<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Whatsup &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/category/whatsup/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 12 Aug 2025 11:02:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Whatsup &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Online Webinars in August: Central MFA with privacyIDEA</title>
		<link>https://www.privacyidea.org/online-webinars-in-august-central-mfa-with-privacyidea/</link>
		
		<dc:creator><![CDATA[Isabelle Mühlhausen]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 11:02:11 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2381</guid>

					<description><![CDATA[We would like to give you the opportunity to learn more about multi-factor authentication with privacyIDEA and its many possible applications. Therefore, we invite you to attend our free online events “Central MFA with privacyIDEA” on August 19 or 28 and “privacyIDEA – Your replacement for DUO and OKTA” on September 16. In these free [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>We would like to give you the opportunity to learn more about multi-factor authentication with privacyIDEA and its many possible applications.<br></p>



<p>Therefore, we invite you to attend our free online events </p>



<p><strong>“Central MFA with privacyIDEA” on August 19 or 28 and “privacyIDEA – Your replacement for DUO and OKTA” on September 16.</strong></p>



<p>In these free online events, we will show you how you can use privacyIDEA to design your authentication processes flexibly, securely, and independently.<br><br>In addition, <strong>Cornelius Kölbel</strong>, CEO of NetKnights with <strong>more than 15 years of experience</strong> in the field of multi-factor authentication, will personally answer your questions.</p>



<p>Take advantage of this opportunity to gain new insights for your authentication project and get answers to your questions!</p>



<p><strong>Dates &amp; Time</strong><br></p>



<p>19 August, Central MFA with privacyIDEA, 3 pm-3:45 pm Central European Time</p>



<p>28 August, Central MFA with privacyIDEA, 7pm-7:45 pm Central European Time</p>



<p>16 September, privacyIDEA – Your replacement for DUO and OKTA, 7 pm-7:45 pm Central European Time</p>



<p><strong>Secure your free spot and learn more about MFA with privacyIDEA</strong>!<br></p>



<p><strong>Registration via:</strong> <a href="https://netknights.it/privacyidea-webinar-registration">https://netknights.it/privacyidea-webinar-registration</a></p>



<p>We look forward to your participation. If you have any further questions about the webinars, do not hesitate to contact us via <a href="m&#97;&#105;&#x6c;&#x74;o&#58;&#109;&#x61;&#x72;&#x6b;e&#116;&#105;&#x6e;&#x67;&#64;n&#101;&#x74;&#x6b;&#x6e;i&#103;&#104;&#x74;&#x73;&#46;i&#116;">&#109;&#x61;&#x72;k&#101;&#x74;i&#110;&#x67;&#64;&#110;&#x65;t&#107;&#x6e;&#x69;&#103;&#x68;&#x74;s&#46;&#x69;t</a></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2.png"><img fetchpriority="high" decoding="async" width="1024" height="667" src="https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-1024x667.png" alt="" class="wp-image-2382" srcset="https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-1024x667.png 1024w, https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-300x195.png 300w, https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-768x500.png 768w, https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-1536x1000.png 1536w, https://www.privacyidea.org/wp-content/uploads/2025/08/Webinar-Ankundigung-3060-x-1992-px2-2048x1333.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.8 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-8-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 20 Dec 2022 07:49:14 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[yubik]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2318</guid>

					<description><![CDATA[With privacyIDEA 3.8 you can use the Yubikey for Smartcard domain Login. 
A generic token enrollment at any application without the need for the user to go to the selfservice portal.]]></description>
										<content:encoded><![CDATA[
<p><strong>Transparent Rollout and Smartcard Login</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg"><img decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg" alt="" class="wp-image-2319" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-1024x683.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA_3.8.jpg 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are happy to inform you, that we released privacyIDEA 3.8 today. 3.8 is an important milestone, since we start to support the Yubikey as a smartcard, that can also be used to login to Windows domains.</em></p>



<h2 class="wp-block-heading">Support for smartcard login on Windows systems</h2>



<p>privacyIDEA 3.8 can manage the Yubikey as a smartcard that holds a smartcard logon certificate. To obtain the smartcard logon certificate, the privacyIDEA server has a new certificate connector to communicate to all Microsoft Active Directory Certiticate Services in the connected Windows domain.</p>



<p>Thus the certificate on the Yubikey can directly be obtained from the Micrsoft CA but be managed within privacyIDEA.</p>



<h2 class="wp-block-heading">Rollout during authentication</h2>



<p>privacyIDEA supports Multi-Challenge-Response for a while. This mechanism can be used to reset an OTP PIN or authenticate with 4-eyes tokens or index-secret tokens. </p>



<p>In version 3.8 this same mechanism can now be used to enroll a token during authentication. The administrator can define a policy, which token type should be enrolled by the user. In several challenge-response steps thus the user can enroll HOTP, TOTP, email, SMS or PUSH tokens. Email and SMS tokens can even be enrolled in standard applications like the Netscaler.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png"><img decoding="async" width="663" height="358" src="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png" alt="" class="wp-image-2320" srcset="https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix.png 663w, https://www.privacyidea.org/wp-content/uploads/2022/12/privacyIDEA-SMS-Enrollment-via-Citrix-300x162.png 300w" sizes="(max-width: 663px) 100vw, 663px" /></a><figcaption>SMS token enrollment during the login to Citrix ADC</figcaption></figure></div>



<p>HOTP, TOTP and PUSH enrollment require the application to display a QR code. This mechanism will be supported by all privacyIDEA plugins for e.g. Keycloak, simpleSAMLphp or ADFS.</p>



<h2 class="wp-block-heading">Fast login, fast debugging, token groups</h2>



<p>Using a new &#8220;preferred client mode&#8221; the administrator can define, which should be the preferred way for a user to authenticate, in case the user has more than one token type.</p>



<p>The audit log has been greatly improved for bug tracking. It now also records the thread ID of an API request.<br>Since the threat ID is also contained in the debug log file, this is a great handle to find the relevant detailed information to a specific request in the logs.</p>



<p>privacyIDEA 3.8 comes with the new conecpt of &#8220;token groups&#8221;. We plan to use this to improve SSH key management and the management of offline tokens.</p>



<p>For more details see the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noreferrer noopener">changelog at Github</a>.</p>



<h2 class="wp-block-heading">Install or Update</h2>



<p>You can download and update privacyIDEA 3.8 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/master/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 18.04, 20.04 and now also 22.04 or via the python package index</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.7 Released</title>
		<link>https://www.privacyidea.org/privacyidea-3-7-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 06:46:42 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[HSM]]></category>
		<category><![CDATA[offline]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2293</guid>

					<description><![CDATA[Offline Login without IP restrictions and verified enrollment We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Offline Login without IP restrictions and verified enrollment</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png"><img loading="lazy" decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png" alt="" class="wp-image-2294" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-768x512.png 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment and a new supported way for encrypting the sensive data in privacyIDEA with a hardware security module.</em></p>



<h2 class="wp-block-heading">Hardware Security Modules</h2>



<p>Hardware Security Modules (HSMs) are expensive. Especially if you need a network attached HSM that provides the necessary performance to encrypt the OTP seed for each authentication request. This is the way how privacyIDEA currently supported HSMs. It is secure &#8211; but it is slow (unless you have the right hardware) and costly.</p>



<p>In privacyIDEA 3.7 we provide a new security module with a different approach. The idea was born in discussing security and speed with an enterprise community member.</p>



<p>The new security module <code>encryptkey.py</code> still holds the encryption keys in a keyfile. But this keyfile again is encypted with an assymmetric key on an HSM. The keyfile is decrypted by the HSM on startup and then the encryption keys from the keyfile are stored in memory. This way the slow HSM operation will only occur when starting or restarting the web server process. This allows you to use much cheaper HSMs or even Smartcards  to protect your key material.</p>



<p>Still &#8211; you should be familiar with smartcards or HSMs and know what you are doing, to avoid wrecking your senstive data.</p>



<h2 class="wp-block-heading">Offline Token</h2>



<p>privacyIDEA allows clients like the privacyIDEA Credential Provider to fetch offline information to allow a user to login with a specific HOTP token, even if the privacyIDEA server can not be reached. However, this was always bound to the IP address of the client machine.</p>



<p>We removed the IP binding and redesigned the process. This way it is now much easier and more robust to use an HOTP token for offline authentication at your Windows notebook.</p>



<h2 class="wp-block-heading">Verify Enrollment</h2>



<p>When enrolling a smartphone HOTP or TOTP token, the user needs to scan a QR code that was generated by privacyIDEA. Only after scanning this QR code with a authenticator smartphone app, the token is technically enrolled on the user side. Administrators reported that sometimes some users forgot to scan the QR code. Thus privacyIDEA deemed the token as enrolled, while nothing existed on the user&#8217;s smartphone.</p>



<p>With 3.7 the administrator can now force the user to enter a valid OTP value during the enrollment process. This way the user is required to scan the QR code to be able to provide the valid OTP value. Only then privacyIDEA deems the token as successfully enrolled.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png"><img loading="lazy" decoding="async" width="698" height="492" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png" alt="" class="wp-image-2299" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png 698w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment-300x211.png 300w" sizes="auto, (max-width: 698px) 100vw, 698px" /></a><figcaption>privacyIDEA 3.7 can require the user to enter a valid OTP value before the token is successfully enrolled.</figcaption></figure></div>



<h2 class="wp-block-heading">Further Enhancements</h2>



<p>There are a lot of further enhancements.</p>



<p>Policies can now also use web server environment variables as conditions.</p>



<p>In version 3.6 custom user attributes have been introduced. In 3.7 the administrator can now define event handlers to set or delete custom user attributes. This way, you could e.g. set an attribute to a user as soon as the user enrolls a certain token type. Then you could have authentication policies, that take this token type as a condition, only allowing those users to do certain things. </p>



<p>Possibilities are many. We do not know them all! Find yours!</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">changelog at Github</a>.</p>



<p>If you are running privacyIDEA in mission critical environments, the company NetKnights which staffs the core developers, also provides <a href="https://netknights.it" target="_blank" rel="noreferrer noopener">services and support</a>.</p>



<p>If you want to get involved with privacyIDEA you can also visit the <a href="https://community.privacyidea.org">community forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.6 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-6-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-6-released/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 08:32:19 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Custom Attributes]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2271</guid>

					<description><![CDATA[Custom User Attributes and Token Attributes in Policies allow for more control We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Custom User Attributes and Token Attributes in Policies allow for more control</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg"><img loading="lazy" decoding="async" width="1024" height="682" src="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg" alt="" class="wp-image-2273" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1536x1024.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg 2000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional possibilities to manage the users and to manage the user rights. These user attributes can be used within privacyIDEA policies. In addition policies can now also contain any token attribute like tokentype or fail counter. These attributes and policy conditions help administrators to keep control in larger setups by logically grouping users and tokens.</em></p>



<h3 class="wp-block-heading">Policies with Custom User Attributes and Token Attributes </h3>



<p>privacyIDEA is no Identity Management. Users are usually managed in an IdM, or only in LDAP or Active Directory. Nevertheless it can be important to add attributes to users &#8211; in case the token administrator has no access rights to the IdM or user directory. The administrator can now do so in privacyIDEA 3.6 using custom user attributes. The administrator can even allow users to manage their own attributes. This way the user can e.g. update his mobile number himself, without the need to contact the help desk or the administrator.</p>



<p>Based on these user attributes the administrator can now define policies and thus the access rights can be tuned in more detail.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png"><img loading="lazy" decoding="async" width="956" height="439" src="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png" alt="" class="wp-image-2276" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png 956w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-300x138.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-768x353.png 768w" sizes="auto, (max-width: 956px) 100vw, 956px" /></a><figcaption>The token administrator can set the mobile number of the user.</figcaption></figure>



<p>In addition policies can now have conditions on each and every token attribute like description, serial, tokentype, otp length, maximum failcounter, failcounter, active state and more.</p>



<p>This way the administrator could allow helpdesk users to only delete tokens, that have previously been disabled by the user himself. Possibilities are endless.</p>



<h3 class="wp-block-heading">Simple PUSH Token</h3>



<p>Starting with privacyIDEA 3.0 we introduced the <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/" data-type="post" data-id="1533">PUSH token</a>. If everything works out fine, the PUSH token can work like a charm. But setting it up is quite complicated. Also the Push services by Google and Apple actually do not work that reliably. With privacyIDEA 3.6 the administrator can now configure the PUSH token to only work in a polling method. In this scenario no external 3rd party service is needed and the user&#8217;s smartphone only communicates with the privacyIDEA server.</p>



<p>By giving up some comfort such a setup can gain stability and improve the privacy aspect.</p>



<h3 class="wp-block-heading">Token Rollover</h3>



<p>The administrator can now configure a WebUI policy to allow users to roll over their tokens. This means that the key material is generated anew and the user can enroll the token again, e.g. by scanning a new QR code. This comes in handy, if the user is only allowed to have one token, but wants to move his token to a new smartphone or if the company decides to increase the key size of the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png"><img loading="lazy" decoding="async" width="1024" height="260" src="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png" alt="" class="wp-image-2280" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-300x76.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-768x195.png 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png 1119w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption>The user can regenerate the seed of his existing token: Rollover.</figcaption></figure>



<h3 class="wp-block-heading">Enhancements</h3>



<p>Besides these main features there are a lot of enhancements. The administrator can use pi-manage to export and import the system configuration. This can be used to move configuration from testing environments to productive environments. You can have different PIN policies for different tokentypes. </p>



<p>In pi.cfg the system administrator can define a custom entry point for the WebUI. This way you can create your complete own WebUI without changing anything in the code.</p>



<p>The token janitor received several improvements. It can export arbitrary user attributes, the seed can either be exported in hex or base32 to increase the interoperability with other MFA systems. The token export can now also contain the user assignment. This way tokens can easily be transferred between different privacyIDEA installations.</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Changelog at Github</a>.</p>



<h3 class="wp-block-heading">Availability</h3>



<p>You can download privacyIDEA 3.6 from Github or install it from the Python Package Index. For easy deployment you can use the community repositories for Ubuntu 16.04, 18.04 and 20.04. You can find the installation guidline in the <a rel="noreferrer noopener" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">online documentation</a>. If you are updating, it is crucial to read the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, which contains important information about LDAP resolvers and TLS.</p>



<p>If you want to get involved, be sure to drop by at the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a>. You can also take a look at Weblate, were the community can translate to different languages. We are grateful for the community effort to be able to ship translations in Dutch and French!</p>



<p>For mission critical scenarios the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener">company NetKnights provides an Enterprise Edition with Support</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-6-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Results of privacyIDEA User Survey 1/2021</title>
		<link>https://www.privacyidea.org/results-of-privacyidea-user-survey-1-2021/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 14:23:03 +0000</pubDate>
				<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[Survey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2251</guid>

					<description><![CDATA[We had launched a survey about the satisfaction and experience with privacyIDEA. 95% of the respondents said they had gerneral experience with two-factor authentication. Most of them found privacyIDEA via Google, a quarter via recommendations from friends and acquaintances. In most cases, privacyIDEA is used for VPN and web applications. The use for Single Sign-On [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png"><img loading="lazy" decoding="async" width="940" height="346" src="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png" alt="" class="wp-image-2265" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04.png 940w, https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04-300x110.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/Bildschirmfoto-vom-2021-04-26-16-15-04-768x283.png 768w" sizes="auto, (max-width: 940px) 100vw, 940px" /></a></figure>



<p>We had launched a survey about the satisfaction and experience with privacyIDEA. 95% of the respondents said they had gerneral experience with two-factor authentication. Most of them found privacyIDEA via Google, a quarter via recommendations from friends and acquaintances.</p>



<p>In most cases, privacyIDEA is used for VPN and web applications. The use for Single Sign-On like via Keycloak, SimplSAMLphp or ADFS is at about 40% but is catching up.</p>



<p>privacyIDEA is a true open source project. Planning and development is <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea" data-type="URL" data-id="https://github.com/privacyidea/privacyidea" target="_blank">actively done on Github</a>. Just over half of the respondents have either starred the Github repository, posted an issue, or even contributed code.</p>



<h2 class="wp-block-heading">Documentation and plugins</h2>



<p>We received individual feedback that the user could not easily and quickly find the information in documentation he was looking for. This is understandable for us, since privacyIDEA is a complex product that can be approached from many different angles. If you give us feedback on the documentation, please always let us know, what info you need and where you were looking for it. These details help us to understand how you are reading the docs and improve the documentation at the right place.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1024x721.jpg" alt="" class="wp-image-2253" width="517" height="363" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1024x721.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-300x211.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-768x541.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920-1536x1082.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/04/books-2463779_1920.jpg 1920w" sizes="auto, (max-width: 517px) 100vw, 517px" /></a><figcaption>The privacyIDEA documentation contains a lot of information.</figcaption></figure></div>



<p>We have received feedback on the <a rel="noreferrer noopener" href="https://github.com/privacyidea/keycloak-provider" data-type="URL" data-id="https://github.com/privacyidea/keycloak-provider" target="_blank">Keycloak plugin</a> and the ADFS plugin. For the Keycloak plugin we are currently working on a new version. The ADFS plugin has been so far developed by a single developer in the community. We now started <a href="https://github.com/privacyidea/adfs-provider" data-type="URL" data-id="https://github.com/privacyidea/adfs-provider" target="_blank" rel="noreferrer noopener">a new ADFS plugin in the privacyIDEA project</a>, which will then seamlessly integrate like the plugins for Keycloak or simpleSAMLphp into the privacyIDEA universe.</p>



<p>Specifically, the flexibility and the many authentication possibilities of privacyIDEA were praised. We continue to expand these. The reason for this survey was the evaluation of biometrics via facial recognition or typing behavior and the consideration of whether to extend privacyIDEA with a corresponding token type. </p>



<h2 class="wp-block-heading">Biometrics</h2>



<p>The two biometric methods work the same in terms of the rough principle. During registration, biometric data is captured (face or typing behavior) as a mathematical representation; this mathematical representation is then stored in the cloud by the vendor of the method. privacyIDEA takes care of the assignment of the user to the corresponding data set within  the vendor&#8217;s cloud service. So while privacyIDEA itself with the user assignment is running on premises, the mathematical representation would be stored outside of privacyIDEA.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280.jpg"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-1024x431.jpg" alt="" class="wp-image-2256" width="501" height="211" srcset="https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-1024x431.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-300x126.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280-768x323.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/04/face-1382940_1280.jpg 1280w" sizes="auto, (max-width: 501px) 100vw, 501px" /></a><figcaption>Should privacyIDEA support cloud based face recognition?</figcaption></figure></div>



<p>Facial recognition or a typing token could be used in privacyIDEA self service portal when a user has lost his primary token.</p>



<p>When logging in to self service, to Keycloak or ADFS, a Javascript library would capture the data and compute a new mathematical representation. privacyIDEA would send this with an appropriate handle to the cloud service, which would check for equality with appropriate thresholds. Accordingly, privacyIDEA would grant access. Unfortunately, in order to protect their IP and monetize it, today&#8217;s vendors prefer to provide the verification service online.</p>



<p>The privacyIDEA users have a similar feeling like ourselves. 65% are pragmatically and see biometric authentication simply as an additional token type, that can be used or not. 40% even see it as a good extension.</p>



<p>However, some users also completely reject the support of biometrics.</p>



<p>Only just over 10% of the respondents would use such a biometric method for self-service login. The rest are undecided; just over half would not use it.</p>



<p>Even more interesting is the willingness to pay money for such a service. These biometric systems are offered as cloud services and are correspondingly expensive. 70% of the respondents would not spend money on a biometrics service. 25% of the respondents would be willing to spend an amount that would not cover the costs. Only 5% would possibly be willing to afford such a service.</p>



<h1 class="wp-block-heading">Conclusion for Biometrics</h1>



<p>Biometrics in the enterprise, centrally managed for its own infrastructure, seems to be a niche market. Many end users like to unlock smartphone with a finger or face. In this survey, nearly 2/3 of the respondents said they use biometrics on laptops or smartphones. But apparently it behaves differently with Single Sign-On or VPN.</p>



<p>Or is it simply the group of respondents? The people who participated in this survey are most likely the administrators and IT guys. We didn&#8217;t ask directly about the reasons, but you can guess from some of the answers. Sometimes it has been suggested that biometrics is considered too insecure. Definitely, the way biometrics is offered in the enterprise context, is seen by respondents as too expensive.</p>



<p>While we actually have a use case for biometrics, there might not be a market.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA Authenticator iOS Testdrive</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-ios-testdrive/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 15:51:09 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2214</guid>

					<description><![CDATA[We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app. The new version is supposed to provide better PUSH token functionality. It will also provide [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="292" src="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png" alt="" class="wp-image-2215" srcset="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png 1024w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-300x86.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-768x219.png 768w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll.png 1069w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Polling for push notification makes authentication more robust.</figcaption></figure>



<p>We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app.</p>



<p>The new version is supposed to provide better PUSH token functionality. It will also provide the possibility to &#8220;poll&#8221; the PUSH notification &#8211; sounds strange, right? It can be. But this is necessary if for some reason the concatenated push services of Google and Apple <a rel="noreferrer noopener" href="https://community.privacyidea.org/t/setup-secure-authentication-with-ios-privacyidea-push-token/1310" target="_blank">do not work out as expected</a>. Then the smartphone will poll the privacyIDEA to check, if there is a challenge available.</p>



<p>privacyIDEA 3.4 is required in the backend for PUSH-poll to work.</p>



<p>A beta version of the new privacyIDEA Authenticator is available <strong>now</strong> via <s>Testdrive</s> Testflight. If you want to <a rel="noreferrer noopener" href="https://testflight.apple.com/join/hcpxWPt0" target="_blank">participate, register here</a>.</p>



<p>We are looking forward to your feedback.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA &#8211; flexibility in the very genes</title>
		<link>https://www.privacyidea.org/privacyidea-flexibility-in-the-very-genes/</link>
					<comments>https://www.privacyidea.org/privacyidea-flexibility-in-the-very-genes/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sat, 30 Nov 2019 08:43:18 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Event Handler]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1664</guid>

					<description><![CDATA[Successful two factor authentication is a matter of smooth workflows. We learnt this in a lot of set ups and are claiming it since 2018 at the LinuxFest North West. One-solution-fits-all does not work out! Nowadays a company or organization wants to deploy 2FA to not only secure a certain login to a certain application, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><em>Successful two factor authentication is a matter of smooth workflows. </em></p>



<p>We learnt this in a lot of set ups and are claiming it since 2018 at the <a rel="noreferrer noopener" aria-label="LinuxFest North West (opens in a new tab)" href="https://linuxfestnorthwest.org/conferences/lfnw18/program/proposals/145" target="_blank">LinuxFest North West</a>. One-solution-fits-all does not work out! Nowadays a company or organization wants to deploy 2FA to not only secure a certain login to a certain application, but also wants to have secure workflows around the authentication process. Thus the perfect 2FA or MFA software needs to adapt to the needs of such company or organisation.</p>



<h2 class="wp-block-heading">The beauty of the event handlers</h2>



<p>privacyIDEA introduced the Event Handlers already in version 2.12, May 2016. The <a rel="noreferrer noopener" aria-label="script event handlers (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/eventhandler/scripthandler.html" target="_blank">script event handlers</a>, which I want to talk about today, followed in version 2.17, December 2016.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-1024x718.png" alt="" class="wp-image-1565" width="550" height="385" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-1024x718.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-300x210.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-768x538.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image.png 1198w" sizes="auto, (max-width: 550px) 100vw, 550px" /></figure></div>



<p>Event Handlers were used quite actively since then. Only the script handles seemed special and awkward. It has been quiet around this one for a while. But recently a comment and question of a German <a rel="noreferrer noopener" aria-label="partner (opens in a new tab)" href="https://netknights.it/en/unternehmen/partner/" target="_blank">partner</a> (<a rel="noreferrer noopener" aria-label="IT-Schmid (opens in a new tab)" href="https://it-schmid.com/hard-software/#av-tab-section-1-9" target="_blank">IT-Schmid</a>), who was implementing a roll out concept for a customer, caught my attention and reactivated the thinking about the beauty of the script handlers.</p>



<p>privacyIDEA is implemented in a very modular way &#8211; on a horizontal but also on a vertical level. <a rel="noreferrer noopener" aria-label="Database level, library level, the REST API and the Web UI are different (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/modules/index.html" target="_blank">Database level, library level, the REST API and the Web UI are different</a>, separated parts. And this helps us a lot with the script handlers. It is easily possible to write python scripts, that are using the library level, without the need to issue REST Requests that are processed through the web server. This improves performance of such scripts and it gives you access to ready made library functions, that allow you to address tasks with a few lines of code.</p>



<h2 class="wp-block-heading">Script collection at Github repository</h2>



<p>We realized, that it makes sense to provide a collection of example scripts, to give you a better understanding, what scripts can do and how this could be done. A new repository has been added at <a rel="noreferrer noopener" aria-label="Github to host such example scripts (opens in a new tab)" href="https://github.com/privacyidea/scripts" target="_blank">Github to host such example scripts</a>. The first script is a script is a few lines, that can reassign a token from a username in one realm to a username in another realm. This can be a useful step during more complex rollout scenario. But automating such tasks of course reduces complexity and efforts to be taken.</p>



<p>We are happy to receive ideas and pull requests with new interesting scripts, which could enhance the scenarios with privacyIDEA to unexpected widths.</p>



<p>Visit our <a href="https://community.privacyidea.org">community forum</a> for further discussions!</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-flexibility-in-the-very-genes/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 3.1 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-1-polished-policies/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-1-polished-policies/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 04 Sep 2019 04:23:40 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1621</guid>

					<description><![CDATA[privacyIDEA 3.1 has the most flexible policies to cope with every login situation. It allows easy migration from any proprietary 2FA system.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="512" src="https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-1024x512.jpg" alt="" class="wp-image-1627" srcset="https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-1024x512.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-300x150.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-768x384.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280.jpg 1280w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>privacyIDEA knows the rules. And it will have your users follow those.</figcaption></figure>



<p>We are happy to announce, that today the first major release of the new privacyIDEA 3 series was pushed to the repositories. It is available via the Python Package Index and on the Ubuntu repositories for <a rel="noreferrer noopener" aria-label="Ubuntu 16.04LTS and 18.04LTS (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank">Ubuntu 16.04LTS and 18.04LTS</a>.</p>



<p>With privacyIDEA 3.1 the administrator can configure policies that will only be bound to users with certain user attributes. This way the admin can define different policies for users in the same user resolver.</p>



<p>Migration from proprietary 2FA solutions gets even simpler with automatic token assignment and PIN setting.</p>



<h2 class="wp-block-heading">Even more flexible policies</h2>



<p>The administrator can now define policies based on any arbitrary attributes. To do so, privacyIDEA can provide different attribute modules for the policy conditions. This version of privacyIDEA comes with a user-attribute module. Up to the latest version policies could only be assigned to a complete user resolver. This was difficult, when rights of users changed and only some users from a certain user resolver should get new policies in privacyIDEA.</p>



<p>Now the administrator can set an attribute e.g. in the LDAP dirctory of a user, and as soon as this is set the policy will be automatically bound to this user. This provides a bigger flexibility with handling access rights or in migration or enrollment scenarios.</p>



<p>We also added new policy actions for administrators. Administrators now can get a special read right on any configuration setting. This way the super user can define, which administrator is allowed to read certain configuration or which configuration should be hidden from which help desk user. The migration script, which runs automatically in the ubuntu package update will create new migration policies so that the current behaviour of the installation does not change after the update.</p>



<p>We did a lot of work on policies in this release &#8211; we called in <em>polishing policies</em>.</p>



<h2 class="wp-block-heading">Migration of proprietary 2FA solutions</h2>



<p>Again we improved the possibility to migrate from existing, proprietary 2FA solutions. Proprietary software goes end of life and sometimes leaves the user with a mess. <a rel="noreferrer noopener" aria-label="Cornelius wrote a blog article about that problem (opens in a new tab)" href="https://netknights.it/en/consolidation-of-the-market-and-migrations/" target="_blank">Cornelius wrote a blog article about that problem</a>.</p>



<p>The administrator can import an existing seed file from the old system. privacyIDEA then basically knows the old tokens. On authentication request privacyIDEA can automatically find out, which token belongs to which user. In addition it will set the old OTP PIN of the tokens. This way neither the user nor the administrator have anything to do to migrate to privacyIDEA.</p>



<p>This is possible since privacyIDEA will at first forward the authentication request to the old system. If authentication is successful privacyIDEA will use the used OTP value to identify the token for the user and it will use the rest of the passed credential to automatically set the OTP PIN.</p>



<h2 class="wp-block-heading">Many enhancements</h2>



<p>Further work was done on the TiQR-Token in privacyIDEA. This is an older concept where a challenge is passed to the user&#8217;s smartphone via a QR code, which is displayed during the login process. The user simply accepts the login request on his smartphone.</p>



<p>In addition with privacyIDEA 3.1 there come a lot of minor enhancements and bug fixes.</p>



<p>The complete changelog can be found at <a href="https://github.com/privacyidea/privacyidea/blob/branch-3.1/Changelog">Github</a>. privacyIDEA will be at the <a rel="noreferrer noopener" aria-label="ownCloud conference (opens in a new tab)" href="https://conference.owncloud.org/" target="_blank">ownCloud conference</a> in Nuremberg in September. Stop by and get safe!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-1-polished-policies/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA project room at FrOSCon 2019</title>
		<link>https://www.privacyidea.org/privacyidea-project-room-at-froscon-2019/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 25 Jul 2019 10:42:07 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[FrOSCon]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1610</guid>

					<description><![CDATA[We are happy to inform you that we have a project room at FrOSCon on August 12th. A whole day with the topic of open source two factor authentication allows us to discuss even more complicated things. We refrained from giving single talk. Because we do not only want to pass information to you, but [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>We are happy to inform you that we have a project room at FrOSCon on August 12th.</p>



<p>A whole day with the topic of open source two factor authentication allows us to discuss even more complicated things. We refrained from giving single talk. Because we do not only want to pass information to you, but we also want to get your feedback from you, from the community, how privacyIDEA could develop further.</p>



<p>Please note, that the talks are denoted in German, since the vast majority of the audience is still German speaking. But please do not hesitate to join, if you are English speaking. We are happy to switch to English whereever necessary.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="342" src="https://www.privacyidea.org/wp-content/uploads/2019/07/sparrows-2759978_1920-1024x342.jpg" alt="" class="wp-image-1612" srcset="https://www.privacyidea.org/wp-content/uploads/2019/07/sparrows-2759978_1920-1024x342.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/07/sparrows-2759978_1920-300x100.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/07/sparrows-2759978_1920-768x256.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/07/sparrows-2759978_1920.jpg 1920w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>privacyIDEA developers discussing new 2FA features at FrOSCon.</figcaption></figure>



<p>There are some examples of the topics in the project room:</p>



<p><a rel="noreferrer noopener" aria-label="A user story: How privacyIDEA is used at the home network to integrate with FreeIPA, Kolab, OpenVPN and much more (opens in a new tab)" href="https://programm.froscon.de/2019/events/2476.html" target="_blank">A user story, how privacyIDEA is used at the home network to integrate with FreeIPA, Kolab, OpenVPN and much more</a>.</p>



<p><a rel="noreferrer noopener" aria-label="We discuss, how we can redesign the Web UI to allow for new tasks, workflows and better user experiences (opens in a new tab)" href="https://programm.froscon.de/2019/events/2478.html" target="_blank">We discuss, how we can redesign the Web UI to allow for new tasks, workflows and better user experiences</a>.</p>



<p><a href="https://programm.froscon.de/2019/events/2479.html" target="_blank" rel="noreferrer noopener" aria-label="A workshop, how you can add two factor authentication to your own project using privacyIDEA (opens in a new tab)">A workshop, how you can add two factor authentication to your own project using privacyIDEA</a>.</p>



<p><a href="https://programm.froscon.de/2019/events/2480.html" target="_blank" rel="noreferrer noopener" aria-label="We discuss, how privacyIDEA can become a smartcard management system (opens in a new tab)">We discuss, how privacyIDEA can become a smartcard management system</a>.</p>



<p>We are looking forward to you joining the day in project room, either for only one slot or for a longer time period. Or simply stop by and say hi!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA goes Texas</title>
		<link>https://www.privacyidea.org/privacyidea-goes-texas/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sat, 25 May 2019 09:12:58 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[USA]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1599</guid>

					<description><![CDATA[privacyIDEA will be at the Texas Linuxfest. Cornelius will give a talk and hold a workshop.]]></description>
										<content:encoded><![CDATA[
<p style="text-align:left">privacyIDEA will be at the <a rel="noreferrer noopener" aria-label="Texas LinuxFest (opens in a new tab)" href="https://2019.texaslinuxfest.org/" target="_blank">Texas LinuxFest</a> in Dallas on May 31st and June 1st. </p>



<div class="wp-block-image"><figure class="aligncenter is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2019/05/lonestar-state-1.png" alt="" class="wp-image-1604" width="565" height="410" srcset="https://www.privacyidea.org/wp-content/uploads/2019/05/lonestar-state-1.png 802w, https://www.privacyidea.org/wp-content/uploads/2019/05/lonestar-state-1-300x218.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/05/lonestar-state-1-768x558.png 768w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure></div>



<p>I will conduct <a href="https://2019.texaslinuxfest.org/presentations.html#trackf2_1" target="_blank" rel="noreferrer noopener" aria-label="a workshow where we can install privacyIDEA (opens in a new tab)">a workshow where we can install privacyIDEA</a> into an existing network, read users from an AD, assign tokens, add two factor authentication to ownCloud, NGinX or SSH. Single Sign On is a great mechanism to ease the life of the users. But protecting this single login is even more important. Protect it with a second factor. We will see how this can be done for Keycloak or simpleSAMLphp.</p>



<p>On the next day I will give a <a href="https://2019.texaslinuxfest.org/presentations.html#track2_2" target="_blank" rel="noreferrer noopener" aria-label="talk how you can migrate to privacyIDEA two factor authentication (opens in a new tab)">talk how you can migrate to privacyIDEA two factor authentication</a> and how it can help with your workflows in your environment.</p>



<p>Come, see, listen, talk. You may even get some swag! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
