<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ownCloud &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/owncloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 16 Apr 2019 13:03:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>ownCloud &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>More flexible 2FA at ownCloud with U2F, Email, SMS and other Challenge Response</title>
		<link>https://www.privacyidea.org/more-flexible-2fa-at-owncloud-with-u2f-email-sms-and-other-challenge-response/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 16 Apr 2019 13:03:22 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Challenge Response]]></category>
		<category><![CDATA[ownCloud]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1561</guid>

					<description><![CDATA[Today we released the ownCloud App version 2.5.1. This plugin connects ownCloud to privacyIDEA adding enterprise 2FA to your ownCloud. privacyIDEA supports a lot of different token types to provide 2FA for the user. This can be keyfob tokens or Smartphone Apps but also authentication mechanisms that work with a challenge/response workflow like Email, SMS [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter is-resized"><img decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png" alt="" class="wp-image-964" width="285" height="154" srcset="https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px.png 800w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-300x162.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/06/privacyIDEA-800px-768x415.png 768w" sizes="(max-width: 285px) 100vw, 285px" /></figure></div>



<p>Today we released the <a href="https://github.com/privacyidea/privacyidea-owncloud-app/releases/tag/v2.5.1" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">ownCloud App version 2.5.1</a>. This plugin connects ownCloud to privacyIDEA adding enterprise 2FA to your ownCloud.</p>



<p>privacyIDEA supports a lot of different token types to provide 2FA for the user. This can be keyfob tokens or Smartphone Apps but also authentication mechanisms that work with a challenge/response workflow like Email, SMS or U2F.</p>



<p>The version 2.5.1 of the privacyIDEA ownCloud app improves the challenge/response authentication when logging in to ownCloud. A user can now have several different challenge/response tokens, an Email, an SMS and/or a U2F device. The privacyIDEA ownCloud app will handle this correctly and allow the user to either authenticate with the code from an SMS or with his U2F device.</p>



<p>A complete changelog can be found <a href="https://github.com/privacyidea/privacyidea-owncloud-app/blob/v2.5.1/Changelog" target="_blank" rel="noreferrer noopener" aria-label="here at Github (opens in a new tab)">here at Github</a>.</p>



<p>The privacyIDEA ownCloud app is also available via the <a href="https://marketplace.owncloud.com/apps/twofactor_privacyidea" target="_blank" rel="noreferrer noopener" aria-label="ownCloud Marketplace (opens in a new tab)">ownCloud Marketplace</a>.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Maintenance release privacyIDEA 2.23.4</title>
		<link>https://www.privacyidea.org/maintenance-release-privacyidea-2-23-4/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 06 Feb 2019 15:41:59 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Challenge Response]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[simplesamlphp]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1486</guid>

					<description><![CDATA[Today we released a maintenance release of privacyIDEA. The new version 2.23.4 comes with a few fixes in regards to challenge response authentication, which is used with Emails and SMS tokens. Challenge Response The response of the administrative triggerchallenge call is now consistent with a user triggered challenge. This makes it easier for plugins to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Today we released a maintenance release of privacyIDEA. The new version 2.23.4 comes with a few fixes in regards to challenge response authentication, which is used with Emails and SMS tokens.</p>



<h2 class="wp-block-heading">Challenge Response</h2>



<p>The response of the administrative triggerchallenge call is now consistent with a user triggered challenge. This makes it easier for plugins to handle triggered challenges and also allow multiple challenges at a time. E.g. in the ownCloud or simpleSAMLphp plugin the user would now be able to have several challenge response tokens at the same time and login with either of them.</p>



<div class="wp-block-image"><figure class="alignright"><img fetchpriority="high" decoding="async" width="325" height="402" src="https://www.privacyidea.org/wp-content/uploads/2019/02/display-challenges-1.png" alt="" class="wp-image-1492" srcset="https://www.privacyidea.org/wp-content/uploads/2019/02/display-challenges-1.png 325w, https://www.privacyidea.org/wp-content/uploads/2019/02/display-challenges-1-243x300.png 243w" sizes="(max-width: 325px) 100vw, 325px" /></figure></div>



<h2 class="wp-block-heading">IE and LDAP</h2>



<p>The Internet Explorer sometimes does not provide a usual expected-language header. So even if it looks like the IE would expect a German web site, the privacyIDEA web UI would still be displayed in English. This issue was fixed.</p>



<p>Last but not least, a minor change in the event handler code now avoids an additional LDAP request to the LDAP server, thus speeding up the responses and decreasing the load on the LDAP server.</p>



<p>A complete changelog can be found <a rel="noreferrer noopener" aria-label="here (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/blob/branch-2.23/Changelog" target="_blank">here</a>.</p>



<h2 class="wp-block-heading">Update</h2>



<p>privacyIDEA can be updated from the usual sources like the launchpad repository or the Python package index.</p>



<div class="wp-block-button aligncenter is-style-squared"><a class="wp-block-button__link has-background" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" style="background-color:#1c6b8f">Documentation for installation and update&#8230;</a></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA ownCloud Plugin allows client specific 2FA</title>
		<link>https://www.privacyidea.org/privacyidea-owncloud-plugin-allows-client-specific-2fa/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 30 Jan 2019 20:48:18 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[plugins]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1482</guid>

					<description><![CDATA[The new release 2.5 of the privacyIDEA ownCloud app allows the administrator to define which client should require 2FA and which is ok with only a password. This is based on the IP address of the clients. This way e.g. users would not need a second factor when accessing ownCloud from the LAN, while they [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img decoding="async" width="1024" height="576" src="https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-1024x576.jpg" alt="" class="wp-image-1483" srcset="https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-1024x576.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-300x169.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-768x432.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-1110x624.jpg 1110w, https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280-528x297.jpg 528w, https://www.privacyidea.org/wp-content/uploads/2019/01/cloud-computing-2001090_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The new release 2.5 of the privacyIDEA ownCloud app allows the administrator to define which client should require 2FA and which is ok with only a password. This is based on the IP address of the clients.</p>



<p>This way e.g. users would not need a second factor when accessing ownCloud from the LAN, while they would need to provide a second factor when they want to access their critical data over the internet.</p>



<p>The privacyIDEA ownCloud App is available from the <a rel="noreferrer noopener" aria-label="ownCloud Marketplace (opens in a new tab)" href="https://marketplace.owncloud.com/apps/twofactor_privacyidea" target="_blank">ownCloud Marketplace</a> and via <a rel="noreferrer noopener" aria-label="Github (opens in a new tab)" href="https://github.com/privacyidea/privacyidea-owncloud-app" target="_blank">Github</a>.</p>



<p>I will give a talk about the privacyIDEA ownCloud App <a href="https://fosdem.org/2019/schedule/event/owncloud_2fa/" target="_blank" rel="noreferrer noopener" aria-label="at FOSDEM this sunday (opens in a new tab)">at FOSDEM this sunday</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA at FrOSCon</title>
		<link>https://www.privacyidea.org/privacyidea-at-froscon/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 05:49:34 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FrOSCon]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[Statistics]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1416</guid>

					<description><![CDATA[The privacyIDEA project - the most flexible two factor authentication system - will have a booth at FrOSCon, the Free and Open Source Conference in Sankt Augustin, Germany on August 25th and 26th.]]></description>
										<content:encoded><![CDATA[<p>The privacyIDEA project &#8211; the most flexible two factor authentication system &#8211; <a href="https://www.froscon.de/programm/aussteller/#a2083" target="_blank" rel="noopener">will have a booth at FrOSCon</a>, the Free and Open Source Conference in Sankt Augustin, Germany on August 25th and 26th.</p>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920.jpg"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1419" src="https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920.jpg" alt="" width="1920" height="603" srcset="https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920.jpg 1920w, https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920-300x94.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920-768x241.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2018/08/gull-1090835_1920-1024x322.jpg 1024w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></a></p>
<p>Visitors will be able to talk to the core developer team of privacyIDEA and see the new features of the upcoming release 2.23, including <strong>Monitoring and Statistics</strong> and <strong>Pre-Event Handler</strong>. Once again these implementations will prove, that privacyIDEA is the most flexible two factor authentication system. The administrator can define freely which kind of values or event he wants to monitor. The pre-event handling opens unforeseen possibilties to design workflows like automagically enrolling Email tokens to the user just upon authentication.</p>
<p>Come and gape! The privacyIDEA booth is in the Mensa next to the ownCloud booth. And as privacyIDEA also integrates well with ownCloud, there will also be a workshop on integrating enterprise ready 2FA with the open file sharing solution on Sunday.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Run privacyIDEA with nginx reverse proxy</title>
		<link>https://www.privacyidea.org/run-privacyidea-nginx-reverse-proxy/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 27 Sep 2017 10:08:32 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[reverse proxy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1267</guid>

					<description><![CDATA[You can use nginx to act as a reverse proxy in front of any web application. Kenneth Cummings gave a talk at the ownCloud Conference 2017 how to combine different components to setup such a 2FA reverse proxy. &#160; Watch this video on YouTube.]]></description>
										<content:encoded><![CDATA[<p>You can use nginx to act as a reverse proxy in front of any web application.</p>
<p>Kenneth Cummings gave a talk at the ownCloud Conference 2017 how to combine different components to setup such a 2FA reverse proxy.</p>
<p>&nbsp;</p>
<p><a href="https://www.privacyidea.org/run-privacyidea-nginx-reverse-proxy/"><img decoding="async" src="https://www.privacyidea.org/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2F39SES-DheBM%2Fhqdefault.jpg" alt="YouTube Video"></a><br /> <a href="https://youtu.be/39SES-DheBM" target="_blank">Watch this video on YouTube</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2FA Workshop at tuebix</title>
		<link>https://www.privacyidea.org/2fa-workshop-tuebix/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 22 Jun 2017 10:14:51 +0000</pubDate>
				<category><![CDATA[documentation]]></category>
		<category><![CDATA[events]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[LDAP]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[Univention Corporate Server]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1226</guid>

					<description><![CDATA[We are at Tübix 2017 and doing a workshop about adding a 2nd Factor to your applications. If you can not attend or if you want to try this at home afterwards, here is what we will do! Setup 10.0.2.201 ucs.tuebix.intranet (LDAP) Univention Corporate Server 4.2 10.0.2.202 privacyidea.tuebix.intranet, Ubuntu 16.04 LTS 10.0.2.203 wordpress.tuebix.intranet, Ubuntu 16.04 LTS [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We are at <a href="http://www.tuebix.org/2017/programm/cornelius-koelbel-mehr-faktor-authentifizierung-nicht-nur-fuer-die-eigene-cloud/" target="_blank" rel="noopener noreferrer">Tübix 2017</a> and doing a workshop about adding a 2nd Factor to your applications.</p>
<p>If you can not attend or if you want to try this at home afterwards, here is what we will do!</p>
<h2>Setup</h2>
<p>10.0.2.201 ucs.tuebix.intranet (LDAP) Univention Corporate Server 4.2<br />
10.0.2.202 privacyidea.tuebix.intranet, Ubuntu 16.04 LTS<br />
10.0.2.203 wordpress.tuebix.intranet, Ubuntu 16.04 LTS with latest wordpress<br />
10.0.2.204 owncloud.tuebix.intranet, Ubuntu 16.04 LTS with ownCloud 10</p>
<h3>LDAP</h3>
<p>BaseDN: cn=users,dc=tuebix,dc=intranet</p>
<p>The UCS has the following users:</p>
<ul>
<li>admininistrator</li>
<li>user1</li>
<li>user2</li>
<li>user3</li>
</ul>
<h3>ownCloud</h3>
<p>ownCloud is connected via LDAP, so the LDAP users can connect to ownCloud.</p>
<p>The ownCloud Administrator is called: admin</p>
<h3>WordPress</h3>
<p>WordPress only has internal users. Nevertheless the user are also called:</p>
<ul>
<li>administrator</li>
<li>user1</li>
<li>user2</li>
<li>user3</li>
</ul>
<h2>What we will do &#8211; our Agenda</h2>
<ul>
<li>We will install privacyIDEA and connect privacyIDEA to the UCS, so that privacyIDEA knows the users from the LDAP directory</li>
<li>Then we will enroll different kind of tokens to the users.
<ul>
<li>The administrator can enroll a token for the users but</li>
<li>users can also login to the webui with their LDAP password an enroll a token for themselves.</li>
</ul>
</li>
<li>Then we start connecting <strong>applications</strong> to privacyIDEA to add <strong>2FA</strong> to the <strong>applications</strong>
<ul>
<li>WordPress with &#8220;strong authentication&#8221; plugin</li>
<li>ownCloud with the &#8220;privacyIDEA ownCloud App&#8221; from the market place</li>
<li>SSH login with 2FA for users user1, user2, user3</li>
</ul>
</li>
</ul>
<h2>privacyIDEA</h2>
<h3>Install</h3>
<p>privacyIDEA can be <a href="http://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noopener noreferrer">installed</a> in many different ways on different Linux distributions. We will install privacyIDEA on our Ubuntu 16.04 machine 10.0.2.202.</p>
<p>As root:</p>
<pre>add-apt-repository ppa:privacyidea/privacyidea

apt update

apt install privacyidea-apache2</pre>
<p>privacyidea-apache2 is a meta package which will install MySQL, Apache and set up privacyIDEA. Finally we only need to create the first token administrator.</p>
<pre>pi-manage add admin super</pre>
<p>Now we have an administrator called &#8220;super&#8221;</p>
<h3>Configure</h3>
<p>privacyIDEA can be configured via command line, API or the web UI.</p>
<p><a href="https://10.0.2.202" target="_blank" rel="noopener noreferrer">https://10.0.2.202</a></p>
<p>We need to configure the Resolver <strong>tuebix_users</strong> as Active Directory. For this we need to fetch the certificate of the UCS server.</p>
<ul>
<li>LDAP Resolver to ldaps://ucs.tuebix.intranet</li>
<li>Base DN cn=users,dc=tuebix,dc=intranet</li>
<li>Bind DN cn=administrator,cn=users,dc=tuebix,dc=intranet</li>
<li>Preset AD</li>
</ul>
<p>And a Realm <strong>tuebix</strong> with the resolver <strong>tuebix_users</strong>.</p>
<p>We can also take a look at the policies and configure a policy to use otppin=userstore.</p>
<h3>Enroll tokens</h3>
<p>Enroll tokens as administrator and as normal user&#8230;</p>
<ul>
<li>Enroll Smartphone App</li>
<li>Yubikey</li>
<li>U2F Token</li>
<li>Feitian C200 (import File Feitian.csv)</li>
</ul>
<h2>ownCloud with 2FA</h2>
<p>For ownCloud X we login as administrator and install the &#8220;privacyIDEA ownCloud App&#8221; from the Marketplace.</p>
<p>We need to configure the App against privacyIDEA:</p>
<ul>
<li>https://privacyidea.tuebix.intranet</li>
<li>no realm</li>
<li>no ssl check</li>
</ul>
<p><strong>Note:</strong> The privacyIDEA ownCloud App will authenticate <strong>all</strong> users with a 2nd factor!</p>
<p>After this, users need to present a 2nd factor against privacyIDEA when they log in.</p>
<h2>WordPress with 2FA</h2>
<p>Install the &#8220;strong authentication&#8221; plugin.</p>
<p>We need to configure the Plugin against privacyIDEA:</p>
<ul>
<li>https://privacyidea.tuebix.intranet&#8230;</li>
</ul>
<p><strong>Note:</strong> Users need to enter both factors in the password field at the same time.</p>
<p>The WordPress plugin authenticates users <strong>only</strong> against privacyIDEA; while with ownCloud users are authenticated by ownCloud and by privacyIDEA.</p>
<h2>SSH with 2FA</h2>
<p>On either owncloud machine or wordpress machine we install the privacyIDEA PAM module:</p>
<pre>add-apt-repository ppa:privacyidea/privacyidea

apt update

apt install privacyidea-pam</pre>
<p>&#8230;and configure it accordingly against https://privacyidea.tuebix.intranet.</p>
<p><strong>Note</strong>: Users need to match!</p>
<h2>privacyIDEA LDAP Proxy</h2>
<p>Bonus!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.17 &#8211; More Event Handling and improved Challenge Response</title>
		<link>https://www.privacyidea.org/privacyidea-2-17-event-handling-improved-challenge-response/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 11:03:50 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[ownCloud]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1116</guid>

					<description><![CDATA[We are happy to annouce that we released privacyIDEA 2.17 today! The new version is available via launchpad and pypi. privacyIDEA the event juggler privacyIDEA can handle events. It all started with a simple notification, but now privacyIDEA can juggle actions and events like a pro. In privacyIDEA there are two new event handler modules, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We are happy to annouce that we released privacyIDEA 2.17 today!</p>
<p>The new version is available via <a href="https://www.privacyidea.org/downloads/">launchpad and pypi.</a></p>
<h2>privacyIDEA the event juggler</h2>
<p><figure id="attachment_1120" aria-describedby="caption-attachment-1120" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/12/apple-1216853_640.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-1120" src="https://www.privacyidea.org/wp-content/uploads/2016/12/apple-1216853_640-300x193.jpg" alt="privacyIDEA the event juggler" width="300" height="193" srcset="https://www.privacyidea.org/wp-content/uploads/2016/12/apple-1216853_640-300x193.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/12/apple-1216853_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1120" class="wp-caption-text">privacyIDEA the event juggler</figcaption></figure></p>
<p>privacyIDEA can handle events. It all started with a simple notification, but now privacyIDEA can juggle actions and events like a pro. In privacyIDEA there are two new event handler modules, which will help you to automate your processes a lot. If you can think of more, <a href="https://github.com/privacyidea/privacyidea/issues/new" target="_blank">drop an issue at github</a>!</p>
<h3>Token Event Handler</h3>
<p>As a reaction to typical events the administrator can define new actions on the corresponding token. These actions can be &#8220;set tokenrealm&#8221;, &#8220;delete&#8221;, &#8220;unassign&#8221;, &#8220;disable&#8221;, &#8220;enable&#8221;, &#8220;enroll&#8221;, &#8220;set description&#8221;, &#8220;set validity&#8221;. You could e.g. disable all newly enrolled tokens, so that first the user has somehow to confirm the reception of his device and then enable the token again. Or you could set the validity period based on the number of failed authentication requests.</p>
<p>I am sure, this will also help to streamline and automate your processes! See the <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/tokenhandler.html" target="_blank">documentation of the Token Event Handler</a>.</p>
<h3>Script Event Handler</h3>
<p><figure id="attachment_1121" aria-describedby="caption-attachment-1121" style="width: 195px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2016/12/iron-man-704046_640.jpg"><img loading="lazy" decoding="async" class=" wp-image-1121" src="https://www.privacyidea.org/wp-content/uploads/2016/12/iron-man-704046_640-300x200.jpg" alt="privacyIDEA 2.17 is about rock solid automation!" width="195" height="130" srcset="https://www.privacyidea.org/wp-content/uploads/2016/12/iron-man-704046_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/12/iron-man-704046_640.jpg 640w" sizes="auto, (max-width: 195px) 100vw, 195px" /></a><figcaption id="caption-attachment-1121" class="wp-caption-text">privacyIDEA 2.17 is about rock solid automation!</figcaption></figure></p>
<p>The Script Event Handler Module is a monster, which limits we can not know at the moment. Yes, you can run external scripts in case of any events. The scripts have to be located in the privacyIDEA script directory and they can take several parameters like the token serial number or the username. This way you can create processes and actions outside of privacyIDEA and that have no limits. The documentation contains a <a href="http://privacyidea.readthedocs.io/en/latest/eventhandler/scripthandler.html" target="_blank">full list of parameters</a> and the location of the the script directory.</p>
<h2>Improved Challenge Response with SMS</h2>
<p>In case of Challenge Response privacyIDEA requires the user to authenticate with his OTP PIN. Then privacyIDEA will send the SMS or the Email. In certain cases this does not work well. So with <a href="http://privacyidea.readthedocs.io/en/latest/modules/api/validate.html#post--validate-triggerchallenge" target="_blank">privacyIDEA 2.17 the REST API was enhanced</a>, that an SMS can also be sent without the users PIN but with an administrators interaction. This API will be used with the <a href="https://netknights.it/en/produkte/privacyidea-owncloud-app/" target="_blank">privacyIDEA ownCloud App</a>. This way privacyIDEA and ownCloud or Nextcloud can also be used with SMS or Email Tokens.</p>
<h2>Enhanced Resolver logic in policies</h2>
<p><figure id="attachment_1123" aria-describedby="caption-attachment-1123" style="width: 188px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/12/baby-772441_640.jpg"><img loading="lazy" decoding="async" class="wp-image-1123 " src="https://www.privacyidea.org/wp-content/uploads/2016/12/baby-772441_640-e1483008997246-300x220.jpg" alt="The same user in two resolvers - allows for more detailed policies." width="188" height="138" srcset="https://www.privacyidea.org/wp-content/uploads/2016/12/baby-772441_640-e1483008997246-300x220.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/12/baby-772441_640-e1483008997246.jpg 499w" sizes="auto, (max-width: 188px) 100vw, 188px" /></a><figcaption id="caption-attachment-1123" class="wp-caption-text">The same user in two resolvers &#8211; allows for more detailed policies.</figcaption></figure></p>
<p>If a user in a realm exists in more than one resolver, privacyIDEA uses the resolvers priorities to determine the resolver should be used to identify the user for authentication. All policies would be checked against this user in this resolver.</p>
<p>With privacyIDEA 2.17 it is now possible to tell the policy framework, that also policies should be checked, if the user matches another resolver than this primary one. This way a user in the main resolver could authenticate, but a secondary resolver could be used to match detailed policies.</p>
<p>We do not expect the everage user to understand this <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>If you want to dive into this, you may want to read <a href="http://privacyidea.readthedocs.io/en/latest/policies/index.html?highlight=secondary" target="_blank">the documentation</a> and then the <a href="https://github.com/privacyidea/privacyidea/issues/543" target="_blank">issue #543</a>.</p>
<h2>Changelog for privacyIDEA 2.17</h2>
<h3>Features</h3>
<ul>
<li>Token Handler. Using the token handler the administrator can defined actions in response to events, to modify tokens like deleting, modifying, initilizing&#8230; tokens (#532)</li>
<li>Script Event Handler or Shell Event Handler allows to trigger an external shell script, if some event occurs. (#536)</li>
<li>Add additional endpoint to trigger a challenge response like the sending of an SMS, if the token PIN is not available (#531)</li>
<li>Policy Handling to also check for secondary resolvers of a user. This way a user can authenticate with his primary resolver but policy will also work for secondary resolvers (#543)</li>
</ul>
<h3>Enhancements</h3>
<ul>
<li>The event handler conditions also determine a serial number even if there is no serial number in the request:<br />
If the user from the request only has one token assigned. (#571)</li>
<li>Allow event definitions to be disabled (#537)</li>
<li>Allow event to be addressed by a destinct name (#522)</li>
<li>Improving LDAP performace by addressing different functionality of ldap3 version 1.x and 2.x. (#549)</li>
<li>Improve SQL Audit by adding the SQL Audit table to the schema. Table is not created during HTTP request. (#557)</li>
<li>Limit audit log entry age. Users may only view audit log entries up to a certain age. (#541)</li>
<li>Add checkbox to only display used actions in a policy (#573)</li>
<li>In event handler: Use serial number of a user&#8217;s token if the user has only one token (#571)</li>
<li>Download a filtered audit log (#539)</li>
</ul>
<h3>Fixes</h3>
<ul>
<li>Add missing token serial number to audit log if token is deleted (#546)</li>
<li>Fix event handler saving (#551)</li>
<li>HttpSMSProvider accepts status codes 201 and 202 in addition to 200 (#562)</li>
<li>Fix checkbox bug in NOREFERRALS of LDAP resolver (#563)</li>
<li>Add documentation for SMS provider (#566)</li>
<li>Remove 301 redirects from WebUI (#576)</li>
</ul>
<h2>privacyIDEA Enterprise Edition</h2>
<p><figure id="attachment_1122" aria-describedby="caption-attachment-1122" style="width: 300px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2016/12/netknights-999x300.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1122" src="https://www.privacyidea.org/wp-content/uploads/2016/12/netknights-999x300-300x90.png" alt="privacyIDEA Enterprise Edition by NetKnights" width="300" height="90" srcset="https://www.privacyidea.org/wp-content/uploads/2016/12/netknights-999x300-300x90.png 300w, https://www.privacyidea.org/wp-content/uploads/2016/12/netknights-999x300-768x231.png 768w, https://www.privacyidea.org/wp-content/uploads/2016/12/netknights-999x300.png 999w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1122" class="wp-caption-text">privacyIDEA Enterprise Edition by NetKnights</figcaption></figure></p>
<p>If you need enterprise level support and dedicated service level agreements <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank">drop by at NetKnights</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enterprise 2FA on Nextcloud with privacyIDEA</title>
		<link>https://www.privacyidea.org/enterprise-2fa-nextcloud-privacyidea/</link>
					<comments>https://www.privacyidea.org/enterprise-2fa-nextcloud-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 24 Aug 2016 14:27:23 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Nextcloud]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1018</guid>

					<description><![CDATA[Cornelius will give a workshop to add privacyIDEA App to Nextcloud to secure the login process at Nextcloud with a 2nd factor. This will occur at the Nextcloud conference in Berlin in September. Since the 2nd factors can be managed within privacyIDEA, these can also be used throughout the complete network or your whole company. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cornelius will <a href="https://conf.nextcloud.com/conference/NextcloudConference2016/program/proposal/3" target="_blank">give a workshop to add privacyIDEA App to Nextcloud</a> to secure the login process at Nextcloud with a 2nd factor. This will occur at the Nextcloud conference in Berlin in September.</p>
<p>Since the 2nd factors can be managed within privacyIDEA, these can also be used throughout the complete network or your whole company.</p>
<p>privacyIDEA <a href="https://www.privacyidea.org/about/features/">supports a whole lot more authentication devices</a> in addition to TOTP.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/enterprise-2fa-nextcloud-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA talk at ownCloud contributor conference</title>
		<link>https://www.privacyidea.org/privacyidea-talk-owncloud-contributor-conference/</link>
					<comments>https://www.privacyidea.org/privacyidea-talk-owncloud-contributor-conference/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 24 Aug 2016 14:05:15 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[ownCloud]]></category>
		<category><![CDATA[talk]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1014</guid>

					<description><![CDATA[Cornelius will give a talk at the ownCloud contributor conference in Berlin on September 11th. Authentication at ownCloud has gone a long way. In version 9.1 finally a new API was introduced to add a second factor. Although the problem is still, that authentication can not be completely passed to the external authentication system. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cornelius will give a <a href="https://conference.owncloud.org/conference/oCC2016/program/proposal/134" target="_blank">talk at the ownCloud contributor conference in Berlin on September 11th</a>. Authentication at ownCloud has gone a long way. In version 9.1 finally a new API was introduced to add a second factor.</p>
<p>Although the problem is still, that authentication can not be completely passed to the external authentication system. The user has to provide his ownCloud password first and then will be redirected to a 2nd-Factor-App.</p>
<p>Cornelius is talking about the development of such an app in the new framework and what needs to be done. Finally the privacyIDEA App emerged, <a href="https://netknights.it/en/produkte/privacyidea-owncloud-app/" target="_blank">which at the moment is only available via NetKnights</a>. This App forwards the credentials of the second factor (usually a one time password) to the privacyIDEA backend.</p>
<p>See you in Berlin!</p>
<p><a href="https://www.privacyidea.org/privacyidea-talk-owncloud-contributor-conference/"><img decoding="async" src="https://www.privacyidea.org/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FLgum_cTY_Y8%2Fhqdefault.jpg" alt="YouTube Video"></a><br /> <a href="https://youtu.be/Lgum_cTY_Y8" target="_blank">Watch this video on YouTube</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-talk-owncloud-contributor-conference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The truth behind privacyIDEA and ownCloud two factor authentication</title>
		<link>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/</link>
					<comments>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sun, 24 Jul 2016 21:48:59 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[ownCloud]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=993</guid>

					<description><![CDATA[I understand there is a bit of confusion about two factor authentication with privacyIDEA for ownCloud. Comments in ownCloud blogpost and in the privacyIDEA Youtube channel indicate this. To do openess and transparancy the honour I would like to elaborate on what has happened. The empire strikes back The subdirectory authmodules in the privacyIDEA github repository contained [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I understand there is a bit of confusion about two factor authentication with privacyIDEA for ownCloud. <a href="https://owncloud.org/blog/new-in-owncloud-9-1/#comment-78325" target="_blank">Comments in ownCloud blogpost</a> and in the <a href="https://www.youtube.com/watch?v=Lgum_cTY_Y8" target="_blank">privacyIDEA Youtube channel</a> indicate this.</p>
<p>To do openess and transparancy the honour I would like to elaborate on <strong>what has happened</strong>.</p>
<h3>The empire strikes back</h3>
<p>The subdirectory <a href="https://github.com/privacyidea/privacyidea/tree/master/authmodules" target="_blank"><em>authmodules</em> in the privacyIDEA github repository</a> contained a module for ownCloud. In ownCloud speak an &#8220;app&#8221;. This tried to support ownCloud 8. It failed with ownCloud 9. This was due to the fact, that ownCloud &lt;= 9 had no concept or API for attaching two factor authentication system. It even had no concept of passing authentication to another module. It only allowed to change the <em>complete</em> user module. I.e. authentication, user existance and authorization was not separated like you would be used to e.g. from PAM. And this is why providing a module for two factor authentication for ownCloud 8 and 9 was the biggest pain in the ass I ever experienced.</p>
<p>Now several simple users came around and popped up on the mailing list or at github. I call them simple, because they were not able to look behind the scenes, analyze problems, look at a line of code or even add a line of code. I experienced several occasions when such users complained about, that the old privacyIDEA &#8220;app&#8221; for 8 and 9 was not working as <em>they</em> expected.</p>
<p>Finally I got really sick of those users with this simple cosuming attitude. I got sick of claiming having a two factor solution for an application, which did not provide a decently designed and documented authentication interface. And this is why I happily deleted the old ownCloud plugin from the privacyIDEA github repository.</p>
<h3>A new hope</h3>
<p>Finally, ownCloud 9.1 was said to come with a new authentication API &#8211; <strong>which unfortunately again was designed without asking someone, who knows some things about two factors &#8212; like me! Big mistake!</strong> Nevertheless &#8211; I decided to give it a second chance. Thanks to the help of <a href="https://twitter.com/ChristophWurst" target="_blank">Christoph Wurst</a> and <a href="https://twitter.com/Deep_Diver_1975" target="_blank">Thomas Müller</a> I was able to implement a <a href="https://www.youtube.com/watch?v=Lgum_cTY_Y8" target="_blank">new privacyIDEA ownCloud</a> app for ownCloud 9.1.</p>
<p>As I am still very disappointed in any kind of &#8220;community&#8221; regarding the old ownCloud app (for privacyIDEA itself it is a complete other picture!!!), the privacyIDEA ownCloud App for 9.1 is not publically available, yet. I don&#8217;t want to hear any comsumers complaining about things they don&#8217;t understand or are not willing to dive into! But this is no problem. ownCloud users with a handful of accounts can happily use the TOTP app which probably willl run very well for them.</p>
<p>These words might sound hard to some of you. But you may appreciate that they are the real truth of mine!</p>
<h3>The return of the Jedi</h3>
<p>Power users or companies with many users have different requirements. They will also do two factor authentication a the firewall, at portals, terminal servers or the VPN. In this case it makes no sense to manage TOTP tokens within ownCloud. Because these tokens can not be used for the VPN. Other tokens would again have to be managed for the VPN somewhere else&#8230; And for the terminal servers&#8230;</p>
<p>Enterprise environments require to manage the tokens of the users at one central place. All users, for all applications. In this case privacyIDEA and the privacyIDEA ownCloud app make absolute sense. Customers should <a href="https://netknights.it/en/unternehmen/kontakt/" target="_blank">contact NetKnights GmbH</a>, because this is the place <a href="https://netknights.it/en/produkte/privacyidea-owncloud-app/" target="_blank">where they will receive the privacyIDEA ownCloud App</a>!</p>
<p>Kind regards</p>
<p>Cornelius</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
