<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Enrollment &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/enrollment/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Thu, 31 Mar 2022 06:46:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Enrollment &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.7 Released</title>
		<link>https://www.privacyidea.org/privacyidea-3-7-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 06:46:42 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[HSM]]></category>
		<category><![CDATA[offline]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2293</guid>

					<description><![CDATA[Offline Login without IP restrictions and verified enrollment We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Offline Login without IP restrictions and verified enrollment</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png"><img fetchpriority="high" decoding="async" width="1024" height="683" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png" alt="" class="wp-image-2294" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-1024x683.png 1024w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200-768x512.png 768w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-3.7-1200.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We take great pleasure in releasing privacyIDEA 3.7 today. It has been a long way since version 3.6. We implemented a lot of fixes and smaller but interesting enhancements. However, the most interesting new features are probably the redesign of the offline-token, a token verification during enrollment and a new supported way for encrypting the sensive data in privacyIDEA with a hardware security module.</em></p>



<h2 class="wp-block-heading">Hardware Security Modules</h2>



<p>Hardware Security Modules (HSMs) are expensive. Especially if you need a network attached HSM that provides the necessary performance to encrypt the OTP seed for each authentication request. This is the way how privacyIDEA currently supported HSMs. It is secure &#8211; but it is slow (unless you have the right hardware) and costly.</p>



<p>In privacyIDEA 3.7 we provide a new security module with a different approach. The idea was born in discussing security and speed with an enterprise community member.</p>



<p>The new security module <code>encryptkey.py</code> still holds the encryption keys in a keyfile. But this keyfile again is encypted with an assymmetric key on an HSM. The keyfile is decrypted by the HSM on startup and then the encryption keys from the keyfile are stored in memory. This way the slow HSM operation will only occur when starting or restarting the web server process. This allows you to use much cheaper HSMs or even Smartcards  to protect your key material.</p>



<p>Still &#8211; you should be familiar with smartcards or HSMs and know what you are doing, to avoid wrecking your senstive data.</p>



<h2 class="wp-block-heading">Offline Token</h2>



<p>privacyIDEA allows clients like the privacyIDEA Credential Provider to fetch offline information to allow a user to login with a specific HOTP token, even if the privacyIDEA server can not be reached. However, this was always bound to the IP address of the client machine.</p>



<p>We removed the IP binding and redesigned the process. This way it is now much easier and more robust to use an HOTP token for offline authentication at your Windows notebook.</p>



<h2 class="wp-block-heading">Verify Enrollment</h2>



<p>When enrolling a smartphone HOTP or TOTP token, the user needs to scan a QR code that was generated by privacyIDEA. Only after scanning this QR code with a authenticator smartphone app, the token is technically enrolled on the user side. Administrators reported that sometimes some users forgot to scan the QR code. Thus privacyIDEA deemed the token as enrolled, while nothing existed on the user&#8217;s smartphone.</p>



<p>With 3.7 the administrator can now force the user to enter a valid OTP value during the enrollment process. This way the user is required to scan the QR code to be able to provide the valid OTP value. Only then privacyIDEA deems the token as successfully enrolled.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png"><img decoding="async" width="698" height="492" src="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png" alt="" class="wp-image-2299" srcset="https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment.png 698w, https://www.privacyidea.org/wp-content/uploads/2022/03/privacyidea-37-verify-token-enrollment-300x211.png 300w" sizes="(max-width: 698px) 100vw, 698px" /></a><figcaption>privacyIDEA 3.7 can require the user to enter a valid OTP value before the token is successfully enrolled.</figcaption></figure></div>



<h2 class="wp-block-heading">Further Enhancements</h2>



<p>There are a lot of further enhancements.</p>



<p>Policies can now also use web server environment variables as conditions.</p>



<p>In version 3.6 custom user attributes have been introduced. In 3.7 the administrator can now define event handlers to set or delete custom user attributes. This way, you could e.g. set an attribute to a user as soon as the user enrolls a certain token type. Then you could have authentication policies, that take this token type as a condition, only allowing those users to do certain things. </p>



<p>Possibilities are many. We do not know them all! Find yours!</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">changelog at Github</a>.</p>



<p>If you are running privacyIDEA in mission critical environments, the company NetKnights which staffs the core developers, also provides <a href="https://netknights.it" target="_blank" rel="noreferrer noopener">services and support</a>.</p>



<p>If you want to get involved with privacyIDEA you can also visit the <a href="https://community.privacyidea.org">community forum</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA Talk at FOSDEM &#8211; MFA enrollment for thousands of users</title>
		<link>https://www.privacyidea.org/privacyidea-talk-at-fosdem-mfa-enrollment-for-thousands-of-users/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 09 Jan 2018 10:58:33 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FOSDEM]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1320</guid>

					<description><![CDATA[You want to use two factor authentication for all your users? But you are always wondering how you should enroll an authentication device to every single of your users? Existing solutions do not provide convenient ways to equip thousands of users easily with a second factor? Using automated processes with a REST API and an [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><figure id="attachment_1323" aria-describedby="caption-attachment-1323" style="width: 405px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png"><img decoding="async" class="wp-image-1323" src="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png" alt="" width="405" height="304" srcset="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png 800w, https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards-300x225.png 300w, https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards-768x576.png 768w" sizes="(max-width: 405px) 100vw, 405px" /></a><figcaption id="caption-attachment-1323" class="wp-caption-text">You need to enroll lots of tokens to your users? No problem with privacyIDEA!</figcaption></figure></p>
<p>You want to use two factor authentication for all your users? But you are always wondering how you should enroll an authentication device to every single of your users? Existing solutions do not provide convenient ways to equip thousands of users easily with a second factor?</p>
<p>Using automated processes with a <a href="http://privacyidea.readthedocs.io/en/latest/modules/api.html" target="_blank" rel="noopener">REST API</a> and an automating <a href="https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/">event handler</a> privacyIDEA provides the necessary means to easily do this task.</p>
<p>At <a href="https://fosdem.org/2018/schedule/event/privacyidea/" target="_blank" rel="noopener">FOSDEM Cornelius will give a talk about how easy it can be using privayIDEA to enroll second factors</a> to all your lots of users. Join <a href="https://fosdem.org" target="_blank" rel="noopener">FOSDEM</a> in Brussels and February 4th and learn about those great features of privacyIDEA.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.21  with a more secure smartphone enrollment</title>
		<link>https://www.privacyidea.org/privacyidea-2-21-with-a-more-secure-smartphone-enrollment/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 06:33:33 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FOSDEM]]></category>
		<category><![CDATA[Smartphone]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1306</guid>

					<description><![CDATA[Today we released privacyIDEA 2.21. It is available in the Ubuntu repositories for Ubuntu 16.04LTS and 14.04LTS. You can also update and install privacyIDEA on any distribution via the Python Package Index. Secure Rollout of a smartphone app The central new feature of privacyIDEA 2.21 is the possibility to enroll a smartphone token in a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-1310 size-full" src="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png" alt="The privacyIDEA Authenticator allows secure enrollment of smartphones" width="480" height="400" srcset="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png 480w, https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser-300x250.png 300w" sizes="auto, (max-width: 480px) 100vw, 480px" /></a>Today we released privacyIDEA 2.21. It is available in the <a href="http://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noopener">Ubuntu repositories for Ubuntu 16.04LTS and 14.04LTS</a>. You can also update and install privacyIDEA <a href="http://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank" rel="noopener">on any distribution via the Python Package Index</a>.</p>
<h2>Secure Rollout of a smartphone app</h2>
<p>The central new feature of privacyIDEA 2.21 is the possibility to enroll a smartphone token in a more secure way. privacyIDEA supported smartphone Apps like the Google Authenticator and FreeOTP right from the start. But you already might be aware of the <a href="https://netknights.it/en/the-problem-with-the-google-authenticator/" target="_blank" rel="noopener">problems with enrolling smartphone tokens</a>.</p>
<p>This is why we added a 2-step enrollment in privacyIDEA 2.21.</p>
<h3>2-Step enrollment in privacyIDEA 2.21</h3>
<p>Using privacyIDEA you have now the possibility to enroll a smartphone token in a much securer way. The sensitive secret key is created from a part generated on the server side and a second part generated on the phone side. This way an attacker can no longer easily copy the smartphone token during the enrollment process. You can find a more technical specification of the <a href="http://privacyidea.readthedocs.io/en/latest/workflows_and_tools/2step/index.html" target="_blank" rel="noopener">two step enrollment in the online documentation</a>.</p>
<p><figure id="attachment_1308" aria-describedby="caption-attachment-1308" style="width: 353px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg"><img loading="lazy" decoding="async" class="wp-image-1308" src="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg" alt="More secure enrollment of a smartphone app." width="353" height="202" srcset="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg 640w, https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640-300x172.jpg 300w" sizes="auto, (max-width: 353px) 100vw, 353px" /></a><figcaption id="caption-attachment-1308" class="wp-caption-text">More secure enrollment of a smartphone app.</figcaption></figure></p>
<p>The new privacyIDEA Authenticator App will support this new two step enrollment and is also backward compatible to the normal Google Authenticator enrollment URI. <a href="https://netknights.it/en/privacyidea-authenticator-the-better-smartphone-factor/" target="_blank" rel="noopener">Ask the company NetKnights to be part of the beta testing phase of the privacyIDEA Authenticator App</a>.</p>
<h2>Easy administration</h2>
<p>Many enhancements will make the daily life easier for the token administrator. The root user can now export an encrypted PSKC file. The data can then be imported to another privacyIDEA instance or to any other RFC6030 complient applicantion. The event handlers were also improved: The Notification handler now has more tags to be used in the body and the Federation handler can forward administrative requests.</p>
<h2>Clean-up Audit log</h2>
<p>Audit Log can be rotated in a more sophisticated way. The administrator can specify retention times for different log entries.</p>
<h2>Better HSM support</h2>
<p>Hardware Securtiy Modules can now be used to generate random numbers at many different places within privacyIDEA:</p>
<p>You can view a complete <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">changelog at github</a>.</p>
<h2>Enterprise Edition</h2>
<p>If you are running large mission critical setups, privacyIDEA is also available as <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noopener">Enterprise Edition with support and warranty/liability</a>.</p>
<h2>privacyIDEA going FOSDEM</h2>
<p>The privacyIDEA project will be at FOSDEM 2018 on February 3rd and 4th. We have a stand in building H. <a href="https://www.privacyidea.org/privacyidea-going-fosdem/">Please join us there</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.10 released. All for the user &#8211; self registration, password reset, token wizard</title>
		<link>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 11 Feb 2016 07:00:21 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Self Registration]]></category>
		<category><![CDATA[Token Wizard]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=882</guid>

					<description><![CDATA[Today we have pleasure in announcing the release of privacyIDEA 2.10. In this release the two factor authentication solution privacyIDEA eases the lives of the users. Self Registration and Password Reset privacyIDEA comes with a new policy scope &#8220;register&#8221;. If this policy is set new users may create a new account. The creation of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we have pleasure in announcing the release of privacyIDEA 2.10. In this release the two factor authentication solution privacyIDEA eases the lives of the users.</p>
<h3>Self Registration and Password Reset</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640.png" rel="attachment wp-att-885"><img loading="lazy" decoding="async" class="wp-image-885 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640-300x240.png" alt="checklist-911841_640" width="126" height="101" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640-300x240.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640.png 640w" sizes="auto, (max-width: 126px) 100vw, 126px" /></a>privacyIDEA comes with <a href="http://privacyidea.readthedocs.org/en/latest/policies/register.html" target="_blank">a new policy scope &#8220;register&#8221;</a>. If this policy is set new users may create a new account. The creation of the account can be limited to certain realms or to certain email addresses. This way you can define, that only user with an email address from a certain domain are allowed to register.</p>
<p>The user will get an email with a registration token, that can be used to access the privacyIDEA Web UI.</p>
<p><a href="https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/">User registration was also introduced in a previous blog post</a>.</p>
<p>User registration is possible due to the concept of writeable userstores, which was introduced earlier. Another possibility that arises from the writeable userstores and which is introduced in <a href="http://privacyidea.readthedocs.org/en/latest/policies/user.html#password-reset" target="_blank">version 2.10 is User Password Reset</a>. In a user-policy you may define, if a user should be allowed to reset his userstore password.</p>
<p><figure id="attachment_886" aria-describedby="caption-attachment-886" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset.png" rel="attachment wp-att-886"><img loading="lazy" decoding="async" class="size-medium wp-image-886" src="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset-300x208.png" alt="A user may be allowed to reset his userstore password." width="300" height="208" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset-300x208.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset.png 363w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-886" class="wp-caption-text">A user may be allowed to reset his userstore password.</figcaption></figure></p>
<h3>Token Wizard</h3>
<p>Enrolling tokens to the user is always quite a challenge. No project or installation works the same, has the same requirements and chooses the very same enrollment strategy. It always seems very tempting to let users enroll their tokens, hoping that this strategy will not generate high traffic and costs in the help desk.</p>
<p>With privacyIDEA 2.10 the token user selfenrollment was drastically simplified providing a token enrollment wizard. <a href="http://privacyidea.readthedocs.org/en/latest/policies/webui.html?#tokenwizard" target="_blank">The token enrollment wizard can be enabled using a policy</a>. The enrollment wizard will jump in, if the user has no token. When the user logs in to the WebUI he will be presented a two step enrollment without any distracting additional questions or choices.</p>
<p><figure id="attachment_888" aria-describedby="caption-attachment-888" style="width: 331px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1.png" rel="attachment wp-att-888"><img loading="lazy" decoding="async" class=" wp-image-888" src="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1-300x146.png" alt="Token Wizard: First step." width="331" height="161" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1-300x146.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1.png 753w" sizes="auto, (max-width: 331px) 100vw, 331px" /></a><figcaption id="caption-attachment-888" class="wp-caption-text">Token Wizard: First step.</figcaption></figure></p>
<p>The tokenwizard works for all kind of tokens. In this example it is a smartphone based Google Authenticator HOTP token.</p>
<p><figure id="attachment_889" aria-describedby="caption-attachment-889" style="width: 332px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2.png" rel="attachment wp-att-889"><img loading="lazy" decoding="async" class=" wp-image-889" src="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2-277x300.png" alt="Token Wizard: Second step." width="332" height="360" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2-277x300.png 277w, https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2.png 756w" sizes="auto, (max-width: 332px) 100vw, 332px" /></a><figcaption id="caption-attachment-889" class="wp-caption-text">Token Wizard: Second step.</figcaption></figure></p>
<h3>Email</h3>
<p>After all this user stuff another important feature is the configuration of the Email-capabilities in privacyIDEA. Emails are used at different locations like EMail Token, SMS Token, Registration process and Password Reset. Therefore you can defined SMTP Server configurations centrally and choose which SMTP configuration you want to use for the specified task.</p>
<p><figure id="attachment_891" aria-describedby="caption-attachment-891" style="width: 1024px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers.png" rel="attachment wp-att-891"><img loading="lazy" decoding="async" class="size-large wp-image-891" src="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-1024x337.png" alt="Central SMTP Server definitions can be used for different purposes." width="1024" height="337" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-1024x337.png 1024w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-300x99.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-768x253.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers.png 1170w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption id="caption-attachment-891" class="wp-caption-text">Central SMTP Server definitions can be used for different purposes.</figcaption></figure></p>
<h2>ChangeLog</h2>
<p>This is the complete changelog of version 2.10:</p>
<p>Version 2.10, 2016-02-11</p>
<h3>Features</h3>
<ul>
<li>User Registration: A user may register himself and thus create his new user account.</li>
<li>Password Reset: Using a recovery token a user may issue a password reset without bothering the administrator or the help desk.</li>
<li>Enrollment Wizard for easy user token enrollment</li>
<li>SMTP Servers: Define several system wide SMTP settings and use these for
<ul>
<li>Email token,</li>
<li>SMTP SMS Provider,</li>
<li>registration process,</li>
<li>or password reset.</li>
</ul>
</li>
</ul>
<h3>Enhancements</h3>
<ul>
<li>Ease the Smartphone App (Google Authenticator) rollout. Hide otplen, hash, timestep in the UI if a policy is defined.</li>
<li>Add import of Aladdin/SafeNet XML file.</li>
<li>Add import of password encrypted PSKC files.</li>
<li>Add import of key encrypted PSKC files.</li>
</ul>
<h3>Fixes</h3>
<ul>
<li>Support LDAP passwords with special non-ascii characters.</li>
<li>Support LDAP BIND with special non-ascii characters.</li>
<li>Fix problem with encrypted encryption key.</li>
<li>Fix upgrading DB Schema for postgresql+psycopg2.</li>
<li>Fix UI displaying of saved SMS Provider.</li>
<li>Do not start challenge response with a locked/disabled token.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
