<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Certificates &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/certificates/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Thu, 09 Mar 2017 11:05:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Certificates &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 2.18 &#8211; Authentication and Trust</title>
		<link>https://www.privacyidea.org/privacyidea-2-18-authentication-trust/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 09 Mar 2017 11:03:45 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[Certificates]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1156</guid>

					<description><![CDATA[privacyIDEA 2.18 is out! privacyIDEA Authentication System privacyIDEA is an authentication system. Quite a while ago we started to drop the sole OTP statement. privacyIDEA is managing authentication objects. Yes, a classical OTP key fob token is an object a user can use to authenticate. As is a smartphone. But privacyIDEA already facilitated SSH keys. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>privacyIDEA 2.18 is out!</p>
<h2>privacyIDEA Authentication System</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png"><img loading="lazy" decoding="async" class=" wp-image-964 alignright" src="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-300x162.png" alt="" width="237" height="128" srcset="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-768x415.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png 800w" sizes="auto, (max-width: 237px) 100vw, 237px" /></a>privacyIDEA is an authentication system. Quite a while ago we started to drop the sole OTP statement. privacyIDEA is managing authentication objects. Yes, a classical OTP key fob token is an object a user can use to authenticate. As is a smartphone.</p>
<p>But privacyIDEA already facilitated SSH keys. These files are objects, a user can use to authenticate.</p>
<h2>Trust the privacyIDEA Certificate Authority</h2>
<p>In this release 2.18 we improved the functionalities of the local CA. privacyIDEA provides an interface to connect to certificate authorities to ask them to issue certificates for the users.</p>
<p>Connectors can plug into this interface. At the moment we are providing a &#8220;local CA&#8221; connector, which connects to a locally running OpenSSL based CA. With privacyIDEA 2.18 setting up such a local CA is much easier. The local CA also supports automatically generating the CRL, if a certificate token is revoked. The CA now also can handle certificate templates with different X.509 extensions and different validity periods.</p>
<p>For a complete list of all features, enhancements and fixes see the <a href="https://github.com/privacyidea/privacyidea/blob/v2.18/Changelog" target="_blank">Changlog at Github</a>.</p>
<h2>Use a local CA</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920.jpg"><img loading="lazy" decoding="async" class=" wp-image-1157 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920-300x213.jpg" alt="" width="251" height="178" srcset="https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920-300x213.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920-768x545.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920-1024x726.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2017/03/buffer-1143486_1920.jpg 1920w" sizes="auto, (max-width: 251px) 100vw, 251px" /></a></p>
<p>Certificates are a special <a href="http://privacyidea.readthedocs.io/en/latest/configuration/tokens/certificate.html" target="_blank">token type with privacyIDEA</a>. The documentation at <a href="http://privacyidea.readthedocs.io/en/latest/configuration/caconnectors.html" target="_blank">readthedocs has more detailed information about the certificate handling</a> in privacyIDEA. We will give you a quick idea what is new in regards to the local CA.</p>
<h3>Create your local CA</h3>
<p>You can use the pi-manage tool to create a CA Connector, list all CA Connectors and also create CRLs.</p>
<pre>pi-manage ca create myCA</pre>
<p>This will create a CA Connector of type &#8220;local CA&#8221;. You are asked the following questions:</p>
<pre>Creating CA connector of type local.
In which directory do you want to create the CA [./ca]: /etc/privacyidea/myCA
What should be the keysize of the CA (2048/4096/8192) [4096]: 
How many days should the CA be valid [1800]: 7200
What is the DN of the CA [/CN=myCA]: 
How many days should the CRL be valid [30]: 60
What should be the overlap period of the CRL in days [5]: 10
============================================================

Directory : /etc/privacyidea/myCA
 CA DN : /CN=myCA
 CA Keysize : 4096
 CA Validity: 7200

Validity of issued certificates: 365

 CRL validity: 60
 CRL overlap : 10
 
Is this configuration correct? [y/n]</pre>
<p>When answering &#8220;yes&#8221;, the CA will be created on the file system and also within privacyIDEA the CA Connector definition, that links to this CA will be created.</p>
<h3>Enroll Certificate</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2017/03/enroll-certificate.png"><img loading="lazy" decoding="async" class="wp-image-1158 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2017/03/enroll-certificate-300x238.png" alt="" width="260" height="206" srcset="https://www.privacyidea.org/wp-content/uploads/2017/03/enroll-certificate-300x238.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/03/enroll-certificate-768x609.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/03/enroll-certificate.png 856w" sizes="auto, (max-width: 260px) 100vw, 260px" /></a></p>
<p>Now, the administrator can immediately start enrolling certificates for the users. The certificates will be issued by &#8220;myCA&#8221;, which we just created.</p>
<p>At the moment, we can not use certificate templates, we need to create an additional configuration file to do so.</p>
<p>A templates.yaml defines, which special X.509 extensions from the openssl.cnf file should be used and what should be the number of days, this very certificate will be issued for.</p>
<p>A file /etc/privacyidea/myCA/templates.yaml might look like this:</p>
<p>&nbsp;</p>
<pre>user:
    days: 365
    extensions: "user"
email:
    days: 750
    extensions: "email"</pre>
<p>This file needs to be specified at <strong>Config -&gt; CAs -&gt; myCA</strong>.</p>
<p>This way you can enroll certificates with different attributes for certain purposes.</p>
<h2>Installation and servies</h2>
<p>There are different ways to install privacyIDEA which are <a href="http://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">well documented in the online documentation</a>. Checkout the Github repository to file and issues, post your ideas or pull requests. Or simply star the project.</p>
<p>If you are running privacyIDEA mission critical you might want to take a look at the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank">privacyIDEA Enterprise Edition</a> provided by NetKnights GmbH.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.12 released. Event Handler, Certificates, PKCS12 / PKCS11 and much more&#8230;</title>
		<link>https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 24 May 2016 14:41:24 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=936</guid>

					<description><![CDATA[Today we released privacyIDEA 2.12. Certificates and Hardware Security Modules The certificate handling in privacyIDEA was improved. Administrators can now enroll a certificate token for a user and also generate the RSA key pair. Users can download the certificate and the private key as a PKCS12/PFX container. This is useful in certain scenarios where a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we released privacyIDEA 2.12.</p>
<h2>Certificates and Hardware Security Modules</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/05/wristwatch-407096_640.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-939 alignright" src="https://www.privacyidea.org/wp-content/uploads/2016/05/wristwatch-407096_640-300x200.jpg" alt="wristwatch-407096_640" width="300" height="200" srcset="https://www.privacyidea.org/wp-content/uploads/2016/05/wristwatch-407096_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/05/wristwatch-407096_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>The certificate handling in privacyIDEA was improved. Administrators can now enroll a certificate token for a user and also generate the RSA key pair. Users can download the certificate and the private key as a PKCS12/PFX container. This is useful in certain scenarios where a VPN client requires the local installation of a client certificate that stays on the machine.</p>
<p>In addition support for <a href="https://www.privacyidea.org/privacyidea-2-12-hardware-security-module-support/">hardware security modules</a> like the <a href="https://shop.nitrokey.com/shop/product/nitrokey-hsm-7" target="_blank">Nitrokey HSM</a> was added. This was done by adding a <a href="http://privacyidea.readthedocs.io/en/latest/installation/system/securitymodule.html#pkcs11-security-module" target="_blank">PKCS11 security module</a>.</p>
<h2>Time Dependent Policies</h2>
<p>It is now possible to restrict policies to certain times. Thus you can allow the login outside of the office hours only with a yubikey while allowing login with a Google Authenticator only during daylight. Or the token management of the C-level group tokens could only be allowed on mondays&#8230;</p>
<p>&#8230;do what you want!</p>
<h2>Event Handler Framework</h2>
<p>The <a href="https://www.privacyidea.org/privacyidea-2-12-delayed-event-handling-framework/">event handler</a> is a complete new concept of allowing new workflows in privacyIDEA. Depending on certain conditions each event (REST API calls) may trigger a new action. The administrator may configure the triggered actions in the most flexible manner.</p>
<p>E.g. if a token is enrolled or assigned, the user may be notified about this. The event handler framework allows for any kind of thinkable workflow. <a href="https://www.privacyidea.org/privacyidea-2-12-delayed-event-handling-framework/">Please read our previous post on this topic</a>.</p>
<p>&#8230;do what you want!</p>
<h2>Changelog</h2>
<p>This is the complete <a href="https://github.com/privacyidea/privacyidea/blob/v2.12/Changelog" target="_blank">changelog</a>.</p>
<h3>Features</h3>
<ul>
<li>Event Handler Framework #360</li>
<li>local CA connector can enroll certificates for users. Users can download PKCS12 file. #383</li>
<li>Add and edit users in LDAP resolvers #372</li>
<li>Hardware Security Module support via PKCS11</li>
<li>Time dependent policies #358</li>
</ul>
<h3>Enhancements</h3>
<ul>
<li>Policy for web UI enrollment wizard #402</li>
<li>Realm dropdown box at login screen #400</li>
<li>Apply user policy settings #390</li>
<li>Improve QR Code for TOTP token enrollment #384</li>
<li>Add documentation for enrollment wizard #381</li>
<li>Improve pi-manage backup to use pymysql #375</li>
<li>Use X-Forwarded-For HTTP header as client IP #356</li>
<li>Add meta-package privacyidea-mysql #376</li>
</ul>
<p>&nbsp;</p>
<h3>Fixes</h3>
<ul>
<li>Adduser honors resolver setting in policy #403</li>
<li>Add documentation for SPASS token #399</li>
<li>Hide enrollment link (WebUI) is user can not enroll #398</li>
<li>Fix getSerial for TOTP tokens #393</li>
<li>Fix system config checkboxes #378</li>
<li>Allow a realm to be remove from a token #363</li>
<li>Improve the date handling in emails #352</li>
<li>Sending test emails #350</li>
<li>Authentication with active token not possible if the user has a disabled token #339</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA talk at Tübix</title>
		<link>https://www.privacyidea.org/privacyidea-talk-tubix/</link>
					<comments>https://www.privacyidea.org/privacyidea-talk-tubix/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 19 May 2016 07:31:13 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=934</guid>

					<description><![CDATA[Cornelius will give a talk about what&#8217;s new in privacyIDEA at the tübix in Tübingen. This will be things like: Event handler to trigger certain actions depending on events Improved certificate support Editable user resolvers &#8211; even in LDAP Improvements in the WebUI and policies Easy Migration with RADIUS passthru policy Tübix is a Linux [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cornelius will give a talk about what&#8217;s new in <a href="http://www.tuebix.org/2016/programm/cornelius-koelbel-open-source-mehr-faktor-authentifizierung-mit-privacyidea/" target="_blank">privacyIDEA at the tübix in Tübingen</a>.</p>
<p>This will be things like:</p>
<ul>
<li>Event handler to trigger certain actions depending on events</li>
<li>Improved certificate support</li>
<li>Editable user resolvers &#8211; even in LDAP</li>
<li>Improvements in the WebUI and policies</li>
<li>Easy Migration with RADIUS passthru policy</li>
</ul>
<p>Tübix is a Linux event in the south of Germany, so the talk will be in German. But much time to discuss things, also in the evening utilizing a cold beer.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-talk-tubix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.3 released &#8211; Manage Certificates</title>
		<link>https://www.privacyidea.org/privacyidea-2-3-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-3-released/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Fri, 22 May 2015 14:08:41 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Token Types]]></category>
		<category><![CDATA[TYPO3]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=594</guid>

					<description><![CDATA[We just released privacyIDEA 2.3. privacyIDEA is moving towards a central point to manage authentication items. This was done by adding the machine concept, SSH keys, using Yubikeys for booting LUKS and now by adding the possibility to manage certificates. privacyIDEA acts as a central control room to manage all relevant points. In 2.3 the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png"><img loading="lazy" decoding="async" class=" size-medium wp-image-588 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png" alt="letter-576242_640" width="300" height="250" srcset="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>We just released privacyIDEA 2.3.</p>
<p>privacyIDEA is moving towards a central point to manage authentication items. This was done by adding the machine concept, SSH keys, using Yubikeys for booting LUKS and now by adding the possibility to manage certificates.</p>
<p>privacyIDEA acts as a central control room to manage all relevant points. In 2.3 the managing of client certificates was added. But privacyIDEA is not just another certificate authority. No, privacyIDEA follows the same concept as for user resolvers, machines and applications and lets you define CA connectors that &#8211; as the name suggests &#8211; connects to existing certain certificate authorities. Thus you may even have several CAs for different purposes and configure privacyIDEA to connect to them all.</p>
<p>Then you can assign certificates (a new token type) to the users and have the users enroll their certificates easily from within the modern Web UI. You can read more about this at the <a href="http://privacyidea.readthedocs.org/en/v2.3/configuration/tokens/certificate.html" target="_blank">online documentation</a>.</p>
<p>Also other interesting things were added like the <em>registration</em> token type, which eases the process of mass enrollment.</p>
<p>Adding the SCIM Resolver provides better means to be integrated into Cloud setups.</p>
<p>The new TYPO3 plugin is interesting for all Web Hosting companies.</p>
<p>The complete ChangeLog looks like this:</p>
<ul>
<li>Add connector to remote Certificate Authority.</li>
<li>Add Tokentype &#8220;certificate&#8221; to manage certificates for users Certificates or Certificate Requests can be uploaded. Certificate Requests.(Keypair) can be generated in the browser.</li>
<li>Add Tokentype &#8220;registration&#8221; for easier enrollment scenarios.</li>
<li>Add TokenType &#8220;Email&#8221; to send OTP via Email.</li>
<li>Add &#8220;<a href="http://privacyidea.readthedocs.org/en/v2.3/firststeps/index.html?highlight=first%20steps" target="_blank">First Steps</a>&#8221; to online documentation to ease the process of getting up and running.</li>
<li>Add handling of validity period of token.</li>
<li>Enable download of Audit log as CSV.</li>
<li>Add Resolver Priority, to handle a duplicate user in a realm.</li>
<li>Add TYPO3 Plugin to enable OTP with TYPO3</li>
<li>Add SCIM Resolver to fetch users from SCIM services</li>
<li>Several Fixes like:
<ul>
<li>Failcounter issue</li>
<li>NTLM password check</li>
<li>timestep during enrollment</li>
<li>Yubikey CSV import</li>
</ul>
</li>
</ul>
<p>As usual there are several different ways to <a href="http://privacyidea.readthedocs.org/en/v2.3/installation/index.html" target="_blank">install</a> or <a href="http://privacyidea.readthedocs.org/en/v2.3/installation/upgrade.html" target="_blank">upgrade</a> the system.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-3-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA goes Certificate Authority</title>
		<link>https://www.privacyidea.org/privacyidea-goes-certificate-authority/</link>
					<comments>https://www.privacyidea.org/privacyidea-goes-certificate-authority/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Fri, 15 May 2015 13:17:21 +0000</pubDate>
				<category><![CDATA[documentation]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[Token Types]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=587</guid>

					<description><![CDATA[privacyIDEA has started as a backend system for One Time Passwords. But as you might have noticed, it moves more and more to a system, that manages many different devices, identities and ways to authenticate a user. After the initial Fork many new authentication aspects have been added. The Yubikey could be used to authenticate [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png"><img loading="lazy" decoding="async" class="  wp-image-588 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png" alt="letter-576242_640" width="150" height="125" srcset="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png 640w" sizes="auto, (max-width: 150px) 100vw, 150px" /></a>privacyIDEA has started as a backend system for One Time Passwords. But as you might have noticed, it moves more and more to a system, that manages many different devices, identities and ways to authenticate a user.</p>
<p>After the initial Fork many new authentication aspects have been added. The Yubikey could be used to authenticate against LUKS to boot your notebook.</p>
<p>With the concept of applications and machines, the new SSH token type was added, that lets you manage all public SSH keys. Thus having a central system to manage the accounts, identities or authentication object of your users.</p>
<p>The upcoming release 2.3 will provide the first implementation of managing certificates. The CA Connector concept allows to connect to any existing certificate authority. The first connector type will connect to a local running OpenSSL based CA. Implementing new connector types to connect to other certificate authorities, even like Microsoft CA, is possible. <a href="https://www.privacyidea.org/wp-content/uploads/2015/05/caconnector.png"><img loading="lazy" decoding="async" class=" size-medium wp-image-589 alignright" src="https://www.privacyidea.org/wp-content/uploads/2015/05/caconnector-300x250.png" alt="caconnector" width="300" height="250" srcset="https://www.privacyidea.org/wp-content/uploads/2015/05/caconnector-300x250.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/05/caconnector-1024x852.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/05/caconnector.png 1074w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>We just pushed the implementation for enrolling a certificate. In this first simple case, a Certificate Signing Request is passed with the token initialization API and the Request is signed by the CA which is connected via the CA connector. The certificate is then stored as a new tokentype within the token database.</p>
<p>Thus you will see all OTP-Tokens, SSH Keys and Certificates of a user in one place.</p>
<p>The release of 2.3 is planned for June 11th. But stay tuned &#8211; it might come early!</p>
<p>Further reading:</p>
<p><a href="https://github.com/privacyidea/privacyidea/wiki/concept%3A-certificates" target="_blank">The Certificate Concept</a></p>
<p><a href="https://github.com/privacyidea/privacyidea/wiki/concept%3A-certificates-enroll" target="_blank">Enroll a Certificate</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-goes-certificate-authority/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
