problems enrolling and try to reenroll, you might need to delete temporary files _*.</strong></p>



<p>You can now use the Yubikey with the certificate on it to sign emails or login to your Desktop. As mentioned, this can be a topic for future blog posts.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>We showed here how an administrator can enroll a Yubikey with an x509 certificate to a user. At the same time privacyIDEA ensures, that the private key is really generated on the Yubikey. This is an important aspect, when using smartcards for authentication. This ensures, that the private key is unique and can not be copied, neither during the enrollment process nor lateron, making the smartcard a unique authentication factor.</p>



<p>The same way, a user could issue a CSR that was generated on a smartcard to privacyIDEA, making the enrollment process more robust.</p>



<p>This is an important fist step for privacyIDEA to deal with smartcards. We will continue working on  smartcard functionalities, smoothening the workflow and enhancing policies.</p>



<p>In an enterprise environment managing x509 certificates and smartcards on a central location is crucial. The Yubikey could contain several certificates. It can contain Webauthn profiles or HOTP slots. If a Yubikey is lost, the service desk should be able to revoke the one hardware key and the central management should know, which certificates and which HOTP slots are affected. With privacyIDEA we are working on this, to ease the life of administrators and service desk users.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Multi-Factor Authentication privacyIDEA 3.5 released</title>
		<link>https://www.privacyidea.org/multi-factor-authentication-privacyidea-3-5-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 22 Dec 2020 00:08:21 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[4eyes]]></category>
		<category><![CDATA[Dashboard]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[smartcards]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2223</guid>

					<description><![CDATA[Gaining higher security with smartcards and Four-Eyes-Tokens Today we put privacyIDEA 3.5 under your Christmas tree. Unwrap it and you will find a lot of enhancements. One of the most important features is that version 3.5 does the first step to also support smartcard management. For high security environments we drastically imrpoved the workflow of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Gaining higher security with smartcards and Four-Eyes-Tokens</strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1024x699.jpg" alt="" class="wp-image-2225" width="933" height="637" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1024x699.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-300x205.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-768x524.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1536x1048.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-2048x1397.jpg 2048w" sizes="auto, (max-width: 933px) 100vw, 933px" /></figure></div>



<p><em>Today we put privacyIDEA 3.5 under your Christmas tree. Unwrap it and you will find a lot of enhancements. One of the most important features is that version 3.5 does the first step to also support smartcard management. For high security  environments we drastically imrpoved the workflow of Four-Eyes-Tokens.</em></p>



<h2 class="wp-block-heading">Let&#8217;s do this togeather &#8211; Four-Eyes-Tokens</h2>



<p>Using the Four-Eyes-Tokens the administrator can define how many users from several different groups should come togeather when the account &#8211; the holder of the Four-Eyes-Token &#8211; wants to authenticate. This way you can define, that this account worthy of protection can only be used if e.g. two IT administrators and one member of the works council come togeather and use their own 2nd factors to authenticate.</p>



<p>The Four-Eyes-Token has been around for a while in privacyIDEA. But now we are using the <a href="https://www.privacyidea.org/privacyidea-3-4-released/">Multi</a><a href="https://www.privacyidea.org/privacyidea-3-4-released/" target="_blank" rel="noreferrer noopener">&#8211;</a><a href="https://www.privacyidea.org/privacyidea-3-4-released/">Challenge</a>, that was introduced in privacyIDEA 3.4, to heavily improve the workflow and authentication flow. It is totally transparent to our application plugins and the RADIUS protocol, so that it can be used e.g. with Citrix Netscaler.</p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="854" height="451" src="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png" alt="" data-id="2229" data-full-url="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png" data-link="https://www.privacyidea.org/?attachment_id=2229" class="wp-image-2229" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png 854w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1-300x158.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1-768x406.png 768w" sizes="auto, (max-width: 854px) 100vw, 854px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="702" height="378" src="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02.png" alt="" data-id="2228" data-link="https://www.privacyidea.org/?attachment_id=2228" class="wp-image-2228" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02.png 702w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02-300x162.png 300w" sizes="auto, (max-width: 702px) 100vw, 702px" /></figure></li></ul><figcaption class="blocks-gallery-caption">Several persons want to login as &#8220;administrator@highsecurity&#8221;. <br>So in the first step the first person uses his credentials and 2nd factor. Then in a 2nd step the second user is asked for his credentials and 2nd factor.</figcaption></figure>



<h2 class="wp-block-heading">Do not copy, rather sign! &#8211; PIV smartcards with privacyIDEA</h2>



<p>Smartcards are interesting devices, that have certain disadvantages in handling but also come with advantages and features, that allow for completely other use cases like offline authentication, decryption or document signing.</p>



<p>privacyIDEA was already capable of enrolling and manageing x509v3 user certificates. As a first step to better support smartcards, privacyIDEA 3.5 now can require that certificate requests are generated on a PIV smartcard. This is done by<br>using policies to force the presence of an attestation certificate during enrollment. The attestation certificate confirms, that actually the key pair was generated on a smartcard and there is no copy of the private key.</p>



<p>This was successfully done with the Yubikey 5 and a corresponding enrollment tool. We will continue working on imrpoving the privacyIDEAs smartcard capabilities.</p>



<h2 class="wp-block-heading">Make the admin&#8217;s life easier &#8211; serveral enhancements</h2>



<h4 class="wp-block-heading">Tokens</h4>



<p>The Push token gets a lot of feedback in the community. So we are continuously improving it. User certain conditions a smartphone device can renew its firebase token, that is used to communicate with Google&#8217;s firebase push service. The smartphone app can now contact the privacyIDEA server to update this firebase token.</p>



<p>The registration token is a long &#8220;registration code&#8221;, that can be used to authenticate once during enrollment processes. The admin can now configure a policy to define the length and contents of the registration code.</p>



<p>A Webauthn token <a rel="noreferrer noopener" href="https://www.w3.org/TR/webauthn/#sign-counter" target="_blank">should also provide a signature counter</a>, that is used to identify and avoid cloned tokens. However, not all cheap devices implement this. privacyIDEA now also allows to use Webauthn tokens without a signature counter on demand.</p>



<p>Hardware tokens come with a seed file. privacyIDEA can import a lot of different formats, also PSKC which is defined in RFC6030. The import of PSKC files now also verifies the MAC of the token secrets.</p>



<p>The questionnaire token can now ask more than one question during the authentication process.</p>



<h4 class="wp-block-heading">Event handlers and policies</h4>



<p>The policies may now contain additional extened conditions from the tokeninfo attributes. This can be any arbitrary  attribute, so that the admin could define policies, that e.g. allow the authentication at certain applications with a hardware token but not with a software token. </p>



<p>The Tokenhandler can choose the SMS Gateway Identifier or the SMTP Identifier when enrolling an SMS or respectively an Email token.</p>



<p>The Tokenhandler can now increase and decrease the fail counter and also set the Maxfail counter.</p>



<h4 class="wp-block-heading">The Web UI</h4>



<p>Several enhancements allow a smoother work experience for administrators and service desk users. The admin can define a policy to hide certain columns in the audit log. This way the service desk users only see this information, which they really need. Also, the audit log contains the start time, the end time and the duration of a request. This way it is easy to filter or search for long running requests to debug authentication problems. In the dashboard the usernames of the users with failed authentications are displayed with a short link to their user details. This helps the service desk to immidiately find failing users and offer quickers support.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="586" height="249" src="https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user.png" alt="" class="wp-image-2231" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user.png 586w, https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user-300x127.png 300w" sizes="auto, (max-width: 586px) 100vw, 586px" /><figcaption>The sercice desk user can see the failed user&#8217;s details directly by clicking on the linked username.</figcaption></figure></div>



<p>The WebUI now supports the PIN change via multi-challenge response.</p>



<p>The conditions for event handlers and actions for policies have been redesigned to make them look the same and easily searchable.</p>



<h4 class="wp-block-heading">Managing privacyIDEA</h4>



<p>In certain setups you might have a testing environment, a staging environment and a production environment. Configuration changes are often first tested in the testing environment and then transferred to the staging and production environment.</p>



<p>The pi-manage script has a new sub command to export and import resolver configuration, that will help in such scenarios.</p>



<p>The full list of features, enhancements and fixes can be found in the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog">Changelog</a>.</p>



<h2 class="wp-block-heading">Get privacyIDEA</h2>



<p>privacyIDEA is an enterprise grade, extremely flexible multi-factor authentication system, that can adapt to your needs and  that lets you automate a lot of tasks. Using privacyIDEA will increase your security. Migrating from other mult-factor<br>systems to privacyIDEA will ease your life. People have done this and dropped many well-known, but old and crusty authentication systems. Take a look at privacyIDEA and join the community.</p>



<p>It is freely available via the <a href="https://privacyidea.readthedocs.io/en/latest/installation/pip.html">Python package index</a> and via community repositories for <a href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html">Ubuntu LTS 16.04, 18.04 and 20.04</a>.</p>



<p>The company NetKnights provides an <a href="https://netknights.it/en/produkte/privacyidea/">Enterprise Edition</a> with Service Level Agreements and stable packages for Ubuntu LTS and Red Hat Enterprise Linux/CentOS.</p>



<p>If you want to stay tuned, join the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a> or subscribe the <a rel="noreferrer noopener" href="https://netknights.it/en/newsletter/" target="_blank">NetKnights&#8217; newsletter</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA Authenticator iOS Testdrive</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-ios-testdrive/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 15:51:09 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2214</guid>

					<description><![CDATA[We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app. The new version is supposed to provide better PUSH token functionality. It will also provide [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="292" src="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png" alt="" class="wp-image-2215" srcset="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png 1024w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-300x86.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-768x219.png 768w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll.png 1069w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Polling for push notification makes authentication more robust.</figcaption></figure>



<p>We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app.</p>



<p>The new version is supposed to provide better PUSH token functionality. It will also provide the possibility to &#8220;poll&#8221; the PUSH notification &#8211; sounds strange, right? It can be. But this is necessary if for some reason the concatenated push services of Google and Apple <a rel="noreferrer noopener" href="https://community.privacyidea.org/t/setup-secure-authentication-with-ios-privacyidea-push-token/1310" target="_blank">do not work out as expected</a>. Then the smartphone will poll the privacyIDEA to check, if there is a challenge available.</p>



<p>privacyIDEA 3.4 is required in the backend for PUSH-poll to work.</p>



<p>A beta version of the new privacyIDEA Authenticator is available <strong>now</strong> via <s>Testdrive</s> Testflight. If you want to <a rel="noreferrer noopener" href="https://testflight.apple.com/join/hcpxWPt0" target="_blank">participate, register here</a>.</p>



<p>We are looking forward to your feedback.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
