<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Credential Management &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/credential-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 12 Sep 2023 09:24:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Credential Management &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.9 available</title>
		<link>https://www.privacyidea.org/privacyidea-3-9-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 07:00:00 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Application Specific Password]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Credential Management]]></category>
		<category><![CDATA[Day Password]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2325</guid>

					<description><![CDATA[We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows.]]></description>
										<content:encoded><![CDATA[
<p><strong>Manage Login data in the most flexible way</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png"><img fetchpriority="high" decoding="async" width="1024" height="666" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png" alt="We pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place - since successful authentication is a matter of smooth workflows." class="wp-image-2329" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-1024x666.png 1024w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-300x195.png 300w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2-768x499.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Privacy-Pressemitteil_SSH-Ueberarbeitet-rev2.png 1103w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are pleased to be able to release privacyIDEA 3.9. This release is an example of how privacyIDEA is ment to centrally manage all you authentication in one place &#8211; since successful authentication is a matter of smooth workflows.</em></p>



<p>privacyIDEA aims to be a management system where the administrator can easily manage the authentication topic for the users. You as an administrator can manage the OTP tokens (TOTP, HOTP apps, Yubikeys), tokentype like SMS or Email, even FIDO2. All you need for two factor authentication.</p>



<p>And privacyIDEA is able to also verify the first factor. The static password.</p>



<h2 class="wp-block-heading">Old authentication &#8211; new token types</h2>



<p>But sometimes you might see, that two factor authentication does not work out as expected. That applications do not play well with FIDO2/WebAuthn. Yes, sometimes applications do not play well even with OTP tokens. Take an Email client, that caches the user password and sends it, every time it fetches the emails from the server. The request will fail if it is sent with the same OTP value a second time.</p>



<p>Successful Authentication is not always a matter of choose the most modern cryptographic algorithm or the latest authentication method. </p>



<p>Sometimes there is an old, nasty application that refuses to work well with the 2FA method you are enrolling in your company. But privacyIDEA wants to help you as administrator to manage all these challenges in one system.</p>



<p>With privacyIDEA 3.9 we introduce two new token types which might sound old and insecure, but which are supposed to enable you to take a step forward, even if some old applications want to hold you back.</p>



<p>The<strong> application specific password</strong> token is simply a static password that can be bound to a specific application. The old application will send an authentication request against privacyIDEA and privacyIDEA will realize, that this auth request originated from this application and allow such application specific password tokens enrolled for this application to be used for authentication. A user can have a specific password for e.g. his email client, save this in his smartphone and privacyIDEA will accept this only for login requests by this email client resp. mail server. <br>You may check the conceptual evolution of this feature on <a href="https://github.com/privacyidea/privacyidea/issues/3260" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/issues/3260">Github</a>.</p>



<p>The <strong>day password</strong> token is a similar quirky thing. In certain situations having an OTP token that changes all 30 seconds or 60 seconds may be to changeable for some users or use cases. But using no second factor and relying on a never changing static password is also not an option.</p>



<p>Why not have a token, that can be used for one hour? Or one day? The day password token in privacyIDEA 3.9 is a token type with a variable time window between one second and many days. During this time window the given code is valid during the whole time window and can be used as often as needed. It is similar to TOTP (in fact it is inherited from the TOTP token class), but has the above mentioned special effects. <br><br>This token type has its counter part in the privacyIDEA Authenticator App, which you can find in the <a rel="noreferrer noopener" href="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" data-type="URL" data-id="https://play.google.com/store/apps/details?id=it.netknights.piauthenticator&amp;hl=de&amp;gl=US" target="_blank">Google Play Store</a> and <a rel="noreferrer noopener" href="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" data-type="URL" data-id="https://apps.apple.com/de/app/privacyidea-authenticator/id1445401301" target="_blank">Apple App Store</a>. The day password token is supported in the privacyIDEA Authenticator App starting with version 4.2.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png"><img decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png" alt="" class="wp-image-2341" width="202" height="437" srcset="https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-473x1024.png 473w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-139x300.png 139w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-768x1663.png 768w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-709x1536.png 709w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort-946x2048.png 946w, https://www.privacyidea.org/wp-content/uploads/2023/09/Tagespasswort.png 960w" sizes="(max-width: 202px) 100vw, 202px" /></a><figcaption>The privacyIDEA Authenticator App supports the new day password token.</figcaption></figure></div>



<p></p>



<p></p>



<h2 class="wp-block-heading">Improving SSH Key Management</h2>



<p>Managing SSH keys has been a bit cumbersome in the past. You as the administrator had to assign each SSH server to the SSH key, so that the user could use the SSH key to log to this server.</p>



<p>With privacyIDEA 3.9 you can now define service identifiers, which represent the servers. E.g. you could define an identifier &#8220;web servers&#8221; and assign SSH keys to this identifier. </p>



<p>Now you can simply have the SSH server identify as &#8220;web servers&#8221; to allow the login with this SSH key. This way it is easy as configuring the corresponding server, to add a new SSH server to the &#8220;web servers&#8221;.</p>



<p>The helper script <a href="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" data-type="URL" data-id="https://github.com/privacyidea/privacyidea/blob/master/tools/privacyidea-authorizedkeys" target="_blank" rel="noreferrer noopener">privacyidea-authorizedkeys</a>, which is supposed to run on the SSH servers has been modified so that it queires privacyIDEA for the corresponding service identifier.</p>



<h2 class="wp-block-heading">Changelog</h2>



<p>A new event handler can set the application assignment during enrollment. This helps with definding HOTP tokens as Offline-Tokens for the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" data-type="URL" data-id="https://github.com/privacyidea/privacyidea-credential-provider/releases/tag/v3.4.0" target="_blank">privacyIDEA Credential Provider</a>. The PUSH token can do a decline, so that the authentication process is cancelled.</p>



<p>You can find the complete changelog at <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Github</a>.</p>



<h2 class="wp-block-heading">Install and Update</h2>



<p>You can download and update privacyIDEA 3.9 via the community repositories for <a href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noreferrer noopener">Ubuntu 20.04LTS and Ubuntu 22.04LTS</a> or via the <a href="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" data-type="URL" data-id="https://privacyidea.readthedocs.io/en/latest/installation/pip.html" target="_blank" rel="noreferrer noopener">Python Package Index.</a></p>



<p>If you want to get involved, you can join the <a href="https://community.privacyidea.org" data-type="URL" data-id="https://community.privacyidea.org" target="_blank" rel="noreferrer noopener">discussion at the Forum</a> or coding at <a href="https://github.com/privacyidea/privacyidea" data-type="URL" data-id="https://github.com/privacyidea/privacyidea" target="_blank" rel="noreferrer noopener">Github</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
