<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FreeRADIUS &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/freeradius/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Mon, 02 Dec 2019 13:45:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>FreeRADIUS &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 2.22 with a more flexible RADIUS integration</title>
		<link>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 07:03:25 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1344</guid>

					<description><![CDATA[With privacyIDEA 2.22 we added the possibility to pass more useful userinformation to a RADIUS client like a VPN. The administrator can add a policy to include the resolver and the realm of a user who authenticated successfully. This response data can then be used in the FreeRADIUS plugin and modified by regular expressions to add any arbitrary RADIUS attribute in the RADIUS response, which then would be sent to the VPN. This additional information can be used by Cisco ASA, Citrix Netscaler or any other enterprise grade VPN to put the user into certain subnets or to assign resource to the user.]]></description>
										<content:encoded><![CDATA[<p>Today we are happy to release privacyIDEA 2.22. It is available in the Ubuntu repositories for Ubuntu 14.04 LTS and 16.04 LTS. You can also install privacyIDEA on any Linux distribution on a virtualenv via the Python Package Index. <a href="http://privacyidea.readthedocs.io/en/master/installation/index.html" target="_blank" rel="noopener">Read the detailed documentation on how to install or upgrade privacyIDEA</a>.</p>
<p>You should always take a look at the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">Changelog</a>, but starting with privacyIDEA we added a document <a href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank" rel="noopener">READ_BEFORE_UPDATE</a>, which contains important information to consider before upgrade.</p>
<figure id="attachment_1352" aria-describedby="caption-attachment-1352" style="width: 1280px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg"><img fetchpriority="high" decoding="async" class="size-full wp-image-1352" src="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg" alt="" width="1280" height="544" srcset="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg 1280w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-300x128.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-768x326.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-1024x435.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></a><figcaption id="caption-attachment-1352" class="wp-caption-text">privacyIDEA 2.22 is improving the RADIUS functionality to be more flexible in combination with VPNs and firewalls.</figcaption></figure>
<h3>New Features: RADIUS integration, VASCO support, Offline Refill and more</h3>
<p>With privacyIDEA 2.22 we added the possibility to pass more useful userinformation to a RADIUS client like a VPN. The administrator can add a policy to include the resolver and the realm of a user who authenticated successfully. This response data can then be used in the FreeRADIUS plugin and modified by regular expressions to add any arbitrary RADIUS attribute in the RADIUS response, which then would be sent to the VPN. This additional information can be used by Cisco ASA, Citrix Netscaler or any other enterprise grade VPN to put the user into certain subnets or to assign resource to the user.</p>
<h4>VASCO token support</h4>
<p>privacyIDEA is Open Source. We love Open Source and open standards. But sometimes you have to communicate with proprietary partners, so that they have the chance to become open. This is why privacyIDEA 2.22 comes with support for the proprietary VASCO Digipass tokens. This way it is easier to run VASCO tokens and open standards tokens like HOTP, TOTP or Yuibkeys in parallel and maybe even one day migrate all VASCO tokens &#8211; after the batteries have died &#8211; to other devices.</p>
<p>If you want to learn more about migrating your VASCO tokens, please contact <a href="https://netknights.it/en/unternehmen/kontakt/" target="_blank" rel="noopener">NetKnights for professional sevices</a>.</p>
<h4>Offline Refill</h4>
<p>We are improving the offline capability of privacyIDEA in conjunction with the PAM module and the <a href="https://netknights.it/en/produkte/privacyidea-credential-provider/" target="_blank" rel="noopener">privacyIDEA Credential Provider</a>. The new offline refill will allow to automatically refill the hashed OTP values on the notebooks, which are available for authentication, if the notebook is offline. This way users or administrators will not have to worry anymore when taking the hardware on a business trip.</p>
<h4>Send SMS via SMPP</h4>
<p>SMPP (Short Message Peer-to-Peer) is a protocol used by carriers for sending SMS. privacyIDEA 2.22 comes with a new SMS Provider to send SMS via SMPP. This can be used for sending SMS in the SMS token during authentication but also for sending SMS in the notification event handler, to notify users or administrators on certain events.</p>
<h4>Use Counter handler for monitoring and statistics</h4>
<p>&nbsp;</p>
<figure id="attachment_1355" aria-describedby="caption-attachment-1355" style="width: 283px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg"><img decoding="async" class=" wp-image-1355" src="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg" alt="" width="283" height="212" srcset="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg 1280w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-300x225.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-768x576.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-1024x768.jpg 1024w" sizes="(max-width: 283px) 100vw, 283px" /></a><figcaption id="caption-attachment-1355" class="wp-caption-text">With the counter handler the administrator can count arbitrary events and use this data for statistics.</figcaption></figure>
<p>We often see, that the event handler is a mighty tool to cope with many different requirements. In addition to the notification handler, token handler, script handler and federation handler privacyIDEA 2.22 now comes with a simply but very flexible counter handler. Just like every handler it can be attached to any event (API call) and will trigger under defined conditions. The counter handler simply increses a counter in the database for this very event.</p>
<p>These counters can now be used for statistics or monitoring, e.g. when increasing a certain counter on the event failed authentication with HOTP token. This way the administrator could monitor the number of failed authentications per time interval.</p>
<h4>Each token has a tokenkind</h4>
<p>Many installations use hardware tokens and software tokens at the same time. To be more flexible in distinguishing these tokens when it comes to deleting tokens or deciding giving access, we added an additional class attribute to tokens. The &#8220;tokenkind&#8221;. In contrast to the tokentype, which is simply the mathematics of the token, the tokenkind defines if this very token object is  hardware token, a software token or a virtual token.</p>
<h4>Use arbitrary tokeninfo in authorization policies</h4>
<p>Authorization policies are used to decide if an authenticated user should get access or not. As the arbitrary tokeninfo fields are getting used more in more in event handler definitions, the tokeninfo can now also be used in the authorization policies to grant or deny access.</p>
<p>This way event handlers could modify token information and this modified token information can be used for granting access. Event handling and authorization thus get connected more tightly.</p>
<h3>Lots of enhancements</h3>
<p>There are further enhancements of existing features in privacyIDEA. We improved the token export the PSKC files &#8211; we will also export PW token types and the counter values of HOTP and TOTP tokens. The export can now also be used to reencrypt a token database.</p>
<p>The SMS and Email token types can now either use the fixed mobile number or email address in the token data or read the mobile/email dynamically from the user store on each authentication event.</p>
<p>The administrator can define a policy so that the validity of the U2F attestation certificate will be ignored. Some U2F devices come with a attestation certificate with an invalid validity period.</p>
<p>We improved the speed of the LinOTP migration script, so that a database with tens of thousands of tokens can be easily migrated.</p>
<p>The pi-manage script can now generate API tokens with a freely chosen validity time.</p>
<p>The user can now set the description of HOTP and TOTP tokens during enrollment.</p>
<p>The administrator can add a timeout to the SMTP server configuration.</p>
<p>The email tokens can now use a complex html template for sending emails.</p>
<p>The LDAP resolver allows to define each attribute as a multivalue attribute.</p>
<p>The event handler condition can trigger on failed authentication.</p>
<p>For the complete changelog with also contains all the fixes, please take a look a the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">Github repository</a>.</p>
<h3>Enterprise Edition</h3>
<p>If you are running large mission critical setups, privacyIDEA is also available as <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noopener">Enterprise Edition with support and warranty/liability</a>.</p>
<h3>privacyIDEA at Grazer Linuxtage and Linuxfest Northwest</h3>
<p>At the end of April you can hear a <a href="https://glt18-programm.linuxtage.at/events/322.html" target="_blank" rel="noopener">talk about privacyIDEA</a> in Austria at the <a href="https://www.linuxtage.at/" target="_blank" rel="noopener">Grazer Linuxtage</a>. You will learn, how you can easily migrate an old, existing, proprietary 2FA system to privacyIDEA. Project member Friedrich Weber will also host a <a href="https://glt18-programm.linuxtage.at/events/323.html" target="_blank" rel="noopener">workshop at the Grazer Linuxtage</a>, where you can participate in installing privacyIDEA and configuring to your needs.</p>
<p>At the same time Cornelius Kölbel will give a talk in Bellingham Technical Colleage, U.S.A. At the <a href="https://www.linuxfestnorthwest.org/conferences/lfnw18" target="_blank" rel="noopener">LinuxFest NorthWest 2018</a> you can learn about what makes privacyIDEA so unique in regards to workflow integrations using the privacyIDEA Event Handler system automating a lot of individual tasks.</p>
<h3>Join the discussion</h3>
<p>Join the discussion a <a href="https://community.privacyidea.org" target="_blank" rel="noopener">community.privacyidea.org</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA with Nitrokey support</title>
		<link>https://www.privacyidea.org/privacyidea-with-nitrokey-support/</link>
					<comments>https://www.privacyidea.org/privacyidea-with-nitrokey-support/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 06 Oct 2016 07:03:33 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Benchmark]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[Nitrokey]]></category>
		<category><![CDATA[Performance]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1082</guid>

					<description><![CDATA[privacyIDEA adds Nitrokey OTP support in release 2.15 Today we released privacyIDEA 2.15. In this release privacyIDEA command line client supports the initialization and enrollment of the Nitrokey. The Nitrokey is an open USB devices that acts as authentication device and password safe. It can hold your PGP keys but also provides several OTP slots. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>privacyIDEA adds Nitrokey OTP support in release 2.15</h1>
<figure id="attachment_931" aria-describedby="caption-attachment-931" style="width: 300px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2016/05/nitrokey.png"><img decoding="async" class="size-medium wp-image-931" src="https://www.privacyidea.org/wp-content/uploads/2016/05/nitrokey-300x200.png" alt="The open hardware pyhsical authentication device: Nitrokey (source: Nitrokey.com)" width="300" height="200" srcset="https://www.privacyidea.org/wp-content/uploads/2016/05/nitrokey-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/05/nitrokey-768x513.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/05/nitrokey.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-931" class="wp-caption-text">The open hardware pyhsical authentication device: Nitrokey (source: Nitrokey.com)</figcaption></figure>
<p>Today we released privacyIDEA 2.15. In this release privacyIDEA command line client supports the initialization and enrollment of the <a href="http://nitrokey.com" target="_blank">Nitrokey</a>. The Nitrokey is an open USB devices that acts as authentication device and password safe. It can hold your PGP keys but also provides several OTP slots. privacyIDEA now can initialize these OTP slots, so that you can use your own key material and use the Nitrokey as an open and trusted authenticator. This way you get the maximum trust and transparency by running open source software, using open and standardized algorithms and open hardware.</p>
<h2>Arbitrary User Attributes and Client Overview</h2>
<p>With privacyIDEA 2.15 the administrator now can edit arbitrary user attributes. These user attributes can be included in the authentication response and the new privacyIDEA FreeRADIUS plugin can map these user attributes to any RADIUS response attribute.</p>
<p>In the Web UI the administrator now also gets an overview of all authenticating clients. This may help him to keep track of the connected applications.</p>
<h2>Download</h2>
<p>You can download privacyIDEA via <a href="https://github.com/privacyidea/privacyidea" target="_blank">github</a>, the <a href="https://pypi.python.org/pypi/privacyIDEA/" target="_blank">python package index</a> or the <a href="https://launchpad.net/~privacyidea/+archive/ubuntu/privacyidea" target="_blank">Ubuntu Launchpad repository</a>. privacyIDEA is also available as <a href="https://netknights.it/en/produkte/privacyidea/">privacyIDEA Enterprise Edition from NetKnights</a> providing additional downloads for CentOS or the Univention Corporate Server.</p>
<h2>Changelog</h2>
<div class="-x-evo-paragraph">  Features</div>
<ul>
<li class="-x-evo-paragraph">Client Overview. Display the type of the requesting   authenticating clients (#489)</li>
<li class="-x-evo-paragraph">Support for NitroKey OTP mode (admin client)</li>
</ul>
<p>Enhancements</p>
<ul>
<li class="-x-evo-paragraph">You can edit arbitrary user attributes in privacyIDEA.</li>
<li class="-x-evo-paragraph">Such user attributes can be mapped to any RADIUS attribute.</li>
<li class="-x-evo-paragraph">Performance enhancements using Caching singletons for Config, Realm, Resolver and Policies</li>
<li class="-x-evo-paragraph">Allow configuration of the registration email text (#494)</li>
<li class="-x-evo-paragraph">Return SAML attributes only in case of successful authentication (#500)</li>
<li class="-x-evo-paragraph">Policy &#8220;reset_all_user_tokens&#8221; allow to reset all  failcounters on successful authentication (#471)</li>
<li class="-x-evo-paragraph">Client rewrite mapping also checks for X-Forwarded-For (#395, #495)</li>
</ul>
<p>Fixes</p>
<ul>
<li class="-x-evo-paragraph">Fixing RemoteUser fails to display WebUI (#499)</li>
<li class="-x-evo-paragraph">String comparison in HOSTS resolver (#484)</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-with-nitrokey-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.11: Easy migration with RADIUS policy</title>
		<link>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 29 Mar 2016 07:53:56 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[LDAP]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[RADIUS]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=907</guid>

					<description><![CDATA[Today we released privacyIDEA 2.11. You can download privacyIDEA from Github, install it from the python package index or via the launchpad repository on Ubuntu 14.04. Updating an Ubuntu installation from launchpad works out of the box. When updating a pip installation, please note that a new database table was added. OTP system migration privacyIDEA [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we released privacyIDEA 2.11. You can download <a href="https://github.com/privacyidea/privacyidea/" target="_blank">privacyIDEA from Github</a>, <a href="http://privacyidea.readthedocs.org/en/latest/installation/pip.html" target="_blank">install it from the python package index</a> or via the <a href="http://privacyidea.readthedocs.org/en/latest/installation/ubuntu.html" target="_blank">launchpad repository on Ubuntu 14.04</a>.</p>
<p>Updating an Ubuntu installation from launchpad works out of the box. When updating a pip installation, please note <a href="http://privacyidea.readthedocs.org/en/latest/installation/upgrade.html" target="_blank">that a new database table was added</a>.</p>
<h3>OTP system migration</h3>
<figure id="attachment_912" aria-describedby="caption-attachment-912" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640.jpg" rel="attachment wp-att-912"><img loading="lazy" decoding="async" class="wp-image-912 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640-300x200.jpg" alt="computer-767784_640" width="300" height="200" srcset="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-912" class="wp-caption-text">Migrate proprietary OTP systems</figcaption></figure>
<p>privacyIDEA now helps you to migrate an old 3rd party installation to privacyIDEA. To do so the <a href="http://privacyidea.readthedocs.org/en/latest/policies/authentication.html#passthru" target="_blank">new RADIUS passthru policy was added</a>. privacyIDEA can pass all authentication requests for users without a token to the defined RADIUS server. This way you can migrate tokens smoothly and run your old system and your new privacyIDEA side by side until you have removed all old tokens or moved all users and tokens to privacyIDEA.</p>
<h3>LDAP Improvements</h3>
<p>The LDAP received some nice improvements. It can now handle special characters like é and ß in the username and the password reliably. With Active Directory in Windows 2012 you can now use the objectGUID as the UID in the LDAP resolver.</p>
<p>We now use paged searched when retrieving user lists. This way you can get really <strong>all</strong> users in the LDAP directory.</p>
<h3>Changelog</h3>
<p>You can find a <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">complete changelog at github</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Two-Factor-Authentication with OTP on CentOS 7</title>
		<link>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/</link>
					<comments>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 12 Oct 2015 19:14:47 +0000</pubDate>
				<category><![CDATA[CentOS]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[RADIUS]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=757</guid>

					<description><![CDATA[Attention: This HowTo is outdated! There is an improved HowTo included in the privacyIDEA documentation This Howto describes the setup of privacyIDEA on CentOS 7 including a FreeRADIUS 3 configuration. This Howto is provided by Patrick Hirschbühl. Thanks a lot for this contribution! privacyIDEA + MySQL on CentOS 7 Minimal Installation of CentOS 7 yum [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="background-color: #ffffe0; border-radius: 10px; padding: 20px; margin: 20px; border: 1px solid black;"><strong>Attention:</strong> This HowTo is outdated! There is an improved HowTo included in the <a href="https://privacyidea.readthedocs.io/en/latest/installation/centos.html">privacyIDEA documentation</a></p>
<p>This Howto describes the setup of privacyIDEA on CentOS 7 including a FreeRADIUS 3 configuration.</p>
<p>This Howto is provided by Patrick Hirschbühl. Thanks a lot for this contribution!</p>
<h1>privacyIDEA + MySQL on CentOS 7</h1>
<h2>Minimal Installation of CentOS 7</h2>
<pre>yum -y install net-tools
yum -y install wget NetworkManager-tui</pre>
<p>Example for /etc/hosts</p>
<pre> 192.168.1.2 privacyideaserver privacyideaserver.domain</pre>
<p>/etc/selinux/config</p>
<pre>SELINUX=disabled</pre>
<p>Install necessary software:</p>
<pre>rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY*
yum -y install epel-release
yum -y install yum-priorities</pre>
<p>Edit /etc/yum.repos.d/epel.repo</p>
<pre>[epel]
 name=Extra Packages for Enterprise Linux 7 - $basearch
 #baseurl=http://download.fedoraproject.org/pub/epel/7/$basearch
 mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=epel-7&amp;arch=$basearch
 failovermethod=priority
 priority=10
 enabled=1
 gpgcheck=1
 gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7</pre>
<p>Install further software:</p>
<pre>yum update
yum -y groupinstall 'Development Tools'
yum -y install open-vm-tools net-tools; reboot
yum install ntp -y</pre>
<p>Optional Tools:</p>
<pre>yum install links nmap rkhunter</pre>
<h2>privacyIDEA</h2>
<pre>yum install mariadb-server httpd mod_wsgi mod_ssl python-devel gcc mariadb-devel libjpeg-devel \
freeradius freeradius-utils freeradius-perl openldap-devel perl-libwww-perl perl-Config-IniFiles \
perl-Try-Tiny perl-Data-Dump perl-JSON perl-LWP-Protocol-http* python-virtualenv libffi-devel \
freetype-devel libpng-devel postgresql-devel

 systemctl enable radiusd.service
 systemctl start radiusd
 systemctl enable mariadb.service
 systemctl start mariadb
 systemctl enable httpd.service
 systemctl start httpd</pre>
<h3>Create Database</h3>
<pre>mysql_secure_installation
echo 'create database privacyidea;' | mysql -u root -p
echo 'grant all privileges on privacyidea.* to "privacyidea"@"localhost" identified by "unknown";' \
   | mysql -u root -p</pre>
<h3>Install privacyIDEA</h3>
<pre>virtualenv /opt/privacyIDEA
cd /opt/privacyIDEA
source bin/activate</pre>
<p>Install further requirements for building packages with pip:</p>
<pre>yum -y install libxslt-devel libxml2-devel</pre>
<p>Download requirements.txt from <a href="https://github.com/privacyidea/privacyidea/blob/master/requirements.txt">https://github.com/privacyidea/privacyidea/blob/master/requirements.txt</a></p>
<pre>pip install -r requirements.txt
pip install MySQL-python
pip install privacyidea
mkdir /etc/privacyidea
mkdir /var/log/privacyidea</pre>
<p>Edit /etc/privacyidea/pi.cfg:</p>
<pre># The realm, where users are allowed to login as administrators
SUPERUSER_REALM = ['super', 'administrators']
# Your database
SQLALCHEMY_DATABASE_URI = 'mysql://privacyidea:unknown@localhost/privacyidea'
# This is used to encrypt the auth_token
SECRET_KEY = 't0p s3cr3t'
# This is used to encrypt the admin passwords
PI_PEPPER = "Never know..."
# This is used to encrypt the token data and token passwords
PI_ENCFILE = '/etc/privacyidea/enckey'
# This is used to sign the audit log
PI_AUDIT_KEY_PRIVATE = '/etc/privacyidea/private.pem'
PI_AUDIT_KEY_PUBLIC = '/etc/privacyidea/public.pem'
PI_LOGFILE = '/var/log/privacyidea/privacyidea.log'
# PI_LOGLEVEL = 20
# PI_INIT_CHECK_HOOK = 'your.module.function'</pre>
<p>Run further commands:</p>
<pre>pi-manage.py create_enckey
pi-manage.py create_audit_keys
pi-manage.py createdb
pi-manage.py admin add admin -e admin@localhost</pre>
<h3>Add firewall rules</h3>
<pre>firewall-cmd --permanent --zone=public --add-service=http --add-service=https --add-service=radius
firewall-cmd --reload
firewall-cmd --zone=public --list-all</pre>
<h3>Test</h3>
<pre>systemctl stop httpd
pi-manage.py runserver -h Hostname-or-IP -p 80
systemctl start httpd</pre>
<h3>Create user</h3>
<pre>useradd -r -m privacyidea -d /opt/privacyIDEA</pre>
<h3>Fix rights privacyIDEA</h3>
<pre>chown -R privacyidea:root /etc/privacyidea
/opt/privacyIDEA/bin/privacyidea-fix-access-rights -f /etc/privacyidea/pi.cfg -u privacyidea
chmod 400 /etc/privacyidea/enckey
chmod 400 /etc/privacyidea/*.pem
chown -R privacyidea:root /var/log/privacyidea</pre>
<h3>privacyIDEA Apache config</h3>
<pre>mkdir -p /var/run/wsgi
cp /opt/privacyIDEA/etc/privacyidea/privacyideaapp.wsgi /etc/privacyidea
mv /etc/httpd/conf.d/welcome.conf /etc/httpd/conf.d/welcome.conf.disabled</pre>
<p>Edit /etc/httpd/conf/httpd.conf:</p>
<p>ServerName Hostname-or-IP:80</p>
<p>Edit /etc/httpd/conf.d/privacyidea.conf:</p>
<pre>TraceEnable off
ServerSignature Off
ServerTokens Prod
WSGIPythonHome /opt/privacyIDEA
WSGISocketPrefix /var/run/wsgi

&lt;VirtualHost _default_:80&gt;
  ServerAdmin webmaster@localhost
  ServerName localhost
  RewriteEngine On
  RewriteCond %{HTTPS} !=On
  RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L]
&lt;/VirtualHost&gt;

&lt;VirtualHost _default_:443&gt;
  ServerAdmin webmaster@localhost
  ServerName localhost
  DocumentRoot /var/www
  &lt;Directory /&gt;
    Require all granted
    Options FollowSymLinks
    AllowOverride None
  &lt;/Directory&gt;
  # The daemon is running as user 'privacyidea'
  # This user should have access to the encKey database encryption file
  WSGIDaemonProcess privacyidea python-path=/etc/privacyidea:/opt/privacyIDEA/lib/python2.7/site-packages processes=1 threads=15 display-name=%{GROUP} user=privacyidea
  WSGIProcessGroup privacyidea
  WSGIPassAuthorization On
  WSGIScriptAlias / /etc/privacyidea/privacyideaapp.wsgi
  SSLEngine On
  SSLProtocol All -SSLv2 -SSLv3
  SSLHonorCipherOrder On
  SSLCipherSuite EECDH+AES256:DHE+AES256:EECDH+AES:EDH+AES:-SHA1:EECDH+RC4:EDH+RC4:RC4-SHA:AES256-SHA:!aNULL:!eNULL:!EXP:!LOW:!MD5
  SSLCertificateFile /etc/pki/tls/certs/privacyideaserver.pem
  SSLCertificateKeyFile /etc/pki/tls/private/privacyideaserver.key
&lt;/VirtualHost&gt;</pre>
<p>Enable Apache config:</p>
<pre>/opt/privacyIDEA/bin/privacyidea-create-certificate -f /etc/httpd/conf.d/privacyidea.conf
apachectl configtest
systemctl restart httpd</pre>
<h2>Config Freeradius 3 for privacyIDEA</h2>
<pre>cp /opt/privacyIDEA/lib64/privacyidea/authmodules/FreeRADIUS/privacyidea_radius.pm \
  /etc/raddb/mods-config/perl/</pre>
<p>Edit /etc/raddb/mods-available/perl:</p>
<pre>perl {
 filename = ${modconfdir}/${.:instance}/privacyidea_radius.pm
}</pre>
<pre>ln -s /etc/raddb/mods-available/perl /etc/raddb/mods-enabled/</pre>
<p>Edit /etc/raddb/clients.conf:</p>
<pre>client Radius-Client {
  ipaddr = 192.168.1.1/32
  secret = shared_secret_key
  require_message_authenticator = no
  nas_type = other
}</pre>
<p>Edit /etc/raddb/sites-available/privacyidea:</p>
<pre>server default {
 listen {
   type = auth
   ipaddr = *
   port = 0
   limit {
      max_connections = 16
      lifetime = 0
      idle_timeout = 30
   }
 }
 listen {
   ipaddr = *
   port = 0
   type = acct
   limit {
   }
 }

authorize {
   preprocess
   digest
   suffix
   ntdomain
   files
   expiration
   logintime
   pap
   update control {
      Auth-Type := Perl
   }
}

authenticate {
   Auth-Type Perl {
     perl
   }
   digest
}

preacct {
   suffix
   files
}

accounting {
   detail
}

session {
}
post-auth {
}
pre-proxy {
}
post-proxy {
}
}</pre>
<pre>ln -s /etc/raddb/sites-available/privacyidea /etc/raddb/sites-enabled/
rm /etc/raddb/sites-enabled/default
rm /etc/raddb/sites-enabled/inner-tunnel</pre>
<p>Edit /etc/privacyidea/rlm_perl.ini:</p>
<pre>[Default]
URL = https://127.0.0.1/validate/check
#REALM = someRealm
#RESCONF = someResolver
SSL_CHECK = false
#DEBUG = true</pre>
<p>Edit /etc/raddb/mods-config/perl/privacyidea_radius.pm</p>
<pre>our $CONFIG_FILE = “/etc/privacyidea/rlm_perl.ini”;
cp /opt/privacyIDEA/etc/privacyidea/dictionary /etc/raddb/</pre>
<h3>Test Freeradius</h3>
<pre>systemctl stop radiusd
radiusd -X
echo "User-Name=user, User-Password=password" | radclient -sx localhost auth testing123
systemctl restart radiusd</pre>
<h3>Fix rights privacyIDEA and Freeradius</h3>
<pre>chown -R privacyidea:root /etc/privacyidea
chgrp -R radiusd /etc/raddb
cd /etc/raddb
ll -Z
restorecon /etc/raddb/*</pre>
<p>reboot <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<h3>Change Password Admin User</h3>
<pre>cd /opt/privacyIDEA
source bin/activate
pi-manage.py admin change -p admin</pre>
<h3>Update privacyIDEA</h3>
<pre>cd /opt/privacyIDEA
source bin/activate
pip install --upgrade cffi
pip install --upgrade bcrypt
pip install --upgrade privacyidea</pre>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>2FA with FreeRADIUS on CentOS</title>
		<link>https://www.privacyidea.org/2fa-with-freeradius-on-centos/</link>
					<comments>https://www.privacyidea.org/2fa-with-freeradius-on-centos/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 27 Jun 2014 11:19:08 +0000</pubDate>
				<category><![CDATA[CentOS]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[RADIUS]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[Installation]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=204</guid>

					<description><![CDATA[A new howto is available at howtoforge. It shows how you can setup a privacyIDEA system on CentOS 6.5 in conjunction with the FreeRADIUS. Thus being able to have one central authentication system and connect many applications to this system via the RADIUS protocol.]]></description>
										<content:encoded><![CDATA[<p>A new howto is available at <a href="http://www.howtoforge.com/two-factor-authentication-with-otp-using-privacyidea-and-freeradius-on-centos" target="_blank">howtoforge</a>.</p>
<p>It shows how you can setup a privacyIDEA system on CentOS 6.5 in conjunction with the FreeRADIUS.</p>
<p>Thus being able to have one central authentication system and connect many applications to this system via the RADIUS protocol.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/2fa-with-freeradius-on-centos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
