<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Policies &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/policies/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 08 Jun 2021 08:07:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Policies &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 3.6 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-6-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-6-released/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 08:32:19 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Custom Attributes]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2271</guid>

					<description><![CDATA[Custom User Attributes and Token Attributes in Policies allow for more control We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Custom User Attributes and Token Attributes in Policies allow for more control</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg"><img fetchpriority="high" decoding="async" width="1024" height="682" src="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg" alt="" class="wp-image-2273" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1536x1024.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional possibilities to manage the users and to manage the user rights. These user attributes can be used within privacyIDEA policies. In addition policies can now also contain any token attribute like tokentype or fail counter. These attributes and policy conditions help administrators to keep control in larger setups by logically grouping users and tokens.</em></p>



<h3 class="wp-block-heading">Policies with Custom User Attributes and Token Attributes </h3>



<p>privacyIDEA is no Identity Management. Users are usually managed in an IdM, or only in LDAP or Active Directory. Nevertheless it can be important to add attributes to users &#8211; in case the token administrator has no access rights to the IdM or user directory. The administrator can now do so in privacyIDEA 3.6 using custom user attributes. The administrator can even allow users to manage their own attributes. This way the user can e.g. update his mobile number himself, without the need to contact the help desk or the administrator.</p>



<p>Based on these user attributes the administrator can now define policies and thus the access rights can be tuned in more detail.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png"><img decoding="async" width="956" height="439" src="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png" alt="" class="wp-image-2276" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png 956w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-300x138.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-768x353.png 768w" sizes="(max-width: 956px) 100vw, 956px" /></a><figcaption>The token administrator can set the mobile number of the user.</figcaption></figure>



<p>In addition policies can now have conditions on each and every token attribute like description, serial, tokentype, otp length, maximum failcounter, failcounter, active state and more.</p>



<p>This way the administrator could allow helpdesk users to only delete tokens, that have previously been disabled by the user himself. Possibilities are endless.</p>



<h3 class="wp-block-heading">Simple PUSH Token</h3>



<p>Starting with privacyIDEA 3.0 we introduced the <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/" data-type="post" data-id="1533">PUSH token</a>. If everything works out fine, the PUSH token can work like a charm. But setting it up is quite complicated. Also the Push services by Google and Apple actually do not work that reliably. With privacyIDEA 3.6 the administrator can now configure the PUSH token to only work in a polling method. In this scenario no external 3rd party service is needed and the user&#8217;s smartphone only communicates with the privacyIDEA server.</p>



<p>By giving up some comfort such a setup can gain stability and improve the privacy aspect.</p>



<h3 class="wp-block-heading">Token Rollover</h3>



<p>The administrator can now configure a WebUI policy to allow users to roll over their tokens. This means that the key material is generated anew and the user can enroll the token again, e.g. by scanning a new QR code. This comes in handy, if the user is only allowed to have one token, but wants to move his token to a new smartphone or if the company decides to increase the key size of the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png"><img decoding="async" width="1024" height="260" src="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png" alt="" class="wp-image-2280" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-300x76.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-768x195.png 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png 1119w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption>The user can regenerate the seed of his existing token: Rollover.</figcaption></figure>



<h3 class="wp-block-heading">Enhancements</h3>



<p>Besides these main features there are a lot of enhancements. The administrator can use pi-manage to export and import the system configuration. This can be used to move configuration from testing environments to productive environments. You can have different PIN policies for different tokentypes. </p>



<p>In pi.cfg the system administrator can define a custom entry point for the WebUI. This way you can create your complete own WebUI without changing anything in the code.</p>



<p>The token janitor received several improvements. It can export arbitrary user attributes, the seed can either be exported in hex or base32 to increase the interoperability with other MFA systems. The token export can now also contain the user assignment. This way tokens can easily be transferred between different privacyIDEA installations.</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Changelog at Github</a>.</p>



<h3 class="wp-block-heading">Availability</h3>



<p>You can download privacyIDEA 3.6 from Github or install it from the Python Package Index. For easy deployment you can use the community repositories for Ubuntu 16.04, 18.04 and 20.04. You can find the installation guidline in the <a rel="noreferrer noopener" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">online documentation</a>. If you are updating, it is crucial to read the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, which contains important information about LDAP resolvers and TLS.</p>



<p>If you want to get involved, be sure to drop by at the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a>. You can also take a look at Weblate, were the community can translate to different languages. We are grateful for the community effort to be able to ship translations in Dutch and French!</p>



<p>For mission critical scenarios the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener">company NetKnights provides an Enterprise Edition with Support</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-6-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Multi-Factor Authentication privacyIDEA 3.5 released</title>
		<link>https://www.privacyidea.org/multi-factor-authentication-privacyidea-3-5-released/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 22 Dec 2020 00:08:21 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[4eyes]]></category>
		<category><![CDATA[Dashboard]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[smartcards]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2223</guid>

					<description><![CDATA[Gaining higher security with smartcards and Four-Eyes-Tokens Today we put privacyIDEA 3.5 under your Christmas tree. Unwrap it and you will find a lot of enhancements. One of the most important features is that version 3.5 does the first step to also support smartcard management. For high security environments we drastically imrpoved the workflow of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Gaining higher security with smartcards and Four-Eyes-Tokens</strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1024x699.jpg" alt="" class="wp-image-2225" width="933" height="637" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1024x699.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-300x205.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-768x524.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-1536x1048.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2020/12/A-smartcard-in-a-notebook-2048x1397.jpg 2048w" sizes="auto, (max-width: 933px) 100vw, 933px" /></figure></div>



<p><em>Today we put privacyIDEA 3.5 under your Christmas tree. Unwrap it and you will find a lot of enhancements. One of the most important features is that version 3.5 does the first step to also support smartcard management. For high security  environments we drastically imrpoved the workflow of Four-Eyes-Tokens.</em></p>



<h2 class="wp-block-heading">Let&#8217;s do this togeather &#8211; Four-Eyes-Tokens</h2>



<p>Using the Four-Eyes-Tokens the administrator can define how many users from several different groups should come togeather when the account &#8211; the holder of the Four-Eyes-Token &#8211; wants to authenticate. This way you can define, that this account worthy of protection can only be used if e.g. two IT administrators and one member of the works council come togeather and use their own 2nd factors to authenticate.</p>



<p>The Four-Eyes-Token has been around for a while in privacyIDEA. But now we are using the <a href="https://www.privacyidea.org/privacyidea-3-4-released/">Multi</a><a href="https://www.privacyidea.org/privacyidea-3-4-released/" target="_blank" rel="noreferrer noopener">&#8211;</a><a href="https://www.privacyidea.org/privacyidea-3-4-released/">Challenge</a>, that was introduced in privacyIDEA 3.4, to heavily improve the workflow and authentication flow. It is totally transparent to our application plugins and the RADIUS protocol, so that it can be used e.g. with Citrix Netscaler.</p>



<figure class="wp-block-gallery columns-2 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="854" height="451" src="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png" alt="" data-id="2229" data-full-url="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png" data-link="https://www.privacyidea.org/?attachment_id=2229" class="wp-image-2229" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1.png 854w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1-300x158.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-01-1-768x406.png 768w" sizes="auto, (max-width: 854px) 100vw, 854px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="702" height="378" src="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02.png" alt="" data-id="2228" data-link="https://www.privacyidea.org/?attachment_id=2228" class="wp-image-2228" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02.png 702w, https://www.privacyidea.org/wp-content/uploads/2020/12/4Augen-Citrix-02-300x162.png 300w" sizes="auto, (max-width: 702px) 100vw, 702px" /></figure></li></ul><figcaption class="blocks-gallery-caption">Several persons want to login as &#8220;administrator@highsecurity&#8221;. <br>So in the first step the first person uses his credentials and 2nd factor. Then in a 2nd step the second user is asked for his credentials and 2nd factor.</figcaption></figure>



<h2 class="wp-block-heading">Do not copy, rather sign! &#8211; PIV smartcards with privacyIDEA</h2>



<p>Smartcards are interesting devices, that have certain disadvantages in handling but also come with advantages and features, that allow for completely other use cases like offline authentication, decryption or document signing.</p>



<p>privacyIDEA was already capable of enrolling and manageing x509v3 user certificates. As a first step to better support smartcards, privacyIDEA 3.5 now can require that certificate requests are generated on a PIV smartcard. This is done by<br>using policies to force the presence of an attestation certificate during enrollment. The attestation certificate confirms, that actually the key pair was generated on a smartcard and there is no copy of the private key.</p>



<p>This was successfully done with the Yubikey 5 and a corresponding enrollment tool. We will continue working on imrpoving the privacyIDEAs smartcard capabilities.</p>



<h2 class="wp-block-heading">Make the admin&#8217;s life easier &#8211; serveral enhancements</h2>



<h4 class="wp-block-heading">Tokens</h4>



<p>The Push token gets a lot of feedback in the community. So we are continuously improving it. User certain conditions a smartphone device can renew its firebase token, that is used to communicate with Google&#8217;s firebase push service. The smartphone app can now contact the privacyIDEA server to update this firebase token.</p>



<p>The registration token is a long &#8220;registration code&#8221;, that can be used to authenticate once during enrollment processes. The admin can now configure a policy to define the length and contents of the registration code.</p>



<p>A Webauthn token <a rel="noreferrer noopener" href="https://www.w3.org/TR/webauthn/#sign-counter" target="_blank">should also provide a signature counter</a>, that is used to identify and avoid cloned tokens. However, not all cheap devices implement this. privacyIDEA now also allows to use Webauthn tokens without a signature counter on demand.</p>



<p>Hardware tokens come with a seed file. privacyIDEA can import a lot of different formats, also PSKC which is defined in RFC6030. The import of PSKC files now also verifies the MAC of the token secrets.</p>



<p>The questionnaire token can now ask more than one question during the authentication process.</p>



<h4 class="wp-block-heading">Event handlers and policies</h4>



<p>The policies may now contain additional extened conditions from the tokeninfo attributes. This can be any arbitrary  attribute, so that the admin could define policies, that e.g. allow the authentication at certain applications with a hardware token but not with a software token. </p>



<p>The Tokenhandler can choose the SMS Gateway Identifier or the SMTP Identifier when enrolling an SMS or respectively an Email token.</p>



<p>The Tokenhandler can now increase and decrease the fail counter and also set the Maxfail counter.</p>



<h4 class="wp-block-heading">The Web UI</h4>



<p>Several enhancements allow a smoother work experience for administrators and service desk users. The admin can define a policy to hide certain columns in the audit log. This way the service desk users only see this information, which they really need. Also, the audit log contains the start time, the end time and the duration of a request. This way it is easy to filter or search for long running requests to debug authentication problems. In the dashboard the usernames of the users with failed authentications are displayed with a short link to their user details. This helps the service desk to immidiately find failing users and offer quickers support.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="586" height="249" src="https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user.png" alt="" class="wp-image-2231" srcset="https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user.png 586w, https://www.privacyidea.org/wp-content/uploads/2020/12/dashboard-failed-user-300x127.png 300w" sizes="auto, (max-width: 586px) 100vw, 586px" /><figcaption>The sercice desk user can see the failed user&#8217;s details directly by clicking on the linked username.</figcaption></figure></div>



<p>The WebUI now supports the PIN change via multi-challenge response.</p>



<p>The conditions for event handlers and actions for policies have been redesigned to make them look the same and easily searchable.</p>



<h4 class="wp-block-heading">Managing privacyIDEA</h4>



<p>In certain setups you might have a testing environment, a staging environment and a production environment. Configuration changes are often first tested in the testing environment and then transferred to the staging and production environment.</p>



<p>The pi-manage script has a new sub command to export and import resolver configuration, that will help in such scenarios.</p>



<p>The full list of features, enhancements and fixes can be found in the <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog">Changelog</a>.</p>



<h2 class="wp-block-heading">Get privacyIDEA</h2>



<p>privacyIDEA is an enterprise grade, extremely flexible multi-factor authentication system, that can adapt to your needs and  that lets you automate a lot of tasks. Using privacyIDEA will increase your security. Migrating from other mult-factor<br>systems to privacyIDEA will ease your life. People have done this and dropped many well-known, but old and crusty authentication systems. Take a look at privacyIDEA and join the community.</p>



<p>It is freely available via the <a href="https://privacyidea.readthedocs.io/en/latest/installation/pip.html">Python package index</a> and via community repositories for <a href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html">Ubuntu LTS 16.04, 18.04 and 20.04</a>.</p>



<p>The company NetKnights provides an <a href="https://netknights.it/en/produkte/privacyidea/">Enterprise Edition</a> with Service Level Agreements and stable packages for Ubuntu LTS and Red Hat Enterprise Linux/CentOS.</p>



<p>If you want to stay tuned, join the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a> or subscribe the <a rel="noreferrer noopener" href="https://netknights.it/en/newsletter/" target="_blank">NetKnights&#8217; newsletter</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.2 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-2-individual-workflows/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 02 Dec 2019 06:05:00 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[Policies]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1675</guid>

					<description><![CDATA[Flexible and individual Workflows Today we release privacyIDEA 3.2. Two new event handler modules allow for even more flexible workflows. Integrating with external logging tools like Logstash or Splunk are much easier now using the container audit module and the file audit module. Using Trusted JWTs makes it much more robust to integrate any existing [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Flexible and individual Workflows</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-1024x576.jpg" alt="" class="wp-image-1684" srcset="https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-1024x576.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-300x169.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-768x432.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-1536x864.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-1110x624.jpg 1110w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920-528x297.jpg 528w, https://www.privacyidea.org/wp-content/uploads/2019/11/fractal-1765218_1920.jpg 1920w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><em>Today we release privacyIDEA 3.2. Two new event handler modules allow for even more flexible workflows. Integrating with external logging tools like Logstash or Splunk are much easier now using the container audit module and the file audit module. Using Trusted JWTs makes it much more robust to integrate any existing portal with privacyIDEA.</em></p>



<h3 class="wp-block-heading">Request and Response Event Handler</h3>



<p>The event handlers have been around sind version 2.12. Every version somehow improved the event handler. They allow for a very flexible way to define actions and responses in privacyIDEA. Read a recent post about the <a href="https://www.privacyidea.org/privacyidea-flexibility-in-the-very-genes/">script event handler</a> or take a look at the <a rel="noreferrer noopener" aria-label="complete list of event handlers (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/eventhandler/index.html" target="_blank">complete list of event handlers</a>.</p>



<p>With version 3.2 the administrator gets two new event handlers &#8211; the Request Mangler Handler and the Response Mangler Handler. You notice the word <em>mangle</em> &#8211; these handler allow to modify, delete or add any arbitrary REST request parameter or JSON response parameter, given the administrator unseen flexibility to flex the privacyIDEA system to the very specific need!</p>



<p>The Response Handler could be used to delete certain response information, after it is used e.g. by a notification handler. For example the notification handler could read this information to notify the user but then the Response handler would delete this information, so that a help desk user is maybe not able to read a randomly set password in a response. The resulting possibilities are unimaginable.</p>



<p>We are very excited to see how administrators will use these features!</p>



<h3 class="wp-block-heading">Audit data everywhere</h3>



<p>privacyIDEA runs in big environments. Because it integrates so well. privacyIDEA also creates an Audit log (and a log file &#8211; for debugging purposes). However, the log file is great, since every HTTP request has its dedicated audit entry. </p>



<p>It should be easier to add the audit data to these locations, where bigger organizations aggregate and keep their Log data. These are systems and services like Logstash or Splunk. As a first step privacyIDEA 3.2 comes with two new audit modules, the File Audit Module, that can write audit information to a plain text/log file and a Container Audit Module, that can combine any number of Audit Modules, so that privacyIDEA can write audit data to all of these modules.</p>



<p>We hope that this is a big leap forward to get your information to the right place!</p>



<h3 class="wp-block-heading">The trusted JWTs</h3>



<p>Did you ever want to have users manage their privacyIDEA tokens in an existing local portal? Or your helpdesk users get privacyIDEA information into the ticket system they are using? With privacyIDEA 3.2 it gets much easier now. The administrator can define <a href="https://privacyidea.readthedocs.io/en/master/installation/system/inifile.html#trusted-jwts" target="_blank" rel="noreferrer noopener" aria-label="trusted JWTs (opens in a new tab)">trusted JWTs</a>. I.e. he can define trusted public keys and which user this public key can impersonate.</p>



<p>The mentioned portal will simply use its private key to create JWTs, that are then trusted by privacyIDEA. No need to create service accounts, share passwords or other credentials.</p>



<h3 class="wp-block-heading">The complete changelog</h3>



<p>There are a lot of new enhancements, which administrators and helpdesk users will probably like for a daily use. A lot of enhancements, which we needed to provide better and easier service for certain installations.</p>



<p>Besides the event handlers also policies have been improved. The administrator can now use any arbitrary HTTP header in the policy condition. This way policies could be strictly bound to certain http_agents. </p>



<p>To improve the roll out process, the event handlers can match for the roll out state of a token. The notification handler, that was already able to send email or SMS, can now also write files to a spool directory. This way information can be easily passed to 3rd party systems or this data can be processed further like printing PIN letters.</p>



<p>We also did some improvement of the authentication process for the PUSH token so that it is not necessary to require a service account to verify the answered challenges.</p>



<p>The complete changelog can be found at <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noreferrer noopener" aria-label="github (opens in a new tab)">github</a>.</p>



<h3 class="wp-block-heading">Go and get it</h3>



<p>privacyIDEA 3.2 can be installed from source from <a rel="noreferrer noopener" aria-label="github (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/" target="_blank">github</a>, via the <a rel="noreferrer noopener" aria-label="Python Package Index (opens in a new tab)" href="https://pypi.org/project/privacyIDEA/" target="_blank">Python Package Index</a> or using ready made packages for <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank">Ubuntu 16.04 LTS and 18.04 LTS</a>. The builds for Ubuntu are now based on Python 3.</p>



<p class="has-small-font-size">Image by <a href="https://pixabay.com/users/barbaraalane-756613/" target="_blank" rel="noreferrer noopener" aria-label="BarbaraALane (opens in a new tab)">BarbaraALane</a> on Pixabay.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
