<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mass enrollment &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/mass-enrollment/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 09 Jan 2018 10:59:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>mass enrollment &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA Talk at FOSDEM &#8211; MFA enrollment for thousands of users</title>
		<link>https://www.privacyidea.org/privacyidea-talk-at-fosdem-mfa-enrollment-for-thousands-of-users/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 09 Jan 2018 10:58:33 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FOSDEM]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1320</guid>

					<description><![CDATA[You want to use two factor authentication for all your users? But you are always wondering how you should enroll an authentication device to every single of your users? Existing solutions do not provide convenient ways to equip thousands of users easily with a second factor? Using automated processes with a REST API and an [&#8230;]]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1323" aria-describedby="caption-attachment-1323" style="width: 405px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png"><img fetchpriority="high" decoding="async" class="wp-image-1323" src="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png" alt="" width="405" height="304" srcset="https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards.png 800w, https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards-300x225.png 300w, https://www.privacyidea.org/wp-content/uploads/2018/01/otp-cards-768x576.png 768w" sizes="(max-width: 405px) 100vw, 405px" /></a><figcaption id="caption-attachment-1323" class="wp-caption-text">You need to enroll lots of tokens to your users? No problem with privacyIDEA!</figcaption></figure>
<p>You want to use two factor authentication for all your users? But you are always wondering how you should enroll an authentication device to every single of your users? Existing solutions do not provide convenient ways to equip thousands of users easily with a second factor?</p>
<p>Using automated processes with a <a href="http://privacyidea.readthedocs.io/en/latest/modules/api.html" target="_blank" rel="noopener">REST API</a> and an automating <a href="https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/">event handler</a> privacyIDEA provides the necessary means to easily do this task.</p>
<p>At <a href="https://fosdem.org/2018/schedule/event/privacyidea/" target="_blank" rel="noopener">FOSDEM Cornelius will give a talk about how easy it can be using privayIDEA to enroll second factors</a> to all your lots of users. Join <a href="https://fosdem.org" target="_blank" rel="noopener">FOSDEM</a> in Brussels and February 4th and learn about those great features of privacyIDEA.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Manage Nitrokey with privacyIDEA</title>
		<link>https://www.privacyidea.org/manage-nitrokey-privacyidea/</link>
					<comments>https://www.privacyidea.org/manage-nitrokey-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 06 Sep 2016 08:32:03 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Command Line Client]]></category>
		<category><![CDATA[key management]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Nitrokey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1026</guid>

					<description><![CDATA[Maximum Transparancy &#8211; Maximum Trust Look at my Nitrokeys. The pre-release of the Nitrokey Pro, the Nitrokey Storage and Nitrokey HSM. The Nitrokey is a crypto device, which you can use to store your PGP Keys or just RSA keys and thus sign and decrypt data. It comes with a password safe and the ability [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Maximum Transparancy &#8211; Maximum Trust</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/09/Nitrokeys.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-1027 aligncenter" src="https://www.privacyidea.org/wp-content/uploads/2016/09/Nitrokeys-300x237.jpg" alt="Nitrokeys" width="300" height="237" srcset="https://www.privacyidea.org/wp-content/uploads/2016/09/Nitrokeys-300x237.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/09/Nitrokeys-768x607.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2016/09/Nitrokeys.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>Look at my Nitrokeys. The pre-release of the Nitrokey Pro, the Nitrokey Storage and Nitrokey HSM. The <a href="http://nitrokey.com" target="_blank">Nitrokey</a> is a crypto device, which you can use to store your PGP Keys or just RSA keys and thus sign and decrypt data. It comes with a password safe and the ability to generate one time passwords. It is open hardware and all necessary software is open source. Thus it is a great device to be combined with the open source authentication system privacyIDEA.</p>
<h3>Nitrokey managed by privacyIDEA</h3>
<p>You can manage your keys locally on your desktop with the <a href="https://github.com/nitrokey/nitrokey-app" target="_blank">Nitrokey-App</a>. You can reset the user PIN and the administrator PIN (SO PIN). And you can manage the passwords in your password safe.</p>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/09/nitrokey-app.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-1029 aligncenter" src="https://www.privacyidea.org/wp-content/uploads/2016/09/nitrokey-app-300x111.jpg" alt="nitrokey-app" width="300" height="111" srcset="https://www.privacyidea.org/wp-content/uploads/2016/09/nitrokey-app-300x111.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/09/nitrokey-app.jpg 426w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>But you can not use the OTP functionality as you need a backend or an application to authenticate against. The idea to manage the <a href="https://github.com/privacyidea/privacyidea/issues/3" target="_blank">Nitrokey with privacyIDEA was around for a while</a>. Issues have been filed to the privacyIDEA github project and the <a href="https://github.com/privacyidea/privacyideaadm/issues/27" target="_blank">privacyIDEA command line client</a>. Managing the OTPs of the Nitrokey seemed to be a logical first step.</p>
<p>Just yesterday <a href="https://github.com/privacyidea/privacyideaadm/commit/1d840ae834f1c59da7b01421c5280f28d2b94f96" target="_blank">I pushed the code</a> to the <a href="https://github.com/privacyidea/privacyideaadm/" target="_blank">github repository of the privacyIDEA command line client</a>. The good news is, that there are no changes in the privacyIDEA backend necessary. The Nitrokey acts as an HOTP or TOTP token &#8211; both token types are already supported by privacyIDEA. The command line client takes care of initializing the Nitrokey and creates the token object in the privacyIDEA backend.</p>
<h3>privacyIDEA and hardware tokens</h3>
<p>privacyIDEA already supports several hardware tokens, which can be seeded: like the Yubikey, U2F devices, eToken NG or daplug token. Most of these tokens (except U2F) are initialized via the command line client. The great thing with the command line client is, that the tokens like the Yubikeys can be <a href="https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/">mass enrolled</a>. This way the administrator can initialize hundrets of tokens in a few minutes and initialize these with new key material &#8211; being independent of the vendor.</p>
<p>With the Nitrokey you can do this, too. But you also get a bonus. You are indepent with your key material of any vendor <strong>and</strong> you get a hardware, that is <strong>open</strong>, where you can simply run your audits on it.</p>
<h3>Enroll a Nitrokey HOTP token</h3>
<p>To be able to enroll the Nitrokey you need to get and install the <a href="https://github.com/nitrokey/nitrokey-app" target="_blank">Nitrokey-App</a> and <a href="https://github.com/nitrokey/libnitrokey" target="_blank">libnitrokey</a>. The privacyIDEA admin client uses libnitrokey to initialize the OTP slot. The Nitrokey support in the privacyIDEA admin client is totally new. It is not contained in the <a href="https://launchpad.net/~privacyidea" target="_blank">packages of the privacyIDEA admin client</a>, yet. So you also need to get the <a href="https://github.com/privacyidea/privacyideaadm" target="_blank">github repository</a> and install the privacyIDEA admin client via</p>
<pre>  python setup.py install</pre>
<p>Now you can enroll Nitrokeys:</p>
<pre>  privacyidea -U https://localhost --admin super --nosslcheck token nitrokey_mass_enroll --slotname meiner0 --slot 0</pre>
<p>The new command option <strong>nitrokey_mass_enroll</strong> will start the mass enrollment process for Nitrokeys. This will only work if all Nitrokeys have the same admin PIN. At the moment the admin PIN is requested during startup and not for each enrolled Nitrokey.</p>
<p>You can specify which <strong>slot</strong> should be written. There are 3 HOTP slots, so this value can be 0 &#8211; 2. You can also set a <strong>slotname</strong> for this slot.</p>
<p>The admin client will ask you for the next Nitrokey to be inserted. This way you can initialize OTP slots of many Nitrokeys and then give these keys to your users.</p>
<p>The great thing is, the admin client will read the serial number of each Nitrokey during the rollout process. It then create an HOTP token object in the privacyIDEA backend with the token serial <em>NK&lt;serial&gt;_&lt;slotnumber&gt;.</em> This way you can easily identify devices.</p>
<h3>Maximum trust</h3>
<p>privacyIDEA once more improves the level of trust by supporting the open hardware Nitrokey. Get transparent software and transparent hardware to boost trust to the max.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/manage-nitrokey-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.10 released. All for the user &#8211; self registration, password reset, token wizard</title>
		<link>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 11 Feb 2016 07:00:21 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Self Registration]]></category>
		<category><![CDATA[Token Wizard]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=882</guid>

					<description><![CDATA[Today we have pleasure in announcing the release of privacyIDEA 2.10. In this release the two factor authentication solution privacyIDEA eases the lives of the users. Self Registration and Password Reset privacyIDEA comes with a new policy scope &#8220;register&#8221;. If this policy is set new users may create a new account. The creation of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we have pleasure in announcing the release of privacyIDEA 2.10. In this release the two factor authentication solution privacyIDEA eases the lives of the users.</p>
<h3>Self Registration and Password Reset</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640.png" rel="attachment wp-att-885"><img loading="lazy" decoding="async" class="wp-image-885 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640-300x240.png" alt="checklist-911841_640" width="126" height="101" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640-300x240.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/checklist-911841_640.png 640w" sizes="auto, (max-width: 126px) 100vw, 126px" /></a>privacyIDEA comes with <a href="http://privacyidea.readthedocs.org/en/latest/policies/register.html" target="_blank">a new policy scope &#8220;register&#8221;</a>. If this policy is set new users may create a new account. The creation of the account can be limited to certain realms or to certain email addresses. This way you can define, that only user with an email address from a certain domain are allowed to register.</p>
<p>The user will get an email with a registration token, that can be used to access the privacyIDEA Web UI.</p>
<p><a href="https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/">User registration was also introduced in a previous blog post</a>.</p>
<p>User registration is possible due to the concept of writeable userstores, which was introduced earlier. Another possibility that arises from the writeable userstores and which is introduced in <a href="http://privacyidea.readthedocs.org/en/latest/policies/user.html#password-reset" target="_blank">version 2.10 is User Password Reset</a>. In a user-policy you may define, if a user should be allowed to reset his userstore password.</p>
<figure id="attachment_886" aria-describedby="caption-attachment-886" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset.png" rel="attachment wp-att-886"><img loading="lazy" decoding="async" class="size-medium wp-image-886" src="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset-300x208.png" alt="A user may be allowed to reset his userstore password." width="300" height="208" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset-300x208.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/Password-Reset.png 363w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-886" class="wp-caption-text">A user may be allowed to reset his userstore password.</figcaption></figure>
<h3>Token Wizard</h3>
<p>Enrolling tokens to the user is always quite a challenge. No project or installation works the same, has the same requirements and chooses the very same enrollment strategy. It always seems very tempting to let users enroll their tokens, hoping that this strategy will not generate high traffic and costs in the help desk.</p>
<p>With privacyIDEA 2.10 the token user selfenrollment was drastically simplified providing a token enrollment wizard. <a href="http://privacyidea.readthedocs.org/en/latest/policies/webui.html?#tokenwizard" target="_blank">The token enrollment wizard can be enabled using a policy</a>. The enrollment wizard will jump in, if the user has no token. When the user logs in to the WebUI he will be presented a two step enrollment without any distracting additional questions or choices.</p>
<figure id="attachment_888" aria-describedby="caption-attachment-888" style="width: 331px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1.png" rel="attachment wp-att-888"><img loading="lazy" decoding="async" class=" wp-image-888" src="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1-300x146.png" alt="Token Wizard: First step." width="331" height="161" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1-300x146.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard1.png 753w" sizes="auto, (max-width: 331px) 100vw, 331px" /></a><figcaption id="caption-attachment-888" class="wp-caption-text">Token Wizard: First step.</figcaption></figure>
<p>The tokenwizard works for all kind of tokens. In this example it is a smartphone based Google Authenticator HOTP token.</p>
<figure id="attachment_889" aria-describedby="caption-attachment-889" style="width: 332px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2.png" rel="attachment wp-att-889"><img loading="lazy" decoding="async" class=" wp-image-889" src="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2-277x300.png" alt="Token Wizard: Second step." width="332" height="360" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2-277x300.png 277w, https://www.privacyidea.org/wp-content/uploads/2016/02/tokenwizard2.png 756w" sizes="auto, (max-width: 332px) 100vw, 332px" /></a><figcaption id="caption-attachment-889" class="wp-caption-text">Token Wizard: Second step.</figcaption></figure>
<h3>Email</h3>
<p>After all this user stuff another important feature is the configuration of the Email-capabilities in privacyIDEA. Emails are used at different locations like EMail Token, SMS Token, Registration process and Password Reset. Therefore you can defined SMTP Server configurations centrally and choose which SMTP configuration you want to use for the specified task.</p>
<figure id="attachment_891" aria-describedby="caption-attachment-891" style="width: 1024px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers.png" rel="attachment wp-att-891"><img loading="lazy" decoding="async" class="size-large wp-image-891" src="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-1024x337.png" alt="Central SMTP Server definitions can be used for different purposes." width="1024" height="337" srcset="https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-1024x337.png 1024w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-300x99.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers-768x253.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/02/smtp-servers.png 1170w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption id="caption-attachment-891" class="wp-caption-text">Central SMTP Server definitions can be used for different purposes.</figcaption></figure>
<h2>ChangeLog</h2>
<p>This is the complete changelog of version 2.10:</p>
<p>Version 2.10, 2016-02-11</p>
<h3>Features</h3>
<ul>
<li>User Registration: A user may register himself and thus create his new user account.</li>
<li>Password Reset: Using a recovery token a user may issue a password reset without bothering the administrator or the help desk.</li>
<li>Enrollment Wizard for easy user token enrollment</li>
<li>SMTP Servers: Define several system wide SMTP settings and use these for
<ul>
<li>Email token,</li>
<li>SMTP SMS Provider,</li>
<li>registration process,</li>
<li>or password reset.</li>
</ul>
</li>
</ul>
<h3>Enhancements</h3>
<ul>
<li>Ease the Smartphone App (Google Authenticator) rollout. Hide otplen, hash, timestep in the UI if a policy is defined.</li>
<li>Add import of Aladdin/SafeNet XML file.</li>
<li>Add import of password encrypted PSKC files.</li>
<li>Add import of key encrypted PSKC files.</li>
</ul>
<h3>Fixes</h3>
<ul>
<li>Support LDAP passwords with special non-ascii characters.</li>
<li>Support LDAP BIND with special non-ascii characters.</li>
<li>Fix problem with encrypted encryption key.</li>
<li>Fix upgrading DB Schema for postgresql+psycopg2.</li>
<li>Fix UI displaying of saved SMS Provider.</li>
<li>Do not start challenge response with a locked/disabled token.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA admin client for Yubikey mass enrollment</title>
		<link>https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/</link>
					<comments>https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 19 Aug 2015 08:44:19 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=711</guid>

					<description><![CDATA[We just released privacyIDEA admin client 2.5. The admin client already provided an easy way to enroll a bunch of yubikeys by initializing them one after another. Running privacyidea -U https://your.PI.server -a admin token yubikey_mass_enroll you are able to plugin a yubikey, wait for the admin client to initilize it within a second pull it and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We just released privacyIDEA admin client 2.5.</p>
<p>The admin client already provided an easy way to enroll a bunch of yubikeys by initializing them one after another. Running</p>
<pre>privacyidea -U https://your.PI.server -a admin token yubikey_mass_enroll</pre>
<p>you are able to plugin a yubikey, wait for the admin client to initilize it within a second pull it and plug in the next. Without even pressing a key. (Hit Ctrl-C when you are done). This would write all the otpkey material directly to the specified privacyIDEA system. This was the status quo. This way you are able to initialize hundrets of yubikeys just by plugging in and pulling out.</p>
<p>Anyway. In certain cases this would not work, since you might have no USB access on the machine, from which you are accessing the privacyIDEA server.</p>
<p>With privacyIDEA admin client 2.5 it is now possible to initilize a bunch of yubikeys without the privacyIDEA server available. The otpkeys will be written to a file which you can import to privacyIDEA later. Run</p>
<pre>privacyidea token yubikey_mass_enroll --filename secrets.csv</pre>
<p>and all the secret otp keys will be written to secrets.csv. (Please note, that this file is not encrypted and contains the new secret keys of the initilized yubikeys)</p>
<p>Now you can import the file to any privacyIDEA system.</p>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/08/import.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-713" src="https://www.privacyidea.org/wp-content/uploads/2015/08/import-300x142.png" alt="import" width="300" height="142" srcset="https://www.privacyidea.org/wp-content/uploads/2015/08/import-300x142.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/08/import.png 1005w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.3 released &#8211; Manage Certificates</title>
		<link>https://www.privacyidea.org/privacyidea-2-3-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-3-released/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Fri, 22 May 2015 14:08:41 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[CA]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[Token Types]]></category>
		<category><![CDATA[TYPO3]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=594</guid>

					<description><![CDATA[We just released privacyIDEA 2.3. privacyIDEA is moving towards a central point to manage authentication items. This was done by adding the machine concept, SSH keys, using Yubikeys for booting LUKS and now by adding the possibility to manage certificates. privacyIDEA acts as a central control room to manage all relevant points. In 2.3 the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png"><img loading="lazy" decoding="async" class=" size-medium wp-image-588 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png" alt="letter-576242_640" width="300" height="250" srcset="https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640-300x250.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/05/letter-576242_640.png 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>We just released privacyIDEA 2.3.</p>
<p>privacyIDEA is moving towards a central point to manage authentication items. This was done by adding the machine concept, SSH keys, using Yubikeys for booting LUKS and now by adding the possibility to manage certificates.</p>
<p>privacyIDEA acts as a central control room to manage all relevant points. In 2.3 the managing of client certificates was added. But privacyIDEA is not just another certificate authority. No, privacyIDEA follows the same concept as for user resolvers, machines and applications and lets you define CA connectors that &#8211; as the name suggests &#8211; connects to existing certain certificate authorities. Thus you may even have several CAs for different purposes and configure privacyIDEA to connect to them all.</p>
<p>Then you can assign certificates (a new token type) to the users and have the users enroll their certificates easily from within the modern Web UI. You can read more about this at the <a href="http://privacyidea.readthedocs.org/en/v2.3/configuration/tokens/certificate.html" target="_blank">online documentation</a>.</p>
<p>Also other interesting things were added like the <em>registration</em> token type, which eases the process of mass enrollment.</p>
<p>Adding the SCIM Resolver provides better means to be integrated into Cloud setups.</p>
<p>The new TYPO3 plugin is interesting for all Web Hosting companies.</p>
<p>The complete ChangeLog looks like this:</p>
<ul>
<li>Add connector to remote Certificate Authority.</li>
<li>Add Tokentype &#8220;certificate&#8221; to manage certificates for users Certificates or Certificate Requests can be uploaded. Certificate Requests.(Keypair) can be generated in the browser.</li>
<li>Add Tokentype &#8220;registration&#8221; for easier enrollment scenarios.</li>
<li>Add TokenType &#8220;Email&#8221; to send OTP via Email.</li>
<li>Add &#8220;<a href="http://privacyidea.readthedocs.org/en/v2.3/firststeps/index.html?highlight=first%20steps" target="_blank">First Steps</a>&#8221; to online documentation to ease the process of getting up and running.</li>
<li>Add handling of validity period of token.</li>
<li>Enable download of Audit log as CSV.</li>
<li>Add Resolver Priority, to handle a duplicate user in a realm.</li>
<li>Add TYPO3 Plugin to enable OTP with TYPO3</li>
<li>Add SCIM Resolver to fetch users from SCIM services</li>
<li>Several Fixes like:
<ul>
<li>Failcounter issue</li>
<li>NTLM password check</li>
<li>timestep during enrollment</li>
<li>Yubikey CSV import</li>
</ul>
</li>
</ul>
<p>As usual there are several different ways to <a href="http://privacyidea.readthedocs.org/en/v2.3/installation/index.html" target="_blank">install</a> or <a href="http://privacyidea.readthedocs.org/en/v2.3/installation/upgrade.html" target="_blank">upgrade</a> the system.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-3-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enforcing security policies: Security Levels with different OTP token types</title>
		<link>https://www.privacyidea.org/enforcing-security-policies-security-levels-with-different-otp-token-types/</link>
					<comments>https://www.privacyidea.org/enforcing-security-policies-security-levels-with-different-otp-token-types/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jul 2014 16:08:28 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Google Authenticator]]></category>
		<category><![CDATA[mass enrollment]]></category>
		<category><![CDATA[security level]]></category>
		<category><![CDATA[server farm]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=262</guid>

					<description><![CDATA[There are some good howtos around, so that you may already have secured your SSH login to your single server using Google Authenticator as described here. Or did you set up a Yubico validation server and configured Yubikey authentication for a bunch of hosts via RADIUS? Today I will show you, how you can setup [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There are some good howtos around, so that you may already have secured your SSH login to your single server using Google Authenticator as described <a href="http://www.blackmoreops.com/2014/06/26/securing-ssh-two-factor-authentication-using-google-authenticator/" target="_blank">here.</a> Or did you set up a Yubico validation server and configured Yubikey authentication for a <a href="http://www.andybotting.com/using-the-yubikey-for-two-factor-authentication-on-linux" target="_blank">bunch of hosts</a> via RADIUS?</p>
<p>Today I will show you, how you can setup a scenario, where users can authenticate with Yubikey and/or Google Authenticator and you can define centrally, for which server the users need a Yubikey to authenticate and for which other server a Google Authenticator would be sufficient. Thus you can enforce security levels, meaning servers carrying more sensitive data can only be accessed with a hardware device like the Yubikey while others are ok to be accessed with a software token like the Google Authenticator.</p>
<h2>Unique user, two tokens, many machines</h2>
<p>You should already have read about <a href="http://www.howtoforge.com/how-to-enroll-and-use-a-yubikey-with-pivacyidea" target="_blank">enrolling yubikeys</a> and how to use privacyIDEA for  <a href="http://www.howtoforge.com/manage-two-factor-authentication-in-your-serverfarm-with-privacyidea" target="_blank">two factor authentication to your server farm</a>. So I assume, that you have a running installation.</p>
<p>You should have enrolled two tokens to the user root as depicted below:</p>
<figure id="attachment_264" aria-describedby="caption-attachment-264" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2014/07/two-otp-tokens.png"><img loading="lazy" decoding="async" class="wp-image-264 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2014/07/two-otp-tokens-300x170.png" alt="two-otp-tokens" width="300" height="170" srcset="https://www.privacyidea.org/wp-content/uploads/2014/07/two-otp-tokens-300x170.png 300w, https://www.privacyidea.org/wp-content/uploads/2014/07/two-otp-tokens.png 923w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-264" class="wp-caption-text">One user with two tokens of different type</figcaption></figure>
<p>The user root has a Google Authenticator (serial OATH&#8230;, OTP PIN &#8220;google&#8221;) and a Yubikey (serial UBOM&#8230;, OTP PIN &#8220;yubi&#8221;) token.</p>
<p>Both tokens can be used to authenticate from all configured clients. From localhost (172.16.200.41):</p>
<pre><strong>[root@centos6 ~]#</strong> echo "User-Name=root, Password=google977398" | radclient -sx localhost auth testing123
Sending Access-Request of id 167 to 127.0.0.1 port 1812
 User-Name = "root"
 Password = "google977398"
rad_recv: Access-Accept packet from host 127.0.0.1 port 1812, id=167, length=48
 Reply-Message = "privacyIDEA access granted"
Total approved auths: 1
 Total denied auths: 0
 Total lost auths: 0
</pre>
<pre>[root@centos6 ~]# echo "User-Name=root, Password=yubi899739" | radclient -sx localhost auth testing123
Sending Access-Request of id 100 to 127.0.0.1 port 1812
 User-Name = "root"
 Password = "yubi899739"
rad_recv: Access-Accept packet from host 127.0.0.1 port 1812, id=100, length=48
 Reply-Message = "privacyIDEA access granted"
Total approved auths: 1
 Total denied auths: 0
 Total lost auths: 0</pre>
<p>Or from a remote host (172.16.200.106):</p>
<pre><strong>cornelius@puckel</strong> ~ % echo "User-Name=root, Password=google308786" | radclient -sx 172.16.200.41 auth testing123
Sending Access-Request of id 11 to 172.16.200.41 port 1812
    User-Name = "root"
    Password = "google308786"
rad_recv: Access-Accept packet from host 172.16.200.41 port 1812, id=11, length=48
    Reply-Message = "privacyIDEA access granted"

       Total approved auths:  1
       Total denied auths:  0
       Total lost auths:  0</pre>
<pre>cornelius@puckel ~ % echo "User-Name=root, Password=yubi867011" | radclient -sx 172.16.200.41 auth testing123
Sending Access-Request of id 47 to 172.16.200.41 port 1812
    User-Name = "root"
    Password = "yubi867011"
rad_recv: Access-Accept packet from host 172.16.200.41 port 1812, id=47, length=48
    Reply-Message = "privacyIDEA access granted"

       Total approved auths:  1
       Total denied auths:  0
       Total lost auths:  0
</pre>
<h2>The idea</h2>
<p>The idea is to allow access on the machine 172.16.200.106 only with yubikeys. This is the machine that carries tons of sensitive data and we do not want users to authenticate with their Google Authenticator.</p>
<h2>The host with the higher security level</h2>
<p>To accomplish this privacyIDEA provides a special <a href="https://privacyidea.org/doc/1.1/policies/authorization.html#serial" target="_blank">authorization policy</a> that will only grant access, if the the authentication was performed with the correct token.</p>
<p>So lets configure a policy:</p>
<figure id="attachment_272" aria-describedby="caption-attachment-272" style="width: 500px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2014/07/sensitive.png"><img loading="lazy" decoding="async" class="wp-image-272" src="https://www.privacyidea.org/wp-content/uploads/2014/07/sensitive-300x159.png" alt="sensitive" width="500" height="266" srcset="https://www.privacyidea.org/wp-content/uploads/2014/07/sensitive-300x159.png 300w, https://www.privacyidea.org/wp-content/uploads/2014/07/sensitive-1024x544.png 1024w, https://www.privacyidea.org/wp-content/uploads/2014/07/sensitive.png 1025w" sizes="auto, (max-width: 500px) 100vw, 500px" /></a><figcaption id="caption-attachment-272" class="wp-caption-text">A policy restricting the access to the system to Yubikey token types.</figcaption></figure>
<figure id="attachment_274" aria-describedby="caption-attachment-274" style="width: 284px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2014/07/system-config.png"><img loading="lazy" decoding="async" class="wp-image-274 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2014/07/system-config-284x300.png" alt="system-config" width="284" height="300" srcset="https://www.privacyidea.org/wp-content/uploads/2014/07/system-config-284x300.png 284w, https://www.privacyidea.org/wp-content/uploads/2014/07/system-config.png 608w" sizes="auto, (max-width: 284px) 100vw, 284px" /></a><figcaption id="caption-attachment-274" class="wp-caption-text">Override the client interformation</figcaption></figure>
<p>This policy tells the system, that if the client 172.16.200.106 issues an authentication request, it should only be approved, if the serial number of the authenticating token contains the string &#8220;UBOM&#8221;.</p>
<p><strong>Note: </strong>As we are using RADIUS the client 172.16.200.106 issues a radius request to the RADIUS server 172.16.200.41 and the RADIUS server issues the request to the privacyIDEA server 172.16.200.41/127.0.01. Thus the request that arrives at the privacyIDEA server will always be issued by the RADIUS server. So we need to allow the RADIUS server to overwrite the client information &#8211; thus the RADIUS server will tell the privacyIDEA server, what the calling RADIUS client was.</p>
<p>We can set this in the <strong>system config</strong>.</p>
<p>We set the localhost and the eth0 IP of the RADIUS server in a comma seperated list: <strong>127.0.0.1, 172.16.200.41</strong>.</p>
<p>The yubikey now can successfully authenticate at the sensitive host:</p>
<pre><strong>cornelius@puckel</strong> ~ % echo "User-Name=root, Password=yubi773998" | radclient -sx 172.16.200.41 auth testing123
Sending Access-Request of id 88 to 172.16.200.41 port 1812
 User-Name = "root"
 Password = "yubi773998"
rad_recv: Access-Accept packet from host 172.16.200.41 port 1812, id=88, length=48
 Reply-Message = "privacyIDEA access granted"
<strong> Total approved auths: 1</strong>
 Total denied auths: 0
 Total lost auths: 0</pre>
<p>while the Google Authenticator fails to do so:</p>
<pre><strong>cornelius@puckel</strong> ~ % echo "User-Name=root, Password=google850707" | radclient -sx 172.16.200.41 auth testing123
Sending Access-Request of id 24 to 172.16.200.41 port 1812
 User-Name = "root"
 Password = "google850707"
rad_recv: Access-Reject packet from host 172.16.200.41 port 1812, id=24, length=55
 Reply-Message = "privacyIDEA server denied access!"
 Total approved auths: 0
<strong> Total denied auths: 1</strong>
 Total lost auths: 0</pre>
<p>We can see this in the privacyIDEA audit log:</p>
<figure id="attachment_277" aria-describedby="caption-attachment-277" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-fail.png"><img loading="lazy" decoding="async" class="wp-image-277 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-fail-300x34.png" alt="Google Authenticator fails to authenticate on the server 172.16.200.106 with the sensitive data." width="300" height="34" srcset="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-fail-300x34.png 300w, https://www.privacyidea.org/wp-content/uploads/2014/07/audit-fail-1024x116.png 1024w, https://www.privacyidea.org/wp-content/uploads/2014/07/audit-fail.png 1296w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-277" class="wp-caption-text">Google Authenticator fails to authenticate on the server 172.16.200.106 with the sensitive data.</figcaption></figure>
<h2>Google Authenticator is still good for default servers</h2>
<p>But we can still use the Google Authenticator for the default server with lower security level:</p>
<pre>[root@centos6 ~]# echo "User-Name=root, Password=google069728" | radclient -sx 172.16.200.41 auth testing123
Sending Access-Request of id 162 to 172.16.200.41 port 1812
    User-Name = "root"
    Password = "google069728"
rad_recv: Access-Accept packet from host 172.16.200.41 port 1812, id=162, length=48
    Reply-Message = "privacyIDEA access granted"

       Total approved auths:  1
         Total denied auths:  0
           Total lost auths:  0</pre>
<p>We can check this in the audit log, again:</p>
<figure id="attachment_279" aria-describedby="caption-attachment-279" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-success.png"><img loading="lazy" decoding="async" class="wp-image-279 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-success-300x31.png" alt="Successfull authenticate on low security server 172.16.200.41" width="300" height="31" srcset="https://www.privacyidea.org/wp-content/uploads/2014/07/audit-success-300x31.png 300w, https://www.privacyidea.org/wp-content/uploads/2014/07/audit-success-1024x106.png 1024w, https://www.privacyidea.org/wp-content/uploads/2014/07/audit-success.png 1154w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-279" class="wp-caption-text">Successfull authenticate on low security server 172.16.200.41</figcaption></figure>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>privacyIDEA can be used to enroll many different authenticators to your users and mange these devices centrally.</p>
<p>In a second step you can decide <strong>who</strong> authenticates <strong>where</strong> with <strong>which</strong> device without bothering to reenroll any device.</p>
<p>Thus you can enforce your security policies easily. Additionally the audit log keeps track of all events that do not comply to your security policy.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/enforcing-security-policies-security-levels-with-different-otp-token-types/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
