<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>notification &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/notification/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Wed, 19 Jul 2017 12:19:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>notification &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Most flexible two factor authentication &#8211; handling your events!</title>
		<link>https://www.privacyidea.org/most-flexible-two-factor-authentication-handling-your-events/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 19 Jul 2017 12:19:06 +0000</pubDate>
				<category><![CDATA[documentation]]></category>
		<category><![CDATA[events]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1241</guid>

					<description><![CDATA[privacyIDEA comes with a great feature: The event handling framework. So learn more about the unlimited power of the event handling framework and how to use its flexibility to get a privacyIDEA setup, which fits your needs. Event Handling Framework When speaking of software or products the term &#8220;framework&#8221; might raise a connotation of &#8220;you have [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>privacyIDEA comes with a great feature: The <strong>event handling framework</strong>.</p>
<p>So learn more about the unlimited power of the event handling framework and how to use its flexibility to get a privacyIDEA setup, which fits your needs.</p>
<h2>Event Handling Framework</h2>
<p>When speaking of software or products the term &#8220;framework&#8221; might raise a connotation of &#8220;you have to do it yourself&#8221;, &#8220;things are not ready&#8221;, &#8220;the software is not usable&#8221;.</p>
<p>A javascript framework can help you to develop cool web front ends. A python framework can be the basis for developing microservices and the framework Qt still requires the developer to develop the real program with the business logic.</p>
<p>When speaking of the Event Handling Framework things might similar: We the developer do not know how you want to use privacyIDEA and thus we give you the biggest flexibility. We have not thought of all possibilities in which you &#8211; the administrator &#8211; could use this framework! So you can come up with usage scenarios or configuration combinations <strong>noone has ever seen before</strong>!</p>
<p>But when speaking of the Event Handling Framework things are a bit different: You do not have to be a developer to solve your ideas or have privacyIDEA run the way you want it to.</p>
<p>Using the Event Handling Framework you can get the highest flexibility out of a state of the art authentication server, just by easily configuring rules in an easy web interface.</p>
<h2>The basic concept of Event Handlers</h2>
<figure id="attachment_1249" aria-describedby="caption-attachment-1249" style="width: 612px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview.png"><img fetchpriority="high" decoding="async" class="wp-image-1249" src="https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview-300x152.png" alt="" width="612" height="310" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview-300x152.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview-768x389.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview-1024x519.png 1024w, https://www.privacyidea.org/wp-content/uploads/2017/07/event-handler-overview.png 1281w" sizes="(max-width: 612px) 100vw, 612px" /></a><figcaption id="caption-attachment-1249" class="wp-caption-text">The list of event handling definitions</figcaption></figure>
<h3>A top level view</h3>
<p>Each API request is an event:</p>
<ul>
<li>An authentication request,</li>
<li>the request to issue a token,</li>
<li>to block a token</li>
<li>or unassign a token.</li>
<li>If a user logs in to the Web UI, this is an API request&#8230;</li>
</ul>
<p>You can see the <a href="http://privacyidea.readthedocs.io/en/latest/modules/api.html" target="_blank" rel="noopener noreferrer">full list of all API calls here</a>.</p>
<p>The Event Handling Framework allows the administrator to &#8220;attach&#8221; new actions to each and every API call/event. It roughly works like this:</p>
<p style="padding-left: 30px;">event -&gt; condition -&gt; action</p>
<h3>Conditions</h3>
<p>But these actions are only triggered in case a list of <strong>conditions</strong> evaluate to <em>true</em>.  Conditions can be:</p>
<ul>
<li>if an authentication request was successful,</li>
<li>if the role of the user in the request was &#8220;administrator&#8221; or &#8220;user&#8221;,</li>
<li>if the token used was of a certain type</li>
<li>but also more complex conditions like if a date contained in a tokeninfo field of the used token is before or after a certain timestamp or of a certain age.</li>
</ul>
<p>There are currently 14 different, sometimes rather complex conditions and the number is growing.  For a <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/index.html#conditions" target="_blank" rel="noopener noreferrer">full list of conditions see the online documentation</a>.</p>
<h3>Actions &#8211; The Event Handlers</h3>
<p>Actions are performed by the event handlers. Currently there are three &#8220;groups&#8221;: Notifications, Token actions and scripts.</p>
<p>Roughly speaking the <em>Notification</em> actions will automatically notify administrators or users in case of certain events and if certain conditions apply. Notification can be done via email or SMS.</p>
<p>The administrator can also define that <em>Token actions</em> will happen. These are roughly all actions on tokens you can think of: enable, disable, set description and validity period, set abitrary tokeninfo fields, delete tokens and even enroll new tokens! This is probably the most important handler for automating tasks which e.g. can help large organizations with enrollment processes.</p>
<p>Finally there is the <em>Script Handler</em>, which can trigger shell scripts. The privacyIDEA administrator can write and define any number of shell scripts and thus gets unlimited possibilities. The usual use case we think about might be running backups or cleaning up orphaned tokens. But you will have probably a lot of other ideas.</p>
<figure id="attachment_1251" aria-describedby="caption-attachment-1251" style="width: 557px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/event-details.png"><img decoding="async" class=" wp-image-1251" src="https://www.privacyidea.org/wp-content/uploads/2017/07/event-details-300x169.png" alt="" width="557" height="314" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/event-details-300x169.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/event-details-768x433.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/event-details.png 918w" sizes="(max-width: 557px) 100vw, 557px" /></a><figcaption id="caption-attachment-1251" class="wp-caption-text">The action &#8220;set description&#8221; defined in a token event. During enrollment the description of the token gets set to &#8220;This token needs to be shipped 2017-07-10T10:00+0200&#8221;.</figcaption></figure>
<h2>Examples</h2>
<p>Some of these examples might occur to you a bit far fetched. But after all these are examples of what is possible. So you may come up with your own scenarios which very probably will also work out nicely.</p>
<h3>Notify the user in case his password is breached</h3>
<p>The notification event handler can send an email or an SMS to the user, if &#8220;he&#8221; fails to authenticate. This way the user knows, if someone else tried to authenticate.</p>
<p>This can be combined with the condition of the <em>tokentype</em>. The tokentype is only known (and thus only the event handler will trigger) if the OTP PIN a.k.a. static password of the user is correct. Thus the user gets notified if someone guessed or sniffed his static password but fails at the second factor.</p>
<figure id="attachment_1258" aria-describedby="caption-attachment-1258" style="width: 537px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/tokentype-definition.png"><img decoding="async" class=" wp-image-1258" src="https://www.privacyidea.org/wp-content/uploads/2017/07/tokentype-definition-300x119.png" alt="" width="537" height="213" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/tokentype-definition-300x119.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/tokentype-definition-768x304.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/tokentype-definition.png 973w" sizes="(max-width: 537px) 100vw, 537px" /></a><figcaption id="caption-attachment-1258" class="wp-caption-text">The condition contains the tokentype. The event will only trigger if the used token is an HOTP or TOTP token.</figcaption></figure>
<h3>Limit token usage</h3>
<p>If for any reason you need a token, that the user is only allowed to use for a limited time. E.g. the user would only be allowed to login 100 times.</p>
<p>You can create an event handler definition in the token handler to disable the token, if it either was successfully used more than 100 times or it was unsuccessfully used more than 50 times. (To whoever this may concern).</p>
<figure id="attachment_1259" aria-describedby="caption-attachment-1259" style="width: 542px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/disable-token.png"><img loading="lazy" decoding="async" class=" wp-image-1259" src="https://www.privacyidea.org/wp-content/uploads/2017/07/disable-token-300x154.png" alt="" width="542" height="278" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/disable-token-300x154.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/disable-token-768x393.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/disable-token.png 992w" sizes="auto, (max-width: 542px) 100vw, 542px" /></a><figcaption id="caption-attachment-1259" class="wp-caption-text">Disable a token, that was used too often.</figcaption></figure>
<h3>Automatically Unlock locked tokens</h3>
<p>Starting with privacyIDEA 2.20 (currently under development) you can also use timestamp tags in the tokeninfo condition and settings. I.e. if one event occurs, the token event handler can use the &#8220;set tokeninfo&#8221; to set additional information like <strong>tokeninfo key=locked</strong> and <strong>tokeninfo value={now}</strong>. The tag &#8220;now&#8221; will be converted to the current timestamp. This action could be called on a failed authentication request. You could also mark the token for any other reason.</p>
<figure id="attachment_1260" aria-describedby="caption-attachment-1260" style="width: 600px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/mark-the-token.png"><img loading="lazy" decoding="async" class="wp-image-1260" src="https://www.privacyidea.org/wp-content/uploads/2017/07/mark-the-token-300x162.png" alt="" width="600" height="324" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/mark-the-token-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/mark-the-token-768x415.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/mark-the-token.png 968w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a><figcaption id="caption-attachment-1260" class="wp-caption-text">Mark the token with the current timestamp.</figcaption></figure>
<p>A second event handler can check for this timestamp. I.e. the condition can verify if the timestamp is past &#8211; lets say &#8211; one week/7 days. In this case a second action like unlocking the token can be performed.</p>
<figure id="attachment_1261" aria-describedby="caption-attachment-1261" style="width: 600px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/tokeninfo-conditions.png"><img loading="lazy" decoding="async" class="wp-image-1261" src="https://www.privacyidea.org/wp-content/uploads/2017/07/tokeninfo-conditions-300x54.png" alt="" width="600" height="108" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/tokeninfo-conditions-300x54.png 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/tokeninfo-conditions-768x139.png 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/tokeninfo-conditions.png 970w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a><figcaption id="caption-attachment-1261" class="wp-caption-text">Check if the locked timestamp is newer than 7 days old.</figcaption></figure>
<p>This can be achieved by using the <em>tokeninfo</em> condition. This check can also check strings, integers and dates for being less, equal or greater. This helps to easily automate many tedious tasks.</p>
<h2>Under the hood</h2>
<p>The online documentation should <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/index.html" target="_blank" rel="noopener noreferrer">contain the full developer view of the event handlers</a>.</p>
<h3>Decorators</h3>
<p>privacyIDEA is based on the python framework Flask and uses a lot of decorators to structure code, reduce lines of code and improve testability. The event handler adds one decorator &#8220;@event&#8221;. E.g. this <a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/api/validate.py#L176" target="_blank" rel="noopener noreferrer">decorator decorates the endpoint &#8220;/validate/check&#8221;</a>.</p>
<p>The decorator takes care of registering this endpoint in the event handler framework but also calling possible actions.</p>
<h3>Event Handler Class</h3>
<p>Each event handler (<a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/usernotification.html" target="_blank" rel="noopener noreferrer">Notification</a>, <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/tokenhandler.html" target="_blank" rel="noopener noreferrer">Token Handler</a>, <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/scripthandler.html" target="_blank" rel="noopener noreferrer">Scripts</a>) is a python Class, that inherits from the Base Handler. Each handler could define its own conditions and its own actions and thus can work self-contained and add any functionality to privacyIDEA.</p>
<h3>Do actions</h3>
<p>As the event handler like the Token Event Handler use already existing code for diabling or enrolling tokens, these eventhandlers are relatively small and stable. E.g. the token event handler is roughly 100 lines of code defining the allowed actions and another 100 lines of code for calling existing lower level functions.</p>
<p>This is done in the main function &#8220;<a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/lib/eventhandler/tokenhandler.py#L211" target="_blank" rel="noopener noreferrer">do</a>&#8221; of the event handler.</p>
<h3>Conditions</h3>
<p>Each event handler could also define its own conditions, if this is necessary or makes sense. But for now all conditions are the same for all event handlers and thus only the base event handler class implements the method &#8220;<a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/lib/eventhandler/base.py#L245" target="_blank" rel="noopener noreferrer">check_conditions</a>&#8220;.</p>
<h2>Finally</h2>
<figure id="attachment_1255" aria-describedby="caption-attachment-1255" style="width: 518px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280.jpg"><img loading="lazy" decoding="async" class="wp-image-1255" src="https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280-300x200.jpg" alt="" width="518" height="345" srcset="https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2017/07/stairs-1036882_1280.jpg 1280w" sizes="auto, (max-width: 518px) 100vw, 518px" /></a><figcaption id="caption-attachment-1255" class="wp-caption-text">Your imagination!</figcaption></figure>
<p>Adding event handler definitions is a matter of a few clicks for the administrator. But it is a great step for the automation of your privacyIDEA installation.</p>
<p>Adding a new event handler class is also only a matter of inheriting the base handler class and starting with woughly 50 lines of code. The hardest thing is to come up with a new idea! But the only limit is your imagination!</p>
<h2></h2>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.16 &#8211; better notification &#8211; more secure</title>
		<link>https://www.privacyidea.org/privacyidea-2-16-better-notification-secure/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-16-better-notification-secure/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 10 Nov 2016 11:14:56 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[HSM]]></category>
		<category><![CDATA[notification]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1099</guid>

					<description><![CDATA[Today we released just on schedule the version 2.16 of privacyIDEA. Event Handler Framework The event handler framework is great. It is used by a lot of people to adapt their workflows. So we enhanced the UserNotification module. It comes with a lot of new conditions and can send notifications to tokenowners or administrators. You [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today we released just on schedule the version 2.16 of privacyIDEA.</p>
<h3>Event Handler Framework</h3>
<p>The event handler framework is great. It is used by a lot of people to adapt their workflows. So we enhanced the UserNotification module. It comes with a lot of new conditions and can send notifications to tokenowners or administrators. You can use the user object, groups or simple email addresses. The administrator can define conditions in which cases the notification should be sent. <a href="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1.png"><img loading="lazy" decoding="async" class="wp-image-1101 alignright" src="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1-300x294.png" alt="eventhandler-1" width="142" height="139" srcset="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1-300x294.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1-768x753.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1-1024x1005.png 1024w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler-1.png 1056w" sizes="auto, (max-width: 142px) 100vw, 142px" /></a></p>
<p>The notification template can contain <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/usernotification.html#options-for-both-actions" target="_blank">a lot of new tags</a>:</p>
<ul class="simple">
<li>{admin} name of the logged in user.</li>
<li>{realm} realm of the logged in user.</li>
<li>{action} the action that the logged in user performed.</li>
<li>{serial} the serial number of the token.</li>
<li>{url} the URL of the privacyIDEA system.</li>
<li>{user} the given name of the token owner.</li>
<li>{givenname} the given name of the token owner.</li>
<li>{surname} the surname of the token owner.</li>
<li>{username} the loginname of the token owner.</li>
<li>{userrealm} the realm of the token owner.</li>
<li>{tokentyp} the type of the token.</li>
<li>{registrationcode} the registration code in the detail response.</li>
<li>{recipient_givenname} the given name of the recipient.</li>
<li>{recipient_surname} the surname of the recipient.</li>
</ul>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1100 aligncenter" src="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2-300x262.png" alt="eventhandler2" width="300" height="262" srcset="https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2-300x262.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2-768x670.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2-1024x893.png 1024w, https://www.privacyidea.org/wp-content/uploads/2016/11/eventhandler2.png 1086w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>The registrationcode is an interesting tag, which can be used to automatically notify the user about his new registration token.</p>
<h3>Hardware Security Module</h3>
<p>In addition to the PKCS11 module a second AES based Security Module was added. The system administrator can use the security module to encrypt and decrypt data like the OTP seeds in a network attached hardware security module (HSM) boosting your overall security.</p>
<p>This way you do not have to worry about seeds or encryption keys getting compromized.</p>
<h3>Managing Subscriptions</h3>
<p>It is true. Not all client components communicating with privacyIDEA are free. privacyIDEA helps to manage subscriptions for such components like the <a href="https://github.com/NetKnights-GmbH/privacyidea-owncloud-app" target="_blank">privacyIDEA ownCloud App</a>. You can upload subscription files by NetKnights and other 3rd party vendors to assure the communication with the corresponding applications.</p>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1102 aligncenter" src="https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription-300x205.png" alt="owncloud-app-subscription" width="300" height="205" srcset="https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription-300x205.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription-768x526.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription-1024x701.png 1024w, https://www.privacyidea.org/wp-content/uploads/2016/11/owncloud-app-subscription.png 1185w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<h3>Changelog</h3>
<p>Please see the complete changelog:</p>
<p>Featurs</p>
<ul>
<li>Add HSM support via AES keys (#534)</li>
<li>Improved Event Handler for flexible notification (#511)</li>
<li>Signed subscription files for adding and checking for extra functionality during authentication request (#502)</li>
</ul>
<p>Enhancements</p>
<ul>
<li>Allow additional filter attributes in the Audit Log (#519)</li>
<li>Show or hide realms in the login dialog via policy (#517)</li>
<li>Improve UI if admin is not allowed for certain actions (#516, #512)</li>
<li>Disable OTP PIN during enrollment via policy (#439)</li>
<li>Allow automatic sending of registration code via email (#514)</li>
</ul>
<p>Fixes</p>
<ul>
<li>Allow compatibility with ldap3 &gt;= 2.0.7 (#533 #535)</li>
<li>Fix problem with Notification when no tokenowner is available (#528)</li>
<li>Fix confusion of client HTTP parameters (#529)</li>
<li>Fix enabled flag with certain database types (#527)</li>
<li>Catch error in case of faulty overrideClient definition (#526)</li>
<li>Truncate Audit lines, that are too long for the DB table (#525)</li>
</ul>
<p>Install or update privacyIDEA according to the <a href="http://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">installation instructions</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-16-better-notification-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.14 released &#8211; Event Handling and Performance Improvements</title>
		<link>https://www.privacyidea.org/privacyidea-2-14-released-event-handling-performance-improvements/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-14-released-event-handling-performance-improvements/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 17 Aug 2016 06:54:13 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[notification]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1009</guid>

					<description><![CDATA[New Version 2.14 of privacyIDEA comes with better event handling and performance optimization Today we released privacyIDEA 2.14 just as planned in regards to our Milestones on Github. PGP encrypted Seed Files Seed Files can be transmitted and imported in a PGP encrypted way. This eases the transport of those files from the token vendor [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>New Version 2.14 of privacyIDEA comes with better event handling and performance optimization</h2>
<p>Today we released privacyIDEA 2.14 just as planned in regards to our <a href="https://github.com/privacyidea/privacyidea/milestones" target="_blank">Milestones on Github</a>.</p>
<h3>PGP encrypted Seed Files</h3>
<p>Seed Files can be transmitted and imported in a PGP encrypted way. This eases the transport of those files from the token vendor to your installation. You can create a unique PGP key pair for your privacyIDEA installation and hand the public key to the token distributor. The seed file does not need to be decrypted. Just import the encrypted seed file.</p>
<h3>Event Handler for user with enhanced functionality</h3>
<p>Then we enhanced the Event Handler Framework. User notifications can be sent based on administrators and user actions. You may define a detailed manner under which conditions the events will trigger an action. The UserNotification Event Handler has the conditions: realm, login-type (user or admin), result-value and token-locked. This way the user can be notified on failed authentication requests or if the token is locked.</p>
<h3>Better performance for high user numbers or slow networks</h3>
<p>The lookup of the LDAP resolver was heavily improved. Also the program cycles during authentication requests were optimized.</p>
<p>You can see the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">complete changelog on github</a>.</p>
<p>Feel free to <a href="https://twitter.com/privacyidea" target="_blank">follow us on twitter</a>, star the <a href="https://github.com/privacyidea/privacyidea" target="_blank">github repository</a> or <a href="https://groups.google.com/forum/#!forum/privacyidea" target="_blank">join the google group</a>.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-14-released-event-handling-performance-improvements/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 2.13 released &#8211; Improved Text Messages and PIN</title>
		<link>https://www.privacyidea.org/privacyidea-2-13-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-13-released/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 30 Jun 2016 14:05:56 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[PIN handling]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[SMS]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=976</guid>

					<description><![CDATA[Yes I know. And I also always said, please do not use SMS for two factor authentication. Rely on a decent piece of hardware. Although you should stop using text for two factor authentication, privacyIDEA supports text messages or SMS besides a long list of other token types. Text message (SMS) enhancements Nevertheless privacyIDEA 2.13 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Yes I know. And I also always said, please do not use SMS for two factor authentication. Rely on a decent piece of hardware. Although <a href="https://www.wired.com/2016/06/hey-stop-using-texts-two-factor-authentication/" target="_blank">you should stop using text for two factor authentication</a>, privacyIDEA supports text messages or SMS besides a <a href="https://www.privacyidea.org/about/features/">long list of other token types</a>.<a href="https://www.privacyidea.org/wp-content/uploads/2016/06/iphone-388387_640.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-978 alignright" src="https://www.privacyidea.org/wp-content/uploads/2016/06/iphone-388387_640-300x200.jpg" alt="iphone-388387_640" width="300" height="200" srcset="https://www.privacyidea.org/wp-content/uploads/2016/06/iphone-388387_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/06/iphone-388387_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></p>
<h2>Text message (SMS) enhancements</h2>
<p>Nevertheless privacyIDEA 2.13 comes with improved SMS handling. But be sure, SMS can not only be used for authentication but for many other things. privacyIDEA 2.13 now lets you define a central list of SMS gateways &#8211; just like with centrally defined <a href="https://www.privacyidea.org/privacyidea-2-10-released-all-for-the-user/">SMTP servers</a> and <a href="https://www.privacyidea.org/privacyidea-2-11-easy-migration-radius-policy/">RADIUS servers</a>. Now privacyIDEA can centrally define all communication channels it needs. Defining your SMS gateway centrally eases the setup of your SMS token type.</p>
<p>But text messages now can also be used to notify users in case of certain events. The <a href="https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/">event handling with user notification was added in version 2.12</a> with notification via email &#8211; now you can also use text messages.</p>
<p>These SMS gateways could be used for other features in the future like notifying administrators in case of certain errors&#8230; Feel free to <a href="https://github.com/privacyidea/privacyidea" target="_blank">open any feature request on github</a>.</p>
<h3>PIN handling</h3>
<p>The second main features is PIN handling. You may have noticed the new logo of privacyIDEA.</p>
<figure id="attachment_964" aria-describedby="caption-attachment-964" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png"><img loading="lazy" decoding="async" class="wp-image-964 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-300x162.png" alt="privacyIDEA-800px" width="300" height="162" srcset="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-768x415.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png 800w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-964" class="wp-caption-text">privacyIDEA &#8211; the flexible, modular authentication system.</figcaption></figure>
<p>You can see the bottom line &#8220;Authentication System&#8221;. Already a while ago privacyIDEA left the track of a pure OTP system, when adding support for SSH keys, certificates and Yubikeys for LUKS.</p>
<p>privacyIDEA can now take care about PIN policies and require the user to change the PIN after a defined time span. You can also set a policy that a user will have to change the PIN after first use! I am curious what you think about the PIN thing. If you have any further ideas about passwords and PINs drop us a note, write a comment or and <a href="https://github.com/privacyidea/privacyidea" target="_blank">issue on github</a>.</p>
<h2>Further Enhancements</h2>
<p>&#8230;are</p>
<ul>
<li>Performence enhancements in the Web UI regarding the token view and the audit log.</li>
<li>An additional log level below &#8220;DEBUG&#8221;. Debug will log no passwords. If you need passwords in your debug output, set the loglevel to &#8220;9&#8221;.</li>
<li>Quick actions in the token list. Try and click on the Failcounter or the &#8220;active&#8221; column.</li>
<li>Intelligent proxy handling or &#8220;OverrideAuthorizationClient&#8221; setting, which allows to define, which proxy server is allowed to change the client information.</li>
</ul>
<p>The <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">full changelog can be found here</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-13-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Thoughts about 2.10 &#8211; User self registration and notification</title>
		<link>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/</link>
					<comments>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 29 Dec 2015 18:45:09 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[smtp]]></category>
		<category><![CDATA[User Management]]></category>
		<category><![CDATA[user self registration]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=831</guid>

					<description><![CDATA[At the moment we are working on privacyIDEA 2.10. privacyIDEA 2.10 is about user self registration. The classical concept of privacyIDEA was: You have a user database &#8211; a user store &#8211; and privacyIDEA just reads this user store. In classical scenarios such as the enterprise environment with the Active Directory user base this is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>At the moment we are <a href="https://github.com/privacyidea/privacyidea/milestones/2.10%20User%20Self%20Registration" target="_blank">working on privacyIDEA 2.10</a>. privacyIDEA 2.10 is about user self registration.</p>
<p>The classical concept of privacyIDEA was: You have a user database &#8211; a user store &#8211; and privacyIDEA just reads this user store. In classical scenarios such as the enterprise environment with the Active Directory user base this is a perfect concept, because users are already existing. Over time I had to learn that this covers only 95% of the real world. So <a href="https://www.privacyidea.org/privacyidea-2-4-released-otp-for-hosted-environments/">in version 2.4 we added user management &#8211; or editable userIdResolvers</a>.</p>
<h2>Editable UserIdResolvers</h2>
<p>The editable UserIdResolvers that allow the administrator to manage users from within the privacyIDEA Web UI is an important step for the upcoming version 2.10. The editable UserIdResolvers are only implemented for SQL databases at the moment, but the connector for the LDAP databases like Active Directory or OpenLDAP could be easily enhanced accordingly. But at the moment I don&#8217;t think, that someone would like to have his Active Directory modified by privacyIDEA.</p>
<p>Anyway &#8211; privacyIDEA 2.4 already contained an importand method in the SQL connector, the <a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/lib/resolvers/SQLIdResolver.py#L690" target="_blank">method to created a new user in the SQL database</a>.</p>
<h2>User Self Registration</h2>
<figure id="attachment_833" aria-describedby="caption-attachment-833" style="width: 228px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration.png"><img loading="lazy" decoding="async" class=" wp-image-833" src="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-300x243.png" alt="privacyIDEA allows user self registration. Users can create their own user account." width="228" height="185" srcset="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-300x243.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-1024x831.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration.png 1178w" sizes="auto, (max-width: 228px) 100vw, 228px" /></a><figcaption id="caption-attachment-833" class="wp-caption-text">privacyIDEA allows user self registration. Users can create their own user account.</figcaption></figure>
<p>Thinking of new use cases with privacyIDEA we came up with the idea to provide a privacyIDEA instance to the public. Or a company or a hotel could provide a privacyIDEA instance to guests, <a href="https://github.com/privacyidea/privacyidea/issues/286" target="_blank">where guests could register a guest account</a>. If it is possible to <a href="https://github.com/privacyidea/privacyidea/issues/292" target="_blank">restrict the registration of a new account to let&#8217;s say email addresses</a>, we could control which email addresses are allowed to created a new account. This way it could also be used within an huge organization without reading the users from an existing user source but by having the users (identified by the email address) register their own account.</p>
<p>I am sure, at the moment we do not see the whole potential of this new feature.</p>
<h3>How does it work</h3>
<p><a href="http://privacyidea.readthedocs.org/en/latest/policies/register.html" target="_blank">The administrator needs to define a policy, that allows the registration of a user</a> in the defined UserIdResolver. If this policy is defined, an additional link &#8220;Register&#8221; is displayed in the login page. Then users may enter account information and will receive a registration token (a kind of registration code) to be able to login with these two factors (The password they defined and the registration code, they received via email).</p>
<h2>Notification</h2>
<p>During the registration process the user receives an email with the registration token. Again &#8211; privacyIDEA needs to notify the user via an email. privacyIDEA already sends emails for the Email token type or the SMTP SMS Gateway token. Also, there is the PIN handler, which could send the OTP PIN, if a random token PIN was created during enrollment.</p>
<p>So you see, that there already were several places in privacyIDEA, where it could be necessary to define an Email connection. Sending the notification during the registration process would be the fourth occasion to send an email.</p>
<p>Now is the time to refactor the email notification code in privacyIDEA.</p>
<h3>System wide SMTP server configuration</h3>
<p>So the <a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/models.py#L1597" target="_blank">privacyIDEA database for privacyIDEA 2.10 will come with a new database table</a>, where the administrator can define as many SMTP servers as he needs to.</p>
<figure id="attachment_834" aria-describedby="caption-attachment-834" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration.png"><img loading="lazy" decoding="async" class="size-medium wp-image-834" src="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-300x83.png" alt="List of SMTP servers defined in privacyIDEA for notification." width="300" height="83" srcset="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-300x83.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-1024x283.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration.png 1166w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-834" class="wp-caption-text">List of SMTP servers defined in privacyIDEA for notification.</figcaption></figure>
<p>In all occasions, when privacyIDEA needs to send an email, the configuration will only refer to the identifier of this SMTP configuration. Usually defining one SMTP configuration will be enough an this single SMTP server will be used for sending the email of an Email token and the registration emails and all other notification information to come.</p>
<p>But privacyIDEA would not be privacyIDEA if it did not let you the freedom and choice to define as many different SMTP connections as you will need.</p>
<h2>More to come</h2>
<p>With all these building blocks</p>
<ul>
<li>editable UserIdResolvers</li>
<li>simple token implementations</li>
<li>simple email notification</li>
</ul>
<p>new ideas can be implemented easily and quickly. You can see this in <a href="https://www.privacyidea.org/category/release/">the really short release cycles of privacyIDEA</a>.</p>
<p>We are anxious to hear of your ideas, which I am certain of, can be easily implemented, too. Please <a href="https://groups.google.com/forum/#!forum/privacyidea" target="_blank">join us on the Google group</a> or drop your idea at <a href="https://github.com/privacyidea/privacyidea/issues" target="_blank">privacyIDEA&#8217;s Github issues</a>.</p>
<p>Happy new year and happy authenticating!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
