<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Migration &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/migration/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Wed, 04 Sep 2019 08:25:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Migration &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.1 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-1-polished-policies/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-1-polished-policies/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 04 Sep 2019 04:23:40 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1621</guid>

					<description><![CDATA[privacyIDEA 3.1 has the most flexible policies to cope with every login situation. It allows easy migration from any proprietary 2FA system.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img fetchpriority="high" decoding="async" width="1024" height="512" src="https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-1024x512.jpg" alt="" class="wp-image-1627" srcset="https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-1024x512.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-300x150.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280-768x384.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/09/american-football-referees-1476038_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>privacyIDEA knows the rules. And it will have your users follow those.</figcaption></figure>



<p>We are happy to announce, that today the first major release of the new privacyIDEA 3 series was pushed to the repositories. It is available via the Python Package Index and on the Ubuntu repositories for <a rel="noreferrer noopener" aria-label="Ubuntu 16.04LTS and 18.04LTS (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank">Ubuntu 16.04LTS and 18.04LTS</a>.</p>



<p>With privacyIDEA 3.1 the administrator can configure policies that will only be bound to users with certain user attributes. This way the admin can define different policies for users in the same user resolver.</p>



<p>Migration from proprietary 2FA solutions gets even simpler with automatic token assignment and PIN setting.</p>



<h2 class="wp-block-heading">Even more flexible policies</h2>



<p>The administrator can now define policies based on any arbitrary attributes. To do so, privacyIDEA can provide different attribute modules for the policy conditions. This version of privacyIDEA comes with a user-attribute module. Up to the latest version policies could only be assigned to a complete user resolver. This was difficult, when rights of users changed and only some users from a certain user resolver should get new policies in privacyIDEA.</p>



<p>Now the administrator can set an attribute e.g. in the LDAP dirctory of a user, and as soon as this is set the policy will be automatically bound to this user. This provides a bigger flexibility with handling access rights or in migration or enrollment scenarios.</p>



<p>We also added new policy actions for administrators. Administrators now can get a special read right on any configuration setting. This way the super user can define, which administrator is allowed to read certain configuration or which configuration should be hidden from which help desk user. The migration script, which runs automatically in the ubuntu package update will create new migration policies so that the current behaviour of the installation does not change after the update.</p>



<p>We did a lot of work on policies in this release &#8211; we called in <em>polishing policies</em>.</p>



<h2 class="wp-block-heading">Migration of proprietary 2FA solutions</h2>



<p>Again we improved the possibility to migrate from existing, proprietary 2FA solutions. Proprietary software goes end of life and sometimes leaves the user with a mess. <a rel="noreferrer noopener" aria-label="Cornelius wrote a blog article about that problem (opens in a new tab)" href="https://netknights.it/en/consolidation-of-the-market-and-migrations/" target="_blank">Cornelius wrote a blog article about that problem</a>.</p>



<p>The administrator can import an existing seed file from the old system. privacyIDEA then basically knows the old tokens. On authentication request privacyIDEA can automatically find out, which token belongs to which user. In addition it will set the old OTP PIN of the tokens. This way neither the user nor the administrator have anything to do to migrate to privacyIDEA.</p>



<p>This is possible since privacyIDEA will at first forward the authentication request to the old system. If authentication is successful privacyIDEA will use the used OTP value to identify the token for the user and it will use the rest of the passed credential to automatically set the OTP PIN.</p>



<h2 class="wp-block-heading">Many enhancements</h2>



<p>Further work was done on the TiQR-Token in privacyIDEA. This is an older concept where a challenge is passed to the user&#8217;s smartphone via a QR code, which is displayed during the login process. The user simply accepts the login request on his smartphone.</p>



<p>In addition with privacyIDEA 3.1 there come a lot of minor enhancements and bug fixes.</p>



<p>The complete changelog can be found at <a href="https://github.com/privacyidea/privacyidea/blob/branch-3.1/Changelog">Github</a>. privacyIDEA will be at the <a rel="noreferrer noopener" aria-label="ownCloud conference (opens in a new tab)" href="https://conference.owncloud.org/" target="_blank">ownCloud conference</a> in Nuremberg in September. Stop by and get safe!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-1-polished-policies/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.22 with a more flexible RADIUS integration</title>
		<link>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 07:03:25 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1344</guid>

					<description><![CDATA[With privacyIDEA 2.22 we added the possibility to pass more useful userinformation to a RADIUS client like a VPN. The administrator can add a policy to include the resolver and the realm of a user who authenticated successfully. This response data can then be used in the FreeRADIUS plugin and modified by regular expressions to add any arbitrary RADIUS attribute in the RADIUS response, which then would be sent to the VPN. This additional information can be used by Cisco ASA, Citrix Netscaler or any other enterprise grade VPN to put the user into certain subnets or to assign resource to the user.]]></description>
										<content:encoded><![CDATA[<p>Today we are happy to release privacyIDEA 2.22. It is available in the Ubuntu repositories for Ubuntu 14.04 LTS and 16.04 LTS. You can also install privacyIDEA on any Linux distribution on a virtualenv via the Python Package Index. <a href="http://privacyidea.readthedocs.io/en/master/installation/index.html" target="_blank" rel="noopener">Read the detailed documentation on how to install or upgrade privacyIDEA</a>.</p>
<p>You should always take a look at the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">Changelog</a>, but starting with privacyIDEA we added a document <a href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank" rel="noopener">READ_BEFORE_UPDATE</a>, which contains important information to consider before upgrade.</p>
<p><figure id="attachment_1352" aria-describedby="caption-attachment-1352" style="width: 1280px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg"><img decoding="async" class="size-full wp-image-1352" src="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg" alt="" width="1280" height="544" srcset="https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280.jpg 1280w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-300x128.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-768x326.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2018/03/background-3228704_1280-1024x435.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></a><figcaption id="caption-attachment-1352" class="wp-caption-text">privacyIDEA 2.22 is improving the RADIUS functionality to be more flexible in combination with VPNs and firewalls.</figcaption></figure></p>
<h3>New Features: RADIUS integration, VASCO support, Offline Refill and more</h3>
<p>With privacyIDEA 2.22 we added the possibility to pass more useful userinformation to a RADIUS client like a VPN. The administrator can add a policy to include the resolver and the realm of a user who authenticated successfully. This response data can then be used in the FreeRADIUS plugin and modified by regular expressions to add any arbitrary RADIUS attribute in the RADIUS response, which then would be sent to the VPN. This additional information can be used by Cisco ASA, Citrix Netscaler or any other enterprise grade VPN to put the user into certain subnets or to assign resource to the user.</p>
<h4>VASCO token support</h4>
<p>privacyIDEA is Open Source. We love Open Source and open standards. But sometimes you have to communicate with proprietary partners, so that they have the chance to become open. This is why privacyIDEA 2.22 comes with support for the proprietary VASCO Digipass tokens. This way it is easier to run VASCO tokens and open standards tokens like HOTP, TOTP or Yuibkeys in parallel and maybe even one day migrate all VASCO tokens &#8211; after the batteries have died &#8211; to other devices.</p>
<p>If you want to learn more about migrating your VASCO tokens, please contact <a href="https://netknights.it/en/unternehmen/kontakt/" target="_blank" rel="noopener">NetKnights for professional sevices</a>.</p>
<h4>Offline Refill</h4>
<p>We are improving the offline capability of privacyIDEA in conjunction with the PAM module and the <a href="https://netknights.it/en/produkte/privacyidea-credential-provider/" target="_blank" rel="noopener">privacyIDEA Credential Provider</a>. The new offline refill will allow to automatically refill the hashed OTP values on the notebooks, which are available for authentication, if the notebook is offline. This way users or administrators will not have to worry anymore when taking the hardware on a business trip.</p>
<h4>Send SMS via SMPP</h4>
<p>SMPP (Short Message Peer-to-Peer) is a protocol used by carriers for sending SMS. privacyIDEA 2.22 comes with a new SMS Provider to send SMS via SMPP. This can be used for sending SMS in the SMS token during authentication but also for sending SMS in the notification event handler, to notify users or administrators on certain events.</p>
<h4>Use Counter handler for monitoring and statistics</h4>
<p>&nbsp;</p>
<p><figure id="attachment_1355" aria-describedby="caption-attachment-1355" style="width: 283px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg"><img decoding="async" class=" wp-image-1355" src="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg" alt="" width="283" height="212" srcset="https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280.jpg 1280w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-300x225.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-768x576.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2018/03/speedometer-662191_1280-1024x768.jpg 1024w" sizes="(max-width: 283px) 100vw, 283px" /></a><figcaption id="caption-attachment-1355" class="wp-caption-text">With the counter handler the administrator can count arbitrary events and use this data for statistics.</figcaption></figure></p>
<p>We often see, that the event handler is a mighty tool to cope with many different requirements. In addition to the notification handler, token handler, script handler and federation handler privacyIDEA 2.22 now comes with a simply but very flexible counter handler. Just like every handler it can be attached to any event (API call) and will trigger under defined conditions. The counter handler simply increses a counter in the database for this very event.</p>
<p>These counters can now be used for statistics or monitoring, e.g. when increasing a certain counter on the event failed authentication with HOTP token. This way the administrator could monitor the number of failed authentications per time interval.</p>
<h4>Each token has a tokenkind</h4>
<p>Many installations use hardware tokens and software tokens at the same time. To be more flexible in distinguishing these tokens when it comes to deleting tokens or deciding giving access, we added an additional class attribute to tokens. The &#8220;tokenkind&#8221;. In contrast to the tokentype, which is simply the mathematics of the token, the tokenkind defines if this very token object is  hardware token, a software token or a virtual token.</p>
<h4>Use arbitrary tokeninfo in authorization policies</h4>
<p>Authorization policies are used to decide if an authenticated user should get access or not. As the arbitrary tokeninfo fields are getting used more in more in event handler definitions, the tokeninfo can now also be used in the authorization policies to grant or deny access.</p>
<p>This way event handlers could modify token information and this modified token information can be used for granting access. Event handling and authorization thus get connected more tightly.</p>
<h3>Lots of enhancements</h3>
<p>There are further enhancements of existing features in privacyIDEA. We improved the token export the PSKC files &#8211; we will also export PW token types and the counter values of HOTP and TOTP tokens. The export can now also be used to reencrypt a token database.</p>
<p>The SMS and Email token types can now either use the fixed mobile number or email address in the token data or read the mobile/email dynamically from the user store on each authentication event.</p>
<p>The administrator can define a policy so that the validity of the U2F attestation certificate will be ignored. Some U2F devices come with a attestation certificate with an invalid validity period.</p>
<p>We improved the speed of the LinOTP migration script, so that a database with tens of thousands of tokens can be easily migrated.</p>
<p>The pi-manage script can now generate API tokens with a freely chosen validity time.</p>
<p>The user can now set the description of HOTP and TOTP tokens during enrollment.</p>
<p>The administrator can add a timeout to the SMTP server configuration.</p>
<p>The email tokens can now use a complex html template for sending emails.</p>
<p>The LDAP resolver allows to define each attribute as a multivalue attribute.</p>
<p>The event handler condition can trigger on failed authentication.</p>
<p>For the complete changelog with also contains all the fixes, please take a look a the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">Github repository</a>.</p>
<h3>Enterprise Edition</h3>
<p>If you are running large mission critical setups, privacyIDEA is also available as <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noopener">Enterprise Edition with support and warranty/liability</a>.</p>
<h3>privacyIDEA at Grazer Linuxtage and Linuxfest Northwest</h3>
<p>At the end of April you can hear a <a href="https://glt18-programm.linuxtage.at/events/322.html" target="_blank" rel="noopener">talk about privacyIDEA</a> in Austria at the <a href="https://www.linuxtage.at/" target="_blank" rel="noopener">Grazer Linuxtage</a>. You will learn, how you can easily migrate an old, existing, proprietary 2FA system to privacyIDEA. Project member Friedrich Weber will also host a <a href="https://glt18-programm.linuxtage.at/events/323.html" target="_blank" rel="noopener">workshop at the Grazer Linuxtage</a>, where you can participate in installing privacyIDEA and configuring to your needs.</p>
<p>At the same time Cornelius Kölbel will give a talk in Bellingham Technical Colleage, U.S.A. At the <a href="https://www.linuxfestnorthwest.org/conferences/lfnw18" target="_blank" rel="noopener">LinuxFest NorthWest 2018</a> you can learn about what makes privacyIDEA so unique in regards to workflow integrations using the privacyIDEA Event Handler system automating a lot of individual tasks.</p>
<h3>Join the discussion</h3>
<p>Join the discussion a <a href="https://community.privacyidea.org" target="_blank" rel="noopener">community.privacyidea.org</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-22-with-a-more-flexible-radius-integration/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA talk at Tübix</title>
		<link>https://www.privacyidea.org/privacyidea-talk-tubix/</link>
					<comments>https://www.privacyidea.org/privacyidea-talk-tubix/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 19 May 2016 07:31:13 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Certificates]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=934</guid>

					<description><![CDATA[Cornelius will give a talk about what&#8217;s new in privacyIDEA at the tübix in Tübingen. This will be things like: Event handler to trigger certain actions depending on events Improved certificate support Editable user resolvers &#8211; even in LDAP Improvements in the WebUI and policies Easy Migration with RADIUS passthru policy Tübix is a Linux [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cornelius will give a talk about what&#8217;s new in <a href="http://www.tuebix.org/2016/programm/cornelius-koelbel-open-source-mehr-faktor-authentifizierung-mit-privacyidea/" target="_blank">privacyIDEA at the tübix in Tübingen</a>.</p>
<p>This will be things like:</p>
<ul>
<li>Event handler to trigger certain actions depending on events</li>
<li>Improved certificate support</li>
<li>Editable user resolvers &#8211; even in LDAP</li>
<li>Improvements in the WebUI and policies</li>
<li>Easy Migration with RADIUS passthru policy</li>
</ul>
<p>Tübix is a Linux event in the south of Germany, so the talk will be in German. But much time to discuss things, also in the evening utilizing a cold beer.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-talk-tubix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.11: Easy migration with RADIUS policy</title>
		<link>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 29 Mar 2016 07:53:56 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[LDAP]]></category>
		<category><![CDATA[Migration]]></category>
		<category><![CDATA[RADIUS]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=907</guid>

					<description><![CDATA[Today we released privacyIDEA 2.11. You can download privacyIDEA from Github, install it from the python package index or via the launchpad repository on Ubuntu 14.04. Updating an Ubuntu installation from launchpad works out of the box. When updating a pip installation, please note that a new database table was added. OTP system migration privacyIDEA [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we released privacyIDEA 2.11. You can download <a href="https://github.com/privacyidea/privacyidea/" target="_blank">privacyIDEA from Github</a>, <a href="http://privacyidea.readthedocs.org/en/latest/installation/pip.html" target="_blank">install it from the python package index</a> or via the <a href="http://privacyidea.readthedocs.org/en/latest/installation/ubuntu.html" target="_blank">launchpad repository on Ubuntu 14.04</a>.</p>
<p>Updating an Ubuntu installation from launchpad works out of the box. When updating a pip installation, please note <a href="http://privacyidea.readthedocs.org/en/latest/installation/upgrade.html" target="_blank">that a new database table was added</a>.</p>
<h3>OTP system migration</h3>
<p><figure id="attachment_912" aria-describedby="caption-attachment-912" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640.jpg" rel="attachment wp-att-912"><img loading="lazy" decoding="async" class="wp-image-912 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640-300x200.jpg" alt="computer-767784_640" width="300" height="200" srcset="https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/03/computer-767784_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-912" class="wp-caption-text">Migrate proprietary OTP systems</figcaption></figure></p>
<p>privacyIDEA now helps you to migrate an old 3rd party installation to privacyIDEA. To do so the <a href="http://privacyidea.readthedocs.org/en/latest/policies/authentication.html#passthru" target="_blank">new RADIUS passthru policy was added</a>. privacyIDEA can pass all authentication requests for users without a token to the defined RADIUS server. This way you can migrate tokens smoothly and run your old system and your new privacyIDEA side by side until you have removed all old tokens or moved all users and tokens to privacyIDEA.</p>
<h3>LDAP Improvements</h3>
<p>The LDAP received some nice improvements. It can now handle special characters like é and ß in the username and the password reliably. With Active Directory in Windows 2012 you can now use the objectGUID as the UID in the LDAP resolver.</p>
<p>We now use paged searched when retrieving user lists. This way you can get really <strong>all</strong> users in the LDAP directory.</p>
<h3>Changelog</h3>
<p>You can find a <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">complete changelog at github</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Version 2 in master branch</title>
		<link>https://www.privacyidea.org/version-2-in-master-branch/</link>
					<comments>https://www.privacyidea.org/version-2-in-master-branch/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 10:36:00 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Migration]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=501</guid>

					<description><![CDATA[The migration process is well. Today I merged the version2 branch to the master branch. So go an visit the github repo. Check out privacyIDEA 2.0(dev) like this: git clone https://github.com/privacyidea/privacyidea.git cd privacyidea virtualenv venv source venv/bin/activate pip install -r requirements.txt ./manage.py createdb ./manage.py addadmin admin@localhost admin ./manage.py runserver If you want to run tests [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The migration process is well. Today I merged the version2 branch to the master branch.</p>
<p>So go an visit the <a href="https://github.com/privacyidea/privacyidea" target="_blank">github repo</a>.</p>
<p>Check out privacyIDEA 2.0(dev) like this:</p>
<pre>git clone https://github.com/privacyidea/privacyidea.git
cd privacyidea
virtualenv venv
source venv/bin/activate
pip install -r requirements.txt
./manage.py createdb
./manage.py addadmin admin@localhost admin
./manage.py runserver</pre>
<p>If you want to run tests do:</p>
<pre>nosetests -v --with-coverage --cover-package=privacyidea --cover-html</pre>
<p>You may also just watch this video:</p>
<p><a href="https://www.privacyidea.org/version-2-in-master-branch/"><img decoding="async" src="https://www.privacyidea.org/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FCwzz5PCjHQI%2Fhqdefault.jpg" alt="YouTube Video"></a><br /> <a href="https://youtu.be/Cwzz5PCjHQI" target="_blank">Watch this video on YouTube</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/version-2-in-master-branch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Migration in progress</title>
		<link>https://www.privacyidea.org/migration-in-progress/</link>
					<comments>https://www.privacyidea.org/migration-in-progress/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 13 Jan 2015 16:28:12 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[2.0]]></category>
		<category><![CDATA[AngularJS]]></category>
		<category><![CDATA[Flask]]></category>
		<category><![CDATA[Migration]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=494</guid>

					<description><![CDATA[Hi, today I pushed the first draft of the new privacyIDEA to github. See the branch called &#8220;version2&#8221;. You may run 252 tests with ~1500 asserts to gain a code coverage of the server backend of 97% &#8211; well, you might remember my retweet about code coverage 😉 Anyway &#8211; the code is supposed to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Hi,</p>
<p>today I pushed the first draft of the new privacyIDEA to <a href="https://github.com/privacyidea/privacyidea/tree/version2" target="_blank">github</a>. See the branch called &#8220;version2&#8221;.</p>
<p>You may run 252 tests with ~1500 asserts to gain a code coverage of the server backend of 97% &#8211; well, you might remember my <a href="https://twitter.com/francesc/status/449206943987793920" target="_blank">retweet about code coverage</a> <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Anyway &#8211; the code is supposed to be testable at all levels. The lowest level being the database, then the libraries, then the REST API. I think it works quite well. Each module denotes, in which test script it is tested. Each test script tells you, which module it tests.</p>
<p>The <a href="https://github.com/privacyidea/privacyidea/blob/version2/README.md" target="_blank">readme</a> tells you how to get started with the tests in your virtual environment.</p>
<p>Now to the UI part.</p>
<p>The UI part is now based on angularJS which calls the redesigned REST API. You can run the server like</p>
<pre>./manage runserver</pre>
<p>to checkout the Web UI.</p>
<p>Some first impressions. A intensive linking between all logically connected object should ease the handling and provide all information.</p>
<p>The angular ui-router is used to switch between the UI states.</p>
<h3>Tokenlist</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/01/tokenview.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-495" src="https://www.privacyidea.org/wp-content/uploads/2015/01/tokenview-300x134.png" alt="tokenview" width="300" height="134" srcset="https://www.privacyidea.org/wp-content/uploads/2015/01/tokenview-300x134.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/01/tokenview-1024x458.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/01/tokenview.png 1083w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>The tokenlist links to the token details and the user details of the user, the token is assigned to.</p>
<h3>Token details</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/01/tokendetails.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-496" src="https://www.privacyidea.org/wp-content/uploads/2015/01/tokendetails-300x260.png" alt="tokendetails" width="300" height="260" srcset="https://www.privacyidea.org/wp-content/uploads/2015/01/tokendetails-300x260.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/01/tokendetails-1024x887.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/01/tokendetails.png 1083w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>The tokendetails provide all information about a token and you can perform all actions on this token.</p>
<p>Users can be assigned to the token. The user is searched while you are typing and trying to remember his name.</p>
<p>You can even check the authentication with such a token. If a user is assigned, you can immediatly switch to the user details view.</p>
<h3>User details</h3>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2015/01/userdetails.png"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-497" src="https://www.privacyidea.org/wp-content/uploads/2015/01/userdetails-300x214.png" alt="userdetails" width="300" height="214" srcset="https://www.privacyidea.org/wp-content/uploads/2015/01/userdetails-300x214.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/01/userdetails-1024x730.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/01/userdetails.png 1096w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<p>In the user details you can see the complete list of the users tokens, enroll a new token for the user or assign an existing token. While you are typing the serial number, the system takes care of finding the right, unassigned token. So if you only remember that the token was a TOTP token, you can start typing T&#8230; O&#8230; T&#8230; P&#8230;</p>
<p>Fun.</p>
<h3>Contribute</h3>
<p>You are welcome to comment on 2.0 and do pull request!</p>
<p>Cornelius</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/migration-in-progress/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
