<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>release &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/category/release/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Wed, 22 Apr 2026 07:05:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>release &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.13 is available</title>
		<link>https://www.privacyidea.org/privacyidea-3-13-is-available/</link>
		
		<dc:creator><![CDATA[Isabelle Mühlhausen]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 11:44:05 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2430</guid>

					<description><![CDATA[The latest released version 3.13 of multi-factor authentication software privacyIDEA is available. The most significant new feature is the expanded support for passkeys. As a result, users can now register passkeys on Windows and Linux. Support for the RADIUS protocol has been improved for the push token. Visually, the new WebUI is now available as a beta version.]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">NetKnights releases privacyIDEA 3.13 with enhanced passkey functionality and new web interface</h2>



<p><strong>Kassel, 07.04.2026</strong> – The latest version 3.13 of multi-factor authentication software privacyIDEA is available. The most significant new feature is the expanded support for passkeys. As a result, users can now register passkeys on Windows and Linux. Support for the RADIUS protocol has been improved for the push token. Visually, the new WebUI is now available as a beta version.</p>



<h2 class="wp-block-heading">Passkey registration during sign-in with offline functionality</h2>



<p>With version 3.13, users in Windows and Linux environments can register a passkey directly during the login process. This passkey is then available for offline authentication on the corresponding device. Administrators can control this process specifically through policies. The advantage lies in a significantly simplified rollout process: Neither administrators nor help desk users need to be actively involved in the deployment process. This makes the introduction of new tokens less subject to errors and requires less support, while offering greater comfort for users.</p>



<h2 class="wp-block-heading"><strong>Push authentication with code-based authentication for RADIUS</strong></h2>



<p>A new policy improves the use of push tokens in RADIUS-based scenarios such as VPNs or firewalls. The user confirms the login on their smartphone and then enters a numeric code displayed in the app into the login screen. This ensures that the user is directly involved in the login process. At the same time, the authentication is cryptographically secured and offers a significant security advantage over TOTP-based methods.</p>



<h2 class="wp-block-heading"><strong>Beta version of the new WebUI is now available</strong></h2>



<p>The modernized user interface of privacyIDEA is now available in its full functionality as a beta version. In addition to the existing self-service area, it also includes the administrator view. In version 3.13, however, the previous WebUI remains the default interface. Users can test the new user interface and provide feedback. In version 3.14, the new WebUI will then be activated as the default interface.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token.png"><img fetchpriority="high" decoding="async" width="1024" height="553" src="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token-1024x553.png" alt="" class="wp-image-2433" srcset="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token-1024x553.png 1024w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token-768x415.png 768w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token-1536x829.png 1536w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Enroll-New-Token.png 1919w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Enrollment of a new Token within the WebUI.</figcaption></figure>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview.png"><img decoding="async" width="1024" height="554" src="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview-1024x554.png" alt="" class="wp-image-2434" srcset="https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview-1024x554.png 1024w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview-768x415.png 768w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview-1536x831.png 1536w, https://www.privacyidea.org/wp-content/uploads/2026/04/privacyIDEA-Token-Overview.png 1919w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Modernized Token Overview.</figcaption></figure>



<p>All other changes are listed in detail in the changelog on GitHub. All components of privacyIDEA are also being further developed there under the leadership of NetKnights GmbH as open-source software under the AGPLv3.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>The new version 3.13 of privacyIDEA is now available via the Python Package Index and in the community repositories for Ubuntu 22.04 and 24.04.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.12 is available</title>
		<link>https://www.privacyidea.org/privacyidea-3-12-is-available/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-12-is-available/#comments</comments>
		
		<dc:creator><![CDATA[Isabelle Mühlhausen]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 09:44:56 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2385</guid>

					<description><![CDATA[The new version 3.12 integrates a user resolver for Entra ID and Keycloak. For the first time, users can get a preview of the fundamentally redesigned WebUI. Enhanced smartphone container functions enable efficient token management. ]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>New version of open source MFA solution released: privacyIDEA 3.12 introduces user resolver for Entra ID and Keycloak and preview function for new web UI</strong></h2>



<p><strong>Kassel, 9 September 2025 – IT security company NetKnights has released version 3.12 of its open-source multi-factor authentication solution privacyIDEA. The new version integrates a user resolver for Entra ID and Keycloak. For the first time, users can get a preview of the fundamentally redesigned WebUI. Enhanced smartphone container functions enable efficient token management.</strong></p>



<h2 class="wp-block-heading">User Resolver for Entra ID and Keycloak</h2>



<p>privacyIDEA 3.12 introduces user resolvers for Entra ID and Keycloak. Administrators can retrieve user data directly from these directory services and assign tokens to them in privacyIDEA. This enables seamless token management, even in hybrid infrastructures consisting of on-premises and cloud environments.</p>



<h2 class="wp-block-heading">Preview of modernised WebUI</h2>



<p>The privacyIDEA user interface is being extensively modernised and will be available from version 3.13 . Version 3.12 offers a preview function of the new WebUI for user self-service and the administrator view. This provides a preview of the improved token overview, which allows tokens to be managed more efficiently. Users can test the new interface and provide feedback; based on this, the new WebUI’s user-friendliness will be further refined.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service.png"><img decoding="async" width="1024" height="613" src="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service-1024x613.png" alt="" class="wp-image-2388" srcset="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service-1024x613.png 1024w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service-300x179.png 300w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service-768x459.png 768w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service-1536x919.png 1536w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_User_Self_Service.png 1919w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Preview of modernised User Self Service</em></figcaption></figure>



<p></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview.png"><img loading="lazy" decoding="async" width="1024" height="614" src="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview-1024x614.png" alt="" class="wp-image-2389" srcset="https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview-1024x614.png 1024w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview-300x180.png 300w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview-768x460.png 768w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview-1536x921.png 1536w, https://www.privacyidea.org/wp-content/uploads/2025/09/Screenshot_Adminview.png 1920w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Preview of refined Administrator View.</em></figcaption></figure>



<h2 class="wp-block-heading">Enhanced Smartphone Container Functions</h2>



<p>The smartphone container functions were expanded in version 3.12. Containers can be rolled out during authentication. Additionally, smartphone containers can be rolled out using the password of the user store as a registration code – in combination with the Authenticator app from version 4.6.0 onwards. This secures the rollout process without requiring an additional password.</p>



<h2 class="wp-block-heading">Policy and Condition Improvements</h2>



<p>Numerous improvements have been made to existing policies to enable more precise configuration. In addition, new conditions have been added and their handling has been refined.</p>



<p>Version 3.12 of privacyIDEA lays a modernised, future-oriented foundation for upcoming releases and prepares the software both technically and conceptually for the next development steps.</p>



<p>All other changes are listed in detail in the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog">Changelog on GitHub</a>. At this point, all components of privacyIDEA are also being further developed as open source software under the AGPLv3 under the leadership of NetKnights GmbH.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>The new version 3.12 of privacyIDEA is now available via the <strong>Python Package Index</strong> and in the <strong>community repositories</strong> for <strong>Ubuntu 22.04 and 24.04</strong>.</p>



<h2 class="wp-block-heading">About privacyIDEA</h2>



<p>privacyIDEA is an open source multi-client and multi-instance capable system for multi-factor authentication. The development is made transparently on Github. Installations and updates are easily possible via the Python Package Index or via repositories for Ubuntu. A few weeks after the respective community major release, NetKnights GmbH publishes an enterprise release for Ubuntu LTS and RHEL/CentOS.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-12-is-available/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 3.11 is available</title>
		<link>https://www.privacyidea.org/privacyidea-3-11-is-available/</link>
		
		<dc:creator><![CDATA[Isabelle Mühlhausen]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 08:06:07 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[release]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2373</guid>

					<description><![CDATA[The IT security company NetKnights releases version 3.11 of the professional multi-factor authentication software privacyIDEA. Extended container functions for the smartphone enable efficient synchronization and management of tokens. Passkeys are available as a new authentication method. An RSS newsfeed has also been introduced to inform administrators about updates, patches and events.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="666" src="https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-1024x666.jpg" alt="" class="wp-image-2377" srcset="https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-1024x666.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-300x195.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-768x499.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-1536x999.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2025/02/Teaserbild_privacyIDEA_3.11-1-2048x1331.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<h2 class="wp-block-heading">Extended container functions, passkeys as new token type &amp; RSS-Newsfeed</h2>



<p><strong>The IT security company NetKnights releases version 3.11 of the professional multi-factor authentication software privacyIDEA. Extended container functions for the smartphone enable efficient synchronization and management of tokens. Passkeys are available as a new authentication method. An RSS newsfeed has also been introduced to inform administrators about updates, patches and events.</strong></p>



<h2 class="wp-block-heading">New functions for token containers</h2>



<p>Version 3.11 of privacyIDEA offers new functions for the smartphone as a token container, which simplify the management of tokens. For scenarios such as the change to a new smartphone or the loss of a device, privacyIDEA now offers a container rollover. This allows an administrator to create a rollover QR code for an old container. If the user scans the QR code with the new device, the tokens are automatically transferred.<br>It is also possible to register containers with the server and roll out the defined tokens to the smartphone in a single step. As soon as the container is registered, the administrator can add and delete tokens. It is also possible to delete and block token containers completely.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/02/Container.png"><img loading="lazy" decoding="async" width="1024" height="605" src="https://www.privacyidea.org/wp-content/uploads/2025/02/Container-1024x605.png" alt="" class="wp-image-2375" srcset="https://www.privacyidea.org/wp-content/uploads/2025/02/Container-1024x605.png 1024w, https://www.privacyidea.org/wp-content/uploads/2025/02/Container-300x177.png 300w, https://www.privacyidea.org/wp-content/uploads/2025/02/Container-768x454.png 768w, https://www.privacyidea.org/wp-content/uploads/2025/02/Container-1536x908.png 1536w, https://www.privacyidea.org/wp-content/uploads/2025/02/Container.png 1668w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Overview of the details of a smartphone container.</em></figcaption></figure>



<h2 class="wp-block-heading">Passkeys as a new token type</h2>



<p>A new feature of version 3.11 of privacyIDEA is the introduction of passkeys as a token type. Passkeys are cryptographic key pairs that are stored locally on the device. They are resistant to a wide variety of phishing attacks, which increases user security. Users benefit from a simplified login process as they can authenticate themselves without having to enter a user name. Passkeys also enable seamless integration across different devices, increasing flexibility for the user.</p>



<h2 class="wp-block-heading">Introduction of an RSS newsfeed</h2>



<p>An RSS newsfeed has been integrated into the privacyIDEA user interface. Administrators can subscribe to this newsfeed and find out about updates, patches or webinars.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed.png"><img loading="lazy" decoding="async" width="1024" height="651" src="https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed-1024x651.png" alt="" class="wp-image-2376" srcset="https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed-1024x651.png 1024w, https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed-300x191.png 300w, https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed-768x488.png 768w, https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed-1536x977.png 1536w, https://www.privacyidea.org/wp-content/uploads/2025/02/Newsfeed.png 1676w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Overview of the RSS Newsfeed within the interface of privacyIDEA.</em></figcaption></figure>



<p>All other changes are listed in detail in the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog">Changelog on GitHub</a>. At this point, all components of privacyIDEA are also being further developed as open source software under the AGPLv3 under the leadership of NetKnights GmbH.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>The new version 3.11 of privacyIDEA is now available via the <strong>Python Package Index</strong> and in the <strong>community repositories</strong> for <strong>Ubuntu 20.04, 22.04 and 24.04.</strong></p>



<h2 class="wp-block-heading">About privacyIDEA</h2>



<p>privacyIDEA is an open source multi-client and multi-instance capable system for multi-factor authentication. The development is made transparently on Github. Installations and updates are easily possible via the Python Package Index or via repositories for Ubuntu. A few weeks after the respective community major release, NetKnights GmbH publishes an enterprise release for Ubuntu LTS and RHEL/CentOS.</p>



<p>Further information on the latest developments relating to privacyIDEA can be found at <a href="https://netknights.it/en/news/">https://netknights.it/en/news/</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.10 is available</title>
		<link>https://www.privacyidea.org/privacyidea-3-10-is-available/</link>
		
		<dc:creator><![CDATA[Isabelle Mühlhausen]]></dc:creator>
		<pubDate>Tue, 03 Sep 2024 11:23:20 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[release]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2352</guid>

					<description><![CDATA[The IT security company NetKnights has released version 3.10 of the professional multi-factor authentication software privacyIDEA. The organization of tokens in containers enables user-friendly and clear token management. As a new authentication method, WebAuthn can now also be used offline in version 3.10. Furthermore, authentication using PUSH tokens has been extended. The new version is now available via the Python Package Index and in the community repositories for Ubuntu 20.04 and 22.04.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="666" src="https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-1024x666.jpg" alt="" class="wp-image-2353" srcset="https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-1024x666.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-300x195.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-768x499.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-1536x999.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2024/11/PrivacyIdea3.10_final-2048x1331.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<h3 class="wp-block-heading"><strong>Token organization in container, WebAuthn Offline and extendes PUSH-Login available </strong></h3>



<h5 class="wp-block-heading"><strong>The IT security company NetKnights has released version 3.10 of the professional multi-factor authentication software privacyIDEA. The organization of tokens in containers enables user-friendly and clear token management. As a new authentication method, WebAuthn can now also be used offline in version 3.10. Furthermore, authentication using PUSH tokens has been extended. The new version is now available via the Python Package Index and in the community repositories for Ubuntu 20.04 and 22.04.</strong></h5>



<h2 class="wp-block-heading">Support of WebAuthn Offline Token</h2>



<p>A new feature is the support of WebAuthn tokens for offline authentication. With the implementation of WebAuthn offline tokens, users can authenticate themselves securely independently of their location, e.g. with their laptop while on the train. The tokens can be used offline across devices, whereby the functionality of the tokens is maintained in the same way in online mode. This contributes to seamless integration into existing IT security structures and optimizes user flexibility.</p>



<h2 class="wp-block-heading">Token Management through containers</h2>



<p>In version 3.10 of privacyIDEA, users can organize their authentication tokens in containers. These offer a clear method for organizing and managing tokens. This new function allows users to structure their tokens according to different characteristics and group them together in a container. For example, it is possible to organize professional and private tokens separately or to combine tokens for certain applications in one container. The containers thus help to create a clearer structure and make it easier to manage the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung.png"><img loading="lazy" decoding="async" width="1024" height="336" src="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-1024x336.png" alt="" class="wp-image-2354" srcset="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-1024x336.png 1024w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-300x99.png 300w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-768x252.png 768w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-1536x505.png 1536w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Erstellung-2048x673.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Image 1: Creation of a container in privacyIDEA.</em></figcaption></figure>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details.png"><img loading="lazy" decoding="async" width="1024" height="496" src="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-1024x496.png" alt="" class="wp-image-2355" srcset="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-1024x496.png 1024w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-300x145.png 300w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-768x372.png 768w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-1536x743.png 1536w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Details-2048x991.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Image 2: Overview of Container Details.</em></figcaption></figure>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste.png"><img loading="lazy" decoding="async" width="1024" height="539" src="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste-1024x539.png" alt="" class="wp-image-2356" srcset="https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste-1024x539.png 1024w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste-300x158.png 300w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste-768x404.png 768w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste-1536x809.png 1536w, https://www.privacyidea.org/wp-content/uploads/2024/11/Container_Liste.png 1759w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption"><em>Image 3: Overview of a container including the contained tokens.</em></figcaption></figure>



<p><div data-elementor-type="single-page" data-elementor-id="17985" class="elementor elementor-17985 elementor-17652 elementor-location-single post-19155 pressemitteilungen type-pressemitteilungen status-publish has-post-thumbnail hentry" data-elementor-post-type="elementor_library"><section class="elementor-section elementor-top-section elementor-element elementor-element-ca850ee elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ca850ee" data-element_type="section"><div class="elementor-container elementor-column-gap-no"><div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e288bfb" data-id="e288bfb" data-element_type="column"><div class="elementor-widget-wrap elementor-element-populated"><div class="elementor-element elementor-element-798d60a elementor-widget elementor-widget-theme-post-content" data-id="798d60a" data-element_type="widget" data-widget_type="theme-post-content.default"><div class="elementor-widget-container"><h2 class="wp-block-heading"><strong>PUSH-Login</strong> <strong>extended</strong></h2></div></div></div></div></div></section></div></p>



<p>Authentication via PUSH token has been extended in version 3.10 of privacyIDEA. A letter or number is displayed in privacyIDEA during authentication using a PUSH token. At the same time, a selection of different letters or numbers appears in the Authenticator app. The correct answer must then be selected for successful authentication. This additional security measure is optional and can also be applied to existing PUSH tokens.</p>



<figure class="wp-block-image size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2024/11/Erweitertes_Push_Verfahren_Light.png"><img loading="lazy" decoding="async" width="457" height="968" src="https://www.privacyidea.org/wp-content/uploads/2024/11/Erweitertes_Push_Verfahren_Light.png" alt="" class="wp-image-2357" srcset="https://www.privacyidea.org/wp-content/uploads/2024/11/Erweitertes_Push_Verfahren_Light.png 457w, https://www.privacyidea.org/wp-content/uploads/2024/11/Erweitertes_Push_Verfahren_Light-142x300.png 142w" sizes="auto, (max-width: 457px) 100vw, 457px" /></a><figcaption class="wp-element-caption"><em>Image 4: Extended PUSH login process via the privacyIDEA Authenticator App.</em></figcaption></figure>



<p></p>



<p>All further changes are listed in detail in the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog">changelog</a> on GitHub. At this point, all components of privacyIDEA are also being further developed as open source software under the AGPLv3 under the leadership of NetKnights GmbH.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>The new version 3.10 of privacyIDEA is now available via the Python Package Index and in the community repositories for Ubuntu 20.04 and 22.04. In addition, NetKnights GmbH offers the Enterprise Edition with support for Ubuntu LTS, RHEL 8 and 9 as well as derivatives and an appliance tool and carries out contract development for special requirements.</p>



<h2 class="wp-block-heading">About privacyIDEA</h2>



<p>privacyIDEA is an open source multi-client and multi-instance capable system for multi-factor authentication. It is developed transparently on Github. Installations and updates are easily possible via the Python Package Index or via repositories for Ubuntu. A few weeks after the respective community major release, NetKnights GmbH publishes a stable enterprise release for Ubuntu LTS and RHEL/CentOS.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.9 available</title>
		<link>https://www.privacyidea.org/privacyidea-3-9-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 07:00:00 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Application Specific Password]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Credential Management]]></category>
		<category><![CDATA[Day Password]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2325</guid>

					<description><![CDATA[We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows.]]></description>
										<content:encoded><![CDATA[
<p><strong>Manage Login data in the most flexible way</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png"><img loading="lazy" decoding="async" width="1024" height="666" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png" alt="We pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows." class="wp-image-2329" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png 1024w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-300x195.png 300w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-768x499.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png 1103w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place &#8211; since successful authentication is a matter of smooth workflows.</em></p>



<p>privacyIDEA aims to be a management system where the administrator can easily manage the authentication topic for the users. You as an administrator can manage the OTP tokens (TOTP, HOTP apps, Yubikeys), tokentype like SMS or Email, even FIDO2. All you need for two factor authentication.</p>



<p>And privacyIDEA is able to also verify the first factor. The static password.</p>



<h2 class="wp-block-heading">Old authentication &#8211; new token types</h2>



<p>But sometimes you might see, that two factor authentication does not work out as expected. That applications do not play well with FIDO2/WebAuthn. Yes, sometimes applications do not play well even with OTP tokens. Take an Email client, that caches the user password and sends it, every time it fetches the emails from the server. The request will fail if it is sent with the same OTP value a second time.</p>



<p>Successful Authentication is not always a matter of choose the most modern cryptographic algorithm or the latest authentication method. </p>



<p>Sometimes there is an old, nasty application that refuses to work well with the 2FA method you are enrolling in your company. But privacyIDEA wants to help you as administrator to manage all these challenges in one system.</p>



<p>With privacyIDEA 3.9 we introduce two new token types which might sound old and insecure, but which are supposed to enable you to take a step forward, even if some old applications want to hold you back.</p>



<p>The<strong> application specific password</strong> token is simply a static password that can be bound to a specific application. The old application will send an authentication request against privacyIDEA and privacyIDEA will realize, that this auth request originated from this application and allow such application specific password tokens enrolled for this application to be used for authentication. A user can have a specific password for e.g. his email client, save this in his smartphone and privacyIDEA will accept this only for login requests by this email client resp. mail server. <br>You may check the conceptual evolution of this feature on <a href="https://github.com/privacyidea/privacyidea/issues/3260" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/issues/3260">Github</a>.</p>



<p>The <strong>day password</strong> token is a similar quirky thing. In certain situations having an OTP token that changes all 30 seconds or 60 seconds may be to changeable for some users or use cases. But using no second factor and relying on a never changing static password is also not an option.</p>



<p>Why not have a token, that can be used for one hour? Or one day? The day password token in privacyIDEA 3.9 is a token type with a variable time window between one second and many days. During this time window the given code is valid during the whole time window and can be used as often as needed. It is similar to TOTP (in fact it is inherited from the TOTP token class), but has the above mentioned special effects. <br><br>This token type has its counter part in the privacyIDEA Authenticator App, which you can find in the <a rel="noreferrer noopener" href="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" data-type="URL" data-id="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" target="_blank">Google Play Store</a> and <a rel="noreferrer noopener" href="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" data-type="URL" data-id="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" target="_blank">Apple App Store</a>. The day password token is supported in the privacyIDEA Authenticator App starting with version 4.2.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png" alt="" class="wp-image-2341" width="202" height="437" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png 473w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-139x300.png 139w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-768x1663.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-709x1536.png 709w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-946x2048.png 946w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png 960w" sizes="auto, (max-width: 202px) 100vw, 202px" /></a><figcaption>The privacyIDEA Authenticator App supports the new day password token.</figcaption></figure></div>



<p></p>



<p></p>



<h2 class="wp-block-heading">Improving SSH Key Management</h2>



<p>Managing SSH keys has been a bit cumbersome in the past. You as the administrator had to assign each SSH server to the SSH key, so that the user could use the SSH key to log to this server.</p>



<p>With privacyIDEA 3.9 you can now define service identifiers, which represent the servers. E.g. you could define an identifier &#8220;web servers&#8221; and assign SSH keys to this identifier. </p>



<p>Now you can simply have the SSH server identify as &#8220;web servers&#8221; to allow the login with this SSH key. This way it is easy as configuring the corresponding server, to add a new SSH server to the &#8220;web servers&#8221;.</p>



<p>The helper script <a href="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" target="_blank" rel="noreferrer noopener">privacyidea-authorizedkeys</a>, which is supposed to run on the SSH servers has been modified so that it queires privacyIDEA for the corresponding service identifier.</p>



<h2 class="wp-block-heading">Changelog</h2>



<p>A new event handler can set the application assignment during enrollment. This helps with definding HOTP tokens as Offline-Tokens for the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" data-type="URL" data-id="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" target="_blank">privacyIDEA Credential Provider</a>. The PUSH token can do a decline, so that the authentication process is cancelled.</p>



<p>You can find the complete changelog at <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Github</a>.</p>



<h2 class="wp-block-heading">Install and Update</h2>



<p>You can download and update privacyIDEA 3.9 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 20.04LTS and Ubuntu 22.04LTS</a> or via the <a href="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" target="_blank" rel="noreferrer noopener">Python Package Index.</a></p>



<p>If you want to get involved, you can join the <a href="https://community.privacyidea.org" data-type="URL" data-id="https://community.privacyidea.org" target="_blank" rel="noreferrer noopener">discussion at the Forum</a> or coding at <a href="https://github.com/privacyidea/privacyidea" data-type="URL" data-id="https://github.com/privacyidea/privacyidea" target="_blank" rel="noreferrer noopener">Github</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.8 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-8-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 20 Dec 2022 07:49:14 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[yubik]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2318</guid>

					<description><![CDATA[With privacyIDEA 3.8 you can use the Yubikey for Smartcard domain Login. 
A generic token enrollment at any application without the need for the user to go to the selfservice portal.]]></description>
										<content:encoded><![CDATA[
<p><strong>Transparent Rollout and Smartcard Login</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg"><img loading="lazy" decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg" alt="" class="wp-image-2319" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are happy to inform you, that we released privacyIDEA 3.8 today. 3.8 is an important milestone, since we start to support the Yubikey as a smartcard, that can also be used to login to Windows domains.</em></p>



<h2 class="wp-block-heading">Support for smartcard login on Windows systems</h2>



<p>privacyIDEA 3.8 can manage the Yubikey as a smartcard that holds a smartcard logon certificate. To obtain the smartcard logon certificate, the privacyIDEA server has a new certificate connector to communicate to all Microsoft Active Directory Certiticate Services in the connected Windows domain.</p>



<p>Thus the certificate on the Yubikey can directly be obtained from the Micrsoft CA but be managed within privacyIDEA.</p>



<h2 class="wp-block-heading">Rollout during authentication</h2>



<p>privacyIDEA supports Multi-Challenge-Response for a while. This mechanism can be used to reset an OTP PIN or authenticate with 4-eyes tokens or index-secret tokens. </p>



<p>In version 3.8 this same mechanism can now be used to enroll a token during authentication. The administrator can define a policy, which token type should be enrolled by the user. In several challenge-response steps thus the user can enroll HOTP, TOTP, email, SMS or PUSH tokens. Email and SMS tokens can even be enrolled in standard applications like the Netscaler.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png"><img loading="lazy" decoding="async" width="663" height="358" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png" alt="" class="wp-image-2320" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png 663w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix-300x162.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /></a><figcaption>SMS token enrollment during the login to Citrix ADC</figcaption></figure></div>



<p>HOTP, TOTP and PUSH enrollment require the application to display a QR code. This mechanism will be supported by all privacyIDEA plugins for e.g. Keycloak, simpleSAMLphp or ADFS.</p>



<h2 class="wp-block-heading">Fast login, fast debugging, token groups</h2>



<p>Using a new &#8220;preferred client mode&#8221; the administrator can define, which should be the preferred way for a user to authenticate, in case the user has more than one token type.</p>



<p>The audit log has been greatly improved for bug tracking. It now also records the thread ID of an API request.<br>Since the threat ID is also contained in the debug log file, this is a great handle to find the relevant detailed information to a specific request in the logs.</p>



<p>privacyIDEA 3.8 comes with the new conecpt of &#8220;token groups&#8221;. We plan to use this to improve SSH key management and the management of offline tokens.</p>



<p>For more details see the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noreferrer noopener">changelog at Github</a>.</p>



<h2 class="wp-block-heading">Install or Update</h2>



<p>You can download and update privacyIDEA 3.8 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/master/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 18.04, 20.04 and now also 22.04 or via the python package index</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA Authenticator 4.0 with Push Poll</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-4-0-with-push-poll/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 13 Jun 2022 09:04:34 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2311</guid>

					<description><![CDATA[The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.]]></description>
										<content:encoded><![CDATA[
<p>The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.</p>



<p>If you are not using your own source code but use the precompiled <a rel="noreferrer noopener" href="https://netknights.it/en/produkte/privacyidea-authenticator-app/" target="_blank">privacyIDEA Authenticator released by the company NetKnights</a>, this has the following meaning for you.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png" alt="" class="wp-image-2313" width="593" height="395" srcset="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png 1000w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-768x512.png 768w" sizes="auto, (max-width: 593px) 100vw, 593px" /></a></figure></div>



<p><br></p>



<h3 class="wp-block-heading">Breaking Change in Push-Functionality</h3>



<p>In order to increase the stability of the push functionality and the reliability of the delivery of the push messages, we decided to revise the configuration of the Firebase project. As of version 4.0, the app works with a central Firebase project that is managed by NetKnights.</p>



<p>That means your privacyIDEA server will no longer be able to notify the push tokens in the app version 4.0 via the Firebase project you have configure individually. To enable the new and more stable notification feature, you either need to recompile the App or get a subscription from NetKnights to gain access to the central Firebase project.</p>



<p>However, you can also use the precompiled and released Authenticator App without the need for a Firebase project. </p>



<h3 class="wp-block-heading">Using Push-Token without Firebase project</h3>



<p>In this scenario you will use the Push-Poll functionality, where the Authenticator polls the challenges from the privacyIDEA server. Users will have to have the privacyIDEA Authenticator App in the foreground to receive messages.</p>



<p>You need to proceed as follows.</p>



<ol class="wp-block-list"><li>Update the privacyIDEA server to version 3.7.1. This will ensure a flawless polling functionality</li><li>If not yet configured, create a policy in scope “Authentication” with the setting “push_allow_polling” = “allow”.</li><li>If not yet configured, create a policy in scope “Enrollment” with the setting “push_firebase_configuration” = “poll only”. </li><li>If you already have a “push_firebase_configuration” policy, change it to “poll only”.</li><li>To receive the Push notification, the user must open the privacyIDEA Authenticator. The notifications will be polled or the user can actively poll the notifications by swiping downwards.</li><li>The configuration of the Firebase project in your privacyIDEA server can be deleted.</li></ol>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.7 Released</title>
		<link>https://www.privacyidea.org/privacyidea-3-7-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 06:46:42 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[HSM]]></category>
		<category><![CDATA[offline]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2293</guid>

					<description><![CDATA[Offline Login without IP restrictions and verified enrollment We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Offline Login without IP restrictions and verified enrollment</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png" alt="" class="wp-image-2294" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-768x512.png 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment and a new supported way for encrypting the sensive data in privacyIDEA with a hardware security module.</em></p>



<h2 class="wp-block-heading">Hardware Security Modules</h2>



<p>Hardware Security Modules (HSMs) are expensive. Especially if you need a network attached HSM that provides the necessary performance to encrypt the OTP seed for each authentication request. This is the way how privacyIDEA currently supported HSMs. It is secure &#8211; but it is slow (unless you have the right hardware) and costly.</p>



<p>In privacyIDEA 3.7 we provide a new security module with a different approach. The idea was born in discussing security and speed with an enterprise community member.</p>



<p>The new security module <code>encryptkey.py</code> still holds the encryption keys in a keyfile. But this keyfile again is encypted with an assymmetric key on an HSM. The keyfile is decrypted by the HSM on startup and then the encryption keys from the keyfile are stored in memory. This way the slow HSM operation will only occur when starting or restarting the web server process. This allows you to use much cheaper HSMs or even Smartcards  to protect your key material.</p>



<p>Still &#8211; you should be familiar with smartcards or HSMs and know what you are doing, to avoid wrecking your senstive data.</p>



<h2 class="wp-block-heading">Offline Token</h2>



<p>privacyIDEA allows clients like the privacyIDEA Credential Provider to fetch offline information to allow a user to login with a specific HOTP token, even if the privacyIDEA server can not be reached. However, this was always bound to the IP address of the client machine.</p>



<p>We removed the IP binding and redesigned the process. This way it is now much easier and more robust to use an HOTP token for offline authentication at your Windows notebook.</p>



<h2 class="wp-block-heading">Verify Enrollment</h2>



<p>When enrolling a smartphone HOTP or TOTP token, the user needs to scan a QR code that was generated by privacyIDEA. Only after scanning this QR code with a authenticator smartphone app, the token is technically enrolled on the user side. Administrators reported that sometimes some users forgot to scan the QR code. Thus privacyIDEA deemed the token as enrolled, while nothing existed on the user&#8217;s smartphone.</p>



<p>With 3.7 the administrator can now force the user to enter a valid OTP value during the enrollment process. This way the user is required to scan the QR code to be able to provide the valid OTP value. Only then privacyIDEA deems the token as successfully enrolled.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png"><img loading="lazy" decoding="async" width="698" height="492" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png" alt="" class="wp-image-2299" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png 698w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment-300x211.png 300w" sizes="auto, (max-width: 698px) 100vw, 698px" /></a><figcaption>privacyIDEA 3.7 can require the user to enter a valid OTP value before the token is successfully enrolled.</figcaption></figure></div>



<h2 class="wp-block-heading">Further Enhancements</h2>



<p>There are a lot of further enhancements.</p>



<p>Policies can now also use web server environment variables as conditions.</p>



<p>In version 3.6 custom user attributes have been introduced. In 3.7 the administrator can now define event handlers to set or delete custom user attributes. This way, you could e.g. set an attribute to a user as soon as the user enrolls a certain token type. Then you could have authentication policies, that take this token type as a condition, only allowing those users to do certain things. </p>



<p>Possibilities are many. We do not know them all! Find yours!</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">changelog at Github</a>.</p>



<p>If you are running privacyIDEA in mission critical environments, the company NetKnights which staffs the core developers, also provides <a href="https://netknights.it" target="_blank" rel="noreferrer noopener">services and support</a>.</p>



<p>If you want to get involved with privacyIDEA you can also visit the <a href="https://community.privacyidea.org">community forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA simpleSAMLphp Plugin 2.1 available</title>
		<link>https://www.privacyidea.org/privacyidea-simplesamlphp-plugin-2-1-available/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 16:16:02 +0000</pubDate>
				<category><![CDATA[privacyIDEA Plugins]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[simplesamlphp]]></category>
		<category><![CDATA[SSO]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2286</guid>

					<description><![CDATA[We are proud to release the privacyIDEA simpleSAMLphp Plugin 2.1. We added a new feature, that allows the administrator to configure real Single Sign-On or secure 2FA requirement. In Single Sign-On mode, the user is asked for the second factor only once. In the secure 2FA requirement, the user is required to provide his second [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1024x666.jpg" alt="" class="wp-image-2288" width="602" height="391" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1024x666.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-300x195.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-768x499.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On-1536x998.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyIDEA_Single_Sign_On.jpg 2000w" sizes="auto, (max-width: 602px) 100vw, 602px" /></a></figure></div>



<p>We are proud to release the privacyIDEA simpleSAMLphp Plugin 2.1. We added a new feature, that allows the administrator to configure real Single Sign-On or secure 2FA requirement.</p>



<p>In Single Sign-On mode, the user is asked for the second factor only once. In the secure 2FA requirement, the user is required to provide his second factor for each application where he wants to log in.</p>



<p>The administrator can configure this behavirour in the config file with the parameter &#8220;SSO&#8221;.</p>



<p>The new version of the privacyIDEA simpleSAMLphp plugin is available via <a rel="noreferrer noopener" href="https://github.com/privacyidea/simplesamlphp-module-privacyidea/releases/tag/v2.1.0" target="_blank">Github</a>. You can download the code there and add it to your installation.<br></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.6 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-6-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-6-released/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 08:32:19 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Custom Attributes]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2271</guid>

					<description><![CDATA[Custom User Attributes and Token Attributes in Policies allow for more control We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Custom User Attributes and Token Attributes in Policies allow for more control</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg"><img loading="lazy" decoding="async" width="1024" height="682" src="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg" alt="" class="wp-image-2273" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1536x1024.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg 2000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional possibilities to manage the users and to manage the user rights. These user attributes can be used within privacyIDEA policies. In addition policies can now also contain any token attribute like tokentype or fail counter. These attributes and policy conditions help administrators to keep control in larger setups by logically grouping users and tokens.</em></p>



<h3 class="wp-block-heading">Policies with Custom User Attributes and Token Attributes </h3>



<p>privacyIDEA is no Identity Management. Users are usually managed in an IdM, or only in LDAP or Active Directory. Nevertheless it can be important to add attributes to users &#8211; in case the token administrator has no access rights to the IdM or user directory. The administrator can now do so in privacyIDEA 3.6 using custom user attributes. The administrator can even allow users to manage their own attributes. This way the user can e.g. update his mobile number himself, without the need to contact the help desk or the administrator.</p>



<p>Based on these user attributes the administrator can now define policies and thus the access rights can be tuned in more detail.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png"><img loading="lazy" decoding="async" width="956" height="439" src="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png" alt="" class="wp-image-2276" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png 956w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-300x138.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-768x353.png 768w" sizes="auto, (max-width: 956px) 100vw, 956px" /></a><figcaption>The token administrator can set the mobile number of the user.</figcaption></figure>



<p>In addition policies can now have conditions on each and every token attribute like description, serial, tokentype, otp length, maximum failcounter, failcounter, active state and more.</p>



<p>This way the administrator could allow helpdesk users to only delete tokens, that have previously been disabled by the user himself. Possibilities are endless.</p>



<h3 class="wp-block-heading">Simple PUSH Token</h3>



<p>Starting with privacyIDEA 3.0 we introduced the <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/" data-type="post" data-id="1533">PUSH token</a>. If everything works out fine, the PUSH token can work like a charm. But setting it up is quite complicated. Also the Push services by Google and Apple actually do not work that reliably. With privacyIDEA 3.6 the administrator can now configure the PUSH token to only work in a polling method. In this scenario no external 3rd party service is needed and the user&#8217;s smartphone only communicates with the privacyIDEA server.</p>



<p>By giving up some comfort such a setup can gain stability and improve the privacy aspect.</p>



<h3 class="wp-block-heading">Token Rollover</h3>



<p>The administrator can now configure a WebUI policy to allow users to roll over their tokens. This means that the key material is generated anew and the user can enroll the token again, e.g. by scanning a new QR code. This comes in handy, if the user is only allowed to have one token, but wants to move his token to a new smartphone or if the company decides to increase the key size of the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png"><img loading="lazy" decoding="async" width="1024" height="260" src="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png" alt="" class="wp-image-2280" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-300x76.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-768x195.png 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png 1119w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption>The user can regenerate the seed of his existing token: Rollover.</figcaption></figure>



<h3 class="wp-block-heading">Enhancements</h3>



<p>Besides these main features there are a lot of enhancements. The administrator can use pi-manage to export and import the system configuration. This can be used to move configuration from testing environments to productive environments. You can have different PIN policies for different tokentypes. </p>



<p>In pi.cfg the system administrator can define a custom entry point for the WebUI. This way you can create your complete own WebUI without changing anything in the code.</p>



<p>The token janitor received several improvements. It can export arbitrary user attributes, the seed can either be exported in hex or base32 to increase the interoperability with other MFA systems. The token export can now also contain the user assignment. This way tokens can easily be transferred between different privacyIDEA installations.</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Changelog at Github</a>.</p>



<h3 class="wp-block-heading">Availability</h3>



<p>You can download privacyIDEA 3.6 from Github or install it from the Python Package Index. For easy deployment you can use the community repositories for Ubuntu 16.04, 18.04 and 20.04. You can find the installation guidline in the <a rel="noreferrer noopener" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">online documentation</a>. If you are updating, it is crucial to read the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, which contains important information about LDAP resolvers and TLS.</p>



<p>If you want to get involved, be sure to drop by at the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a>. You can also take a look at Weblate, were the community can translate to different languages. We are grateful for the community effort to be able to ship translations in Dutch and French!</p>



<p>For mission critical scenarios the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener">company NetKnights provides an Enterprise Edition with Support</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-6-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
