<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Push Token &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/push-token/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Mon, 13 Jun 2022 09:06:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Push Token &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA Authenticator 4.0 with Push Poll</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-4-0-with-push-poll/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 13 Jun 2022 09:04:34 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2311</guid>

					<description><![CDATA[The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.]]></description>
										<content:encoded><![CDATA[
<p>The code of the privacyIDEA Authenticator App 4.0 as it is contained in the github repository has an important change in the Push functionality.</p>



<p>If you are not using your own source code but use the precompiled <a rel="noreferrer noopener" href="https://netknights.it/en/produkte/privacyidea-authenticator-app/" target="_blank">privacyIDEA Authenticator released by the company NetKnights</a>, this has the following meaning for you.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><a href="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png"><img fetchpriority="high" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png" alt="" class="wp-image-2313" width="593" height="395" srcset="https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein.png 1000w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-300x200.png 300w, https://www.privacyidea.org/wp-content/uploads/2022/06/Netknights_Titelbild_Authenticator_4-klein-768x512.png 768w" sizes="(max-width: 593px) 100vw, 593px" /></a></figure></div>



<p><br></p>



<h3 class="wp-block-heading">Breaking Change in Push-Functionality</h3>



<p>In order to increase the stability of the push functionality and the reliability of the delivery of the push messages, we decided to revise the configuration of the Firebase project. As of version 4.0, the app works with a central Firebase project that is managed by NetKnights.</p>



<p>That means your privacyIDEA server will no longer be able to notify the push tokens in the app version 4.0 via the Firebase project you have configure individually. To enable the new and more stable notification feature, you either need to recompile the App or get a subscription from NetKnights to gain access to the central Firebase project.</p>



<p>However, you can also use the precompiled and released Authenticator App without the need for a Firebase project. </p>



<h3 class="wp-block-heading">Using Push-Token without Firebase project</h3>



<p>In this scenario you will use the Push-Poll functionality, where the Authenticator polls the challenges from the privacyIDEA server. Users will have to have the privacyIDEA Authenticator App in the foreground to receive messages.</p>



<p>You need to proceed as follows.</p>



<ol class="wp-block-list"><li>Update the privacyIDEA server to version 3.7.1. This will ensure a flawless polling functionality</li><li>If not yet configured, create a policy in scope “Authentication” with the setting “push_allow_polling” = “allow”.</li><li>If not yet configured, create a policy in scope “Enrollment” with the setting “push_firebase_configuration” = “poll only”. </li><li>If you already have a “push_firebase_configuration” policy, change it to “poll only”.</li><li>To receive the Push notification, the user must open the privacyIDEA Authenticator. The notifications will be polled or the user can actively poll the notifications by swiping downwards.</li><li>The configuration of the Firebase project in your privacyIDEA server can be deleted.</li></ol>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 3.6 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-6-released/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-6-released/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 08:32:19 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Custom Attributes]]></category>
		<category><![CDATA[Policies]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2271</guid>

					<description><![CDATA[Custom User Attributes and Token Attributes in Policies allow for more control We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Custom User Attributes and Token Attributes in Policies allow for more control</strong></p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg"><img decoding="async" width="1024" height="682" src="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg" alt="" class="wp-image-2273" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6-1536x1024.jpg 1536w, https://www.privacyidea.org/wp-content/uploads/2021/06/privacyIDEA-3_6.jpg 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><em>We are proud to present you privacyIDEA 3.6. Administrators and Users can manage custom user attributes. These additional attributes can overwrite and enrich the existing user attributes, which privacyIDEA reads from the user stores. This way the token administrator in privacyIDEA has additional possibilities to manage the users and to manage the user rights. These user attributes can be used within privacyIDEA policies. In addition policies can now also contain any token attribute like tokentype or fail counter. These attributes and policy conditions help administrators to keep control in larger setups by logically grouping users and tokens.</em></p>



<h3 class="wp-block-heading">Policies with Custom User Attributes and Token Attributes </h3>



<p>privacyIDEA is no Identity Management. Users are usually managed in an IdM, or only in LDAP or Active Directory. Nevertheless it can be important to add attributes to users &#8211; in case the token administrator has no access rights to the IdM or user directory. The administrator can now do so in privacyIDEA 3.6 using custom user attributes. The administrator can even allow users to manage their own attributes. This way the user can e.g. update his mobile number himself, without the need to contact the help desk or the administrator.</p>



<p>Based on these user attributes the administrator can now define policies and thus the access rights can be tuned in more detail.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png"><img decoding="async" width="956" height="439" src="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png" alt="" class="wp-image-2276" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes.png 956w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-300x138.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/custom-attributes-768x353.png 768w" sizes="(max-width: 956px) 100vw, 956px" /></a><figcaption>The token administrator can set the mobile number of the user.</figcaption></figure>



<p>In addition policies can now have conditions on each and every token attribute like description, serial, tokentype, otp length, maximum failcounter, failcounter, active state and more.</p>



<p>This way the administrator could allow helpdesk users to only delete tokens, that have previously been disabled by the user himself. Possibilities are endless.</p>



<h3 class="wp-block-heading">Simple PUSH Token</h3>



<p>Starting with privacyIDEA 3.0 we introduced the <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/" data-type="post" data-id="1533">PUSH token</a>. If everything works out fine, the PUSH token can work like a charm. But setting it up is quite complicated. Also the Push services by Google and Apple actually do not work that reliably. With privacyIDEA 3.6 the administrator can now configure the PUSH token to only work in a polling method. In this scenario no external 3rd party service is needed and the user&#8217;s smartphone only communicates with the privacyIDEA server.</p>



<p>By giving up some comfort such a setup can gain stability and improve the privacy aspect.</p>



<h3 class="wp-block-heading">Token Rollover</h3>



<p>The administrator can now configure a WebUI policy to allow users to roll over their tokens. This means that the key material is generated anew and the user can enroll the token again, e.g. by scanning a new QR code. This comes in handy, if the user is only allowed to have one token, but wants to move his token to a new smartphone or if the company decides to increase the key size of the tokens.</p>



<figure class="wp-block-image size-large"><a href="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png"><img loading="lazy" decoding="async" width="1024" height="260" src="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png" alt="" class="wp-image-2280" srcset="https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-1024x260.png 1024w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-300x76.png 300w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover-768x195.png 768w, https://www.privacyidea.org/wp-content/uploads/2021/06/rollover.png 1119w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption>The user can regenerate the seed of his existing token: Rollover.</figcaption></figure>



<h3 class="wp-block-heading">Enhancements</h3>



<p>Besides these main features there are a lot of enhancements. The administrator can use pi-manage to export and import the system configuration. This can be used to move configuration from testing environments to productive environments. You can have different PIN policies for different tokentypes. </p>



<p>In pi.cfg the system administrator can define a custom entry point for the WebUI. This way you can create your complete own WebUI without changing anything in the code.</p>



<p>The token janitor received several improvements. It can export arbitrary user attributes, the seed can either be exported in hex or base32 to increase the interoperability with other MFA systems. The token export can now also contain the user assignment. This way tokens can easily be transferred between different privacyIDEA installations.</p>



<p>You can find the complete <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">Changelog at Github</a>.</p>



<h3 class="wp-block-heading">Availability</h3>



<p>You can download privacyIDEA 3.6 from Github or install it from the Python Package Index. For easy deployment you can use the community repositories for Ubuntu 16.04, 18.04 and 20.04. You can find the installation guidline in the <a rel="noreferrer noopener" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">online documentation</a>. If you are updating, it is crucial to read the <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, which contains important information about LDAP resolvers and TLS.</p>



<p>If you want to get involved, be sure to drop by at the <a rel="noreferrer noopener" href="https://community.privacyidea.org" target="_blank">community forum</a>. You can also take a look at Weblate, were the community can translate to different languages. We are grateful for the community effort to be able to ship translations in Dutch and French!</p>



<p>For mission critical scenarios the <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener">company NetKnights provides an Enterprise Edition with Support</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-6-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA Authenticator iOS Testdrive</title>
		<link>https://www.privacyidea.org/privacyidea-authenticator-ios-testdrive/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 16 Nov 2020 15:51:09 +0000</pubDate>
				<category><![CDATA[privacyIDEA Authenticator]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=2214</guid>

					<description><![CDATA[We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app. The new version is supposed to provide better PUSH token functionality. It will also provide [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="292" src="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png" alt="" class="wp-image-2215" srcset="https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-1024x292.png 1024w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-300x86.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll-768x219.png 768w, https://www.privacyidea.org/wp-content/uploads/2020/11/push-poll.png 1069w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Polling for push notification makes authentication more robust.</figcaption></figure>



<p>We are about to release a new version of the privacyIDEA Authenticator. We moved to a new framework &#8220;Flutter&#8221;. It is supposed to ease the life of the developers and create more stability between the Android and the iOS app.</p>



<p>The new version is supposed to provide better PUSH token functionality. It will also provide the possibility to &#8220;poll&#8221; the PUSH notification &#8211; sounds strange, right? It can be. But this is necessary if for some reason the concatenated push services of Google and Apple <a rel="noreferrer noopener" href="https://community.privacyidea.org/t/setup-secure-authentication-with-ios-privacyidea-push-token/1310" target="_blank">do not work out as expected</a>. Then the smartphone will poll the privacyIDEA to check, if there is a challenge available.</p>



<p>privacyIDEA 3.4 is required in the backend for PUSH-poll to work.</p>



<p>A beta version of the new privacyIDEA Authenticator is available <strong>now</strong> via <s>Testdrive</s> Testflight. If you want to <a rel="noreferrer noopener" href="https://testflight.apple.com/join/hcpxWPt0" target="_blank">participate, register here</a>.</p>



<p>We are looking forward to your feedback.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Setup secure authentication with iOS privacyIDEA Push Token</title>
		<link>https://www.privacyidea.org/setup-secure-authentication-with-ios-privacyidea-push-token/</link>
					<comments>https://www.privacyidea.org/setup-secure-authentication-with-ios-privacyidea-push-token/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 12 Feb 2020 12:00:39 +0000</pubDate>
				<category><![CDATA[documentation]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1707</guid>

					<description><![CDATA[Use iPhone for 2FA with Push Notification against privacyIDEA.]]></description>
										<content:encoded><![CDATA[
<p>In a previous post we explained <a href="https://www.privacyidea.org/testing-privacyidea-push-token/">how you can setup Push authentication with privacyIDEA</a>. This gives you the basic configuration in privacyIDEA, sets up your Firebase project and works well with Android based smartphones.</p>



<p>However with iOS devices things are a bit more complicated and <em>additional</em> steps have to be taken. These <em>additional</em> steps are described in this blog post.</p>



<h2 class="wp-block-heading">Apple push apps &#8211; different than Android</h2>



<p>The Firebase service can not directly push to apple devices. Instead, the Firebase service pushes to the Apple Notification Service. While Android allows an app to be connected to different Firebase projects, an iOS app with it&#8217;s app identifier can only be connected to one Apple Push project. </p>



<p>What does this mean?</p>



<p>For the Android devices you created a Firebase project. Your <em>own</em> Firebase project. You configure the data in the privacyIDEA server and the information about the Firebase project is passed to the privacyIDEA Authenticator<strong><em> for Android </em></strong>during the rollout process. This means that a privacyIDEA installation running with organization A connects the push tokens to their own Firebase project and organization B will connect their push tokens to a totally different own Firebase project.</p>



<p>Unfortunately this is not possible with the Apple Notification Service. NetKnights, the company behind privacyIDEA, created one Apple Notification Service project. The secret push key of this project is connected to the app identifier &#8220;privacyidea.authenticator&#8221; of the  privacyIDEA Authenticator App for iOS. The privacyIDEA installation in organization A sends the push notification for an iOS device to the organization&#8217;s own Firebase project, but then the Firebase project will forward the notification to the general Apple Notification Service project. This second step will be the same for all Push notifications to iOS devices connected to any privacyIDEA installation on this planet. This <strong><em>probably </em></strong>arises from Apples cloud-centric idea, that <strong><em>probably </em></strong>an app will only receive notifications from <em> one central cloud</em> service.</p>



<p>However, during enrollment of the iOS privacyIDEA Authenticator the app sends a random device identifier to your privacyIDEA server. Your privacyIDEA installation then uses this random identifier to send the push notification to this very device. It seems unlikely for another privacyIDEA installation to guess the device identifier of a foreign Apple device. If an attacker was able to guess a random device identifier the attacker could send arbitrary notifications to the iOS device. But in addition the iOS privacyIDEA Authenticator is also registered to your <em>own</em> Firebase project. This means, that the attacker indeed could send an arbitrary notification but such notification would not be processed by the privacyIDEA Authenticator.</p>



<p>If you do not like this (which we would understand) you need to recompile the privacyIDEA Authenticator for iOS with your own <strong><em>Apple Notification Service project</em></strong>, with your own Apple developer account, your own certificate and push notification key and with your own app identifier. Just like all other privacyIDEA code, the <a href="https://github.com/privacyidea/privacyidea-authenticator-ios">privacyidea-authenticator-ios</a> is available on github.</p>



<p>NetKnights hopes to be able to provide customization services one day to create customer specific apps as part of a privacyIDEA Authenticator Enterprise Edition, to circumvent this problem.</p>



<p>After this lengthy disclaimer lets now connect Firebase with the Apple Notification Service especially with the privacyIDEA Authenticator.</p>



<p><strong>Note</strong>: This howto discloses the secret project key, which is needed so that Firebase can send messages to the Apple Notification Service. This means, that an attacker could &#8211; after successfully guessing a device identifier &#8211; potentially <em>spam</em> messages to devices connected to the privacyIDEA Apple Notification Service. However, the impact on login security is none, since all messages are digitally signed in both directions. Again: This downside is due to the cloud-centric design or the Apple Notification Service and can only be avoided by compiling your own Authenticator app and publishing it to the Apple app store.</p>



<p>But let&#8217;s do the iOS device, now!</p>



<h2 class="wp-block-heading">Add new Firebase App</h2>



<p>In the <a href="https://console.firebase.google.com/" target="_blank" rel="noreferrer noopener" aria-label="Firebase console (opens in a new tab)">Firebase console</a>, you need to create a new App in your Firebase project. Do so so click the button &#8220;+ Add app&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="476" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-01-add-app-1024x476.png" alt="" class="wp-image-1715" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-01-add-app-1024x476.png 1024w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-01-add-app-300x140.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-01-add-app-768x357.png 768w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-01-add-app.png 1034w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>The new app you want to create, is an iOS app. So click the round button &#8220;iOS&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1005" height="410" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-02-add-ios-app.png" alt="" class="wp-image-1716" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-02-add-ios-app.png 1005w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-02-add-ios-app-300x122.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-02-add-ios-app-768x313.png 768w" sizes="auto, (max-width: 1005px) 100vw, 1005px" /></figure></div>



<p>In the app registration dialog you need to create an iOS bundle ID. Creating a nickname is optional. For the <a href="https://developer.apple.com/documentation/appstoreconnectapi/bundle_ids">bundle ID</a> you need to enter &#8220;privacyidea.authenticator&#8221;. Choose a nickname to your likings.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="558" height="549" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-03-register-app.png" alt="" class="wp-image-1717" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-03-register-app.png 558w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-03-register-app-300x295.png 300w" sizes="auto, (max-width: 558px) 100vw, 558px" /></figure></div>



<p>In the second step of the app registration you need to download the plist file. Save it for later, you need to enter the settings from within this file in your privacyIDEA policy.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="743" height="661" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-04-download-for-later.png" alt="" class="wp-image-1718" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-04-download-for-later.png 743w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-04-download-for-later-300x267.png 300w" sizes="auto, (max-width: 743px) 100vw, 743px" /></figure></div>



<p>In the third step you do not need to take any actions. You do not bother with the SDK, since the privacyIDEA Authenticator iOS app already exists!</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="732" height="787" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-05-no-need-to-take-any-achtion-here.png" alt="" class="wp-image-1719" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-05-no-need-to-take-any-achtion-here.png 732w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-05-no-need-to-take-any-achtion-here-279x300.png 279w" sizes="auto, (max-width: 732px) 100vw, 732px" /></figure></div>



<p>Also in the next step you do not need to take any action. Simply press &#8220;Next&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="757" height="899" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-06-no-need-to-take-any-action-here.png" alt="" class="wp-image-1720" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-06-no-need-to-take-any-action-here.png 757w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-06-no-need-to-take-any-action-here-253x300.png 253w" sizes="auto, (max-width: 757px) 100vw, 757px" /></figure></div>



<p>Now you are done registering your iOS app and you can &#8220;Continue to console&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="743" height="651" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-07-return-to-console.png" alt="" class="wp-image-1722" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-07-return-to-console.png 743w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-07-return-to-console-300x263.png 300w" sizes="auto, (max-width: 743px) 100vw, 743px" /></figure></div>



<h2 class="wp-block-heading">Adding the secret iOS Authentication key</h2>



<p>After you have told the Firebase service, that also iOS devices are going to connect to it, you now need to tell Firebase, how it can talk to the Apple Notification Service. For this you need the secret key we talked about at the <a rel="noopener noreferrer" href="#note" target="_blank">beginning</a> of this article. If you do not want to compile your own app and publish it in the app store, you unfortunately have to share the &#8220;secret&#8221; key with all other default installations of privacyIDEA. Download the <a rel="noreferrer noopener" href="https://privacyidea.org/wp-content/uploads/2020/02/AuthKey_2FZRBAT74S.p8" target="_blank">secret key file</a> to your computer and save it for later. </p>



<p>Still in the Firebase console, first go to the &#8220;Project settings&#8221; in the upper left corner</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="495" height="238" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-08-project-settings.png" alt="" class="wp-image-1723" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-08-project-settings.png 495w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-08-project-settings-300x144.png 300w" sizes="auto, (max-width: 495px) 100vw, 495px" /></figure></div>



<p>In the &#8220;Settings&#8221; go to the tab &#8220;Cloud Messaging&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="495" height="270" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-cloud-messaging.png" alt="" class="wp-image-1724" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-cloud-messaging.png 495w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-cloud-messaging-300x164.png 300w" sizes="auto, (max-width: 495px) 100vw, 495px" /></figure></div>



<p>In &#8220;Cloud Messaging&#8221; you will find the &#8220;iOS app configuration&#8221;. There you can hit &#8220;Upload&#8221; to upload the secret key file. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="999" height="409" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-upload-auth-key.png" alt="" class="wp-image-1725" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-upload-auth-key.png 999w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-upload-auth-key-300x123.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-09-upload-auth-key-768x314.png 768w" sizes="auto, (max-width: 999px) 100vw, 999px" /></figure></div>



<p>Now select the secret key file (AuthKey_2FZRBAT74S.p8) to upload it to the Firebase console.</p>



<p>Enter the Key ID (2FZRBAT74S) and Team ID (627QALYL3B) exactly as stated in the image below.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="669" height="551" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-10-select-key-file.png" alt="" class="wp-image-1726" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-10-select-key-file.png 669w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-10-select-key-file-300x247.png 300w" sizes="auto, (max-width: 669px) 100vw, 669px" /></figure></div>



<p>After hitting the &#8220;Upload&#8221; button you should be fine and your Firebase Push Service is connected to the Apple Notification Service for the privacyIDEA Authenticator iOS App.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="985" height="379" src="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-11-auth-key-successfully-uploaded.png" alt="" class="wp-image-1728" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-11-auth-key-successfully-uploaded.png 985w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-11-auth-key-successfully-uploaded-300x115.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/02/ios-push-11-auth-key-successfully-uploaded-768x296.png 768w" sizes="auto, (max-width: 985px) 100vw, 985px" /></figure></div>



<h2 class="wp-block-heading">Configure iOS Authenticator in privacyIDEA</h2>



<p>Now open the plist file you saved earlier. Find the entries API_KEY and GOOGLE_APP_ID. It will look like this:</p>



<pre class="wp-block-code"><code>&lt;?xml version="1.0" encoding="UTF-8"?>
&lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
&lt;plist version="1.0">
&lt;dict>
        ...
	&lt;key>API_KEY&lt;/key>
	&lt;string>example-key_value&lt;/string>
        ...
    	&lt;key>GOOGLE_APP_ID&lt;/key>
	&lt;string>1:example:ios:appid&lt;/string>
&lt;/dict>
&lt;/plist></code></pre>



<p>You need to enter the value &#8220;example-key_value&#8221; in <em>apikeyios</em> and the value &#8220;1:example:ios:appid&#8221; in <em>appidios</em>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="693" src="https://www.privacyidea.org/wp-content/uploads/2020/02/iOS-push-12-configure-privacyidea-1024x693.png" alt="" class="wp-image-1749" srcset="https://www.privacyidea.org/wp-content/uploads/2020/02/iOS-push-12-configure-privacyidea-1024x693.png 1024w, https://www.privacyidea.org/wp-content/uploads/2020/02/iOS-push-12-configure-privacyidea-300x203.png 300w, https://www.privacyidea.org/wp-content/uploads/2020/02/iOS-push-12-configure-privacyidea-768x520.png 768w, https://www.privacyidea.org/wp-content/uploads/2020/02/iOS-push-12-configure-privacyidea.png 1191w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Now you are ready to register iOS devices with your privacyIDEA Push setup and use your iPhones to authenticate via Push notification.</p>



<p>If you want to stay tuned for the enterprise edition, please consider <a href="https://netknights.it/en/unternehmen/kontakt/" target="_blank" rel="noreferrer noopener" aria-label="contacting the company NetKnights (opens in a new tab)">contacting the company NetKnights</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/setup-secure-authentication-with-ios-privacyidea-push-token/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 3.0.1 released</title>
		<link>https://www.privacyidea.org/privacyidea-3-0-1-released/</link>
		
		<dc:creator><![CDATA[Friedrich Weber]]></dc:creator>
		<pubDate>Thu, 23 May 2019 10:13:14 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1589</guid>

					<description><![CDATA[We are pleased to announce the release of privacyIDEA 3.0.1 today. In this release, we did not implement any new features, but instead focused on stability. Our last major release privacyIDEA 3.0 came with several big changes. Most notably, it introduced a new PUSH token class. With this token class, a login request sends a [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2019/05/startup-593324_1280-1024x682.jpg" alt="" class="wp-image-1597" width="581" height="387" srcset="https://www.privacyidea.org/wp-content/uploads/2019/05/startup-593324_1280-1024x682.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/05/startup-593324_1280-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/05/startup-593324_1280-768x512.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/05/startup-593324_1280.jpg 1280w" sizes="auto, (max-width: 581px) 100vw, 581px" /><figcaption>The privacyIDEA Push Token provides the first full open source push implementation for easy authentication.</figcaption></figure></div>



<p>We are pleased to announce the release of privacyIDEA 3.0.1 today. In this release, we did not implement any new features, but instead focused on stability.</p>



<p>Our last major release privacyIDEA 3.0 <a href="https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/">came with several big changes</a>. Most notably, it introduced a new PUSH token class. With this token class, a login request sends a push notification on the user&#8217;s smartphone that can be accepted or declined. You can <a href="https://www.privacyidea.org/testing-privacyidea-push-token/">read more about the PUSH token here.</a> Thanks to a lot of feedback from the community, we were able to fix several issues with our initial implementation:</p>



<ul class="wp-block-list"><li>Add logic checking to setup of PUSH token (#1592)</li><li>Remove double enrollment notification of PUSH token in WebUI (#1598)</li><li>Fix to allow spaces in Firebase configuration (#1599)</li><li>Add support for iOS Firebase configuration (#1608)</li><li>Fix to allow PUSH token enrollment, even with Label-policy (#1589)</li><li>Fix to mark PUSH token challenge answered in the database (#1584)</li></ul>



<p>privacyIDEA 3.0.1 also comes with usability improvements on the frontend side:</p>



<ul class="wp-block-list"><li>Beautify the vertical alignment in the Web UI top menu (#1559)</li><li>Fix user cache configuration read &#8211; defaults to 0 (#1596)</li><li>Remove links in audit log for normal users (#1497)</li><li>Fix placeholder in realm dropdown in login dialog (#1498)</li><li>Allow the usage if &#8220;browserLanguage&#8221; in custom templates (#1620)</li><li>Open all accordions when searching for policy action (#1558)</li><li>Fix to hide support links also in menu (#1626)</li></ul>



<p>Finally, we corrected some inconsistencies and bugs in the backend, and improved on the compatibility with Python 3:</p>



<ul class="wp-block-list"><li>Fix the validity period of the registration token (#1587)</li><li>Check UI rights for user resolvers (#1496)</li><li>Fix enckey creation in Python 3 (#1594)</li></ul>



<p>privacyIDEA 3.0.1 is available via the Python package index, and can be installed on Ubuntu 16.04 and 18.04 using our community repositories. Detailed installation instructions can be found <a href="https://privacyidea.readthedocs.io/en/latest/installation/index.html">in our documentation</a>. Before upgrading your existing installation, be sure to read our <a href="https://github.com/privacyidea/privacyidea/blob/branch-3.0/READ_BEFORE_UPDATE.md">update notes</a>.</p>



<p>If you have any questions or suggestions, you are welcome to join our <a href="https://community.privacyidea.org/">community forum</a>. In case you require enterprise support, we refer to the <a href="https://netknights.it/en/produkte/privacyidea/">privacyIDEA Enterprise Edition</a> offered by NetKnights GmbH.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Testing privacyIDEA Push Token</title>
		<link>https://www.privacyidea.org/testing-privacyidea-push-token/</link>
					<comments>https://www.privacyidea.org/testing-privacyidea-push-token/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 17 Apr 2019 10:56:04 +0000</pubDate>
				<category><![CDATA[Howto]]></category>
		<category><![CDATA[Push Token]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1573</guid>

					<description><![CDATA[Use the Push Authentication with privacyIDEA 3.0.]]></description>
										<content:encoded><![CDATA[
<p>Today we released version 2.0 of our privacyIDEA Authenticator to the beta test program.</p>



<p>In Version 2.0 the privacyIDEA Authenticator implementes the Push Token. During Rollout the Push Token exchanges asymmetric keys between the privacyIDEA Server and the privacyIDEA Authenticator. </p>



<p>During authentication the privacyIDEA Server sends a cryptographic challenge via Firebase to the smartphone. The privacyIDEA Authenticator verifies the signature of the privacyIDEA Server and asks the user to confirm the login request. The App then signs the challenge and sends it back to the privacyIDEA Server.</p>



<p>The internals are described at our <a rel="noreferrer noopener" aria-label="github wiki page. (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/wiki/concept%3A-PushToken" target="_blank">github wiki page.</a></p>



<h3 class="wp-block-heading">Join the Beta Test</h3>



<p>The privacyIDEA Authenticator 2.0 is available for Android phones at the moment. iOS will follow shortly.</p>



<p>We are happy if you want to participate in the public beta test. Simply go to <a rel="noreferrer noopener" aria-label="this site and follow the steps (opens in a new tab)" href="https://play.google.com/apps/testing/it.netknights.piauthenticator" target="_blank">this site and follow the steps</a> to join the beta test. You can install the privacyIDEA Authenticator 2.0 on your Android device (Minimum version &#8220;kitkat&#8221; &#8211; we do not recommend this! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<h3 class="wp-block-heading">Set up for your tests</h3>



<p>In this blog post we want to give you an overview to get started. For a deeper understanding you can read more about the push token in the <a href="https://privacyidea.readthedocs.io/en/latest/tokens/tokentypes/push.html#configuration" target="_blank" rel="noreferrer noopener">online documentation</a> and at <a rel="noreferrer noopener" href="https://github.com/privacyidea/privacyidea/wiki/concept%3A-PushToken" target="_blank">github</a>.</p>



<h4 class="wp-block-heading">Get components</h4>



<p>Get <a rel="noreferrer noopener" aria-label="privacyIDEA 3.0 (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank">privacyIDEA 3.0</a> and the privacyIDEA <a rel="noreferrer noopener" aria-label="Authenticator 2.0 (opens in a new tab)" href="https://play.google.com/apps/testing/it.netknights.piauthenticator" target="_blank">Authenticator 2.0</a>.</p>



<h4 class="wp-block-heading">Network connectivity</h4>



<p>Assure, that your smartphone can reach your privacyIDEA server, e.g. by placing your smartphone in the same Wireless LAN like your privacyIDEA Server. The smartphone needs to connect to privacyIDEA during enrollment and during authentication.</p>



<h4 class="wp-block-heading">Firebase project</h4>



<p>In the <a rel="noreferrer noopener" aria-label="Firebase console (opens in a new tab)" href="https://console.firebase.google.com" target="_blank">Firebase console</a> you need to create your own Firebase Cloud Messaging project.</p>



<p>From the console you can download the relevant project information. </p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="773" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-7-1024x773.png" alt="" class="wp-image-1579" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-7-1024x773.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-7-300x226.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-7-768x580.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-7.png 1257w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><del>The relevant information is the &#8220;Web API Key&#8221;, &#8220;App ID&#8221;, &#8220;Project ID&#8221; and the project number, which is the number part of the &#8220;Public-facing name&#8221;. Copy these values to create a new provider in privacyIDEA.</del></p>



<p>Download the file <em>google-services.json</em> and fetch the values &#8220;project_number&#8221;, &#8220;project_id&#8221;, &#8220;mobilesdk_app_id&#8221; and &#8220;api_key&#8221; from this file.</p>



<p>In addition you need to create a new service account for your Firebase project:</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="715" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-8-1024x715.png" alt="" class="wp-image-1580" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-8-1024x715.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-8-300x209.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-8-768x536.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-8.png 1253w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>You can download the settings of this service account in a JSON file, which you need to copy to the privacyIDEA machine and later add in your privacyIDEA SMS Provider in the next step.</p>



<h4 class="wp-block-heading">Firebase SMS Provider</h4>



<p>In privacyIDEA you need to create an &#8220;SMS Gateway&#8221; of type &#8220;Firebase&#8221; with the Firebase project you created in the previous step. The privacyIDEA Server will connect to Firebase with this project.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="721" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-6-1024x721.png" alt="" class="wp-image-1578" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-6-1024x721.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-6-300x211.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-6-768x541.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-6.png 1183w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Enter the data and json file, you downloaded from the Firebase console. E.g. the <em>JSON config file</em> needs to be copied to the privacyIDEA Server and you need to specify a local path on the privacyIDEA Server.</p>



<p>Finally you also need to enter the <em>registration URL</em>. This is the URL of the privacyIDEA Server which the privacyIDEA Authenticator contacts during the enrollment process. So you need to be sure, that this URL is in a format (FQDN, IP), which the smartphone can connect to. Unless you know otherwise the path or the URL should be <em>/ttype/push</em>.</p>



<h4 class="wp-block-heading">Policies</h4>



<p>Now you need to configure your privacyIDEA system. You need to create two policies, one for the enrollment and the other one for the authentication.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="639" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-9-1024x639.png" alt="" class="wp-image-1582" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-9-1024x639.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-9-300x187.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-9-768x479.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-9.png 1153w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The enrollment policy contains the name of the Firebase SMS Provider you created in the previous step.</p>



<p>The authentication policy can contain the text, that should be displayed in the notification:</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="607" src="https://www.privacyidea.org/wp-content/uploads/2019/04/image-10-1024x607.png" alt="" class="wp-image-1584" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/image-10-1024x607.png 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-10-300x178.png 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-10-768x455.png 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/image-10.png 1115w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Testing</h4>



<p>You can now test you setup by</p>



<ol class="wp-block-list"><li>Enroll a new Push token and assign it to a user. Give the Push token a PIN.</li><li>In your browser you can simply issue an authentication request using the API <em>https://your.privacyidea.server/validate/check?user=testuser&amp;pass=yourpin</em></li><li>You should receive a notification on your enrolled smartphone, which you can confirm.</li></ol>



<h2 class="wp-block-heading">Your help and feedback</h2>



<p>The missing link currently is the Application that is supposed to <a rel="noreferrer noopener" aria-label="poll for the confirmed authentication (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/wiki/concept%3A-PushToken#polling-endpoint-for-application" target="_blank">poll for the confirmed authentication</a>.</p>



<p>We need <strong>your</strong> feedback, to know on which application we should start working first. As an alternative we are also planning to add <a href="https://github.com/privacyidea/privacyidea/issues/1583" target="_blank" rel="noreferrer noopener" aria-label="a delayed response (opens in a new tab)">a delayed response</a>.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/testing-privacyidea-push-token/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA 3.0 &#8211; Python 3, Push and Policies</title>
		<link>https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/</link>
					<comments>https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 10 Apr 2019 08:43:42 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Push Token]]></category>
		<category><![CDATA[Python 3]]></category>
		<category><![CDATA[User Management]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1533</guid>

					<description><![CDATA[Proudly we talk about our release of the major version privacyIDEA 3.0, today. Changing the version number 2.23.5 to 3.0 indicates a lot of changes. Changes why you should take more care during the update process. And changes, why this article is a bit longer than usual. But relax! We did everything we could to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" width="1024" height="512" src="https://www.privacyidea.org/wp-content/uploads/2019/04/privacyIDEA-Release-3-0-banner-1024x512.jpg" alt="" class="wp-image-1550" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/privacyIDEA-Release-3-0-banner-1024x512.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/privacyIDEA-Release-3-0-banner-300x150.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/privacyIDEA-Release-3-0-banner-768x384.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/privacyIDEA-Release-3-0-banner.jpg 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>Proudly we talk about our release of the major version privacyIDEA 3.0, today.</p>



<p>Changing the version number <a href="https://www.privacyidea.org/privacyidea-2-23-pre-events-handling-monitoring-and-statistics/">2.23.5</a> to 3.0 indicates a lot of changes. Changes why you should take more care during the update process. And changes, why this article is a bit longer than usual. But relax! We did everything we could to still give you a smooth update experience.</p>



<p>So what is so different?</p>



<h2 class="wp-block-heading">Get ready for the future</h2>



<p>The most important changes in version 3.0 are under the hood. </p>



<p>Now privacyIDEA runs well on Python 2 <strong>and Python 3</strong>! This way we will still be in business when Python 2.7 is no longer supported in 2020. Being able to run on Python 2 or Python 3 <strong>with the same code</strong> allows you to choose, whether and when you want to move your installation to Python 3!</p>



<p>The other major change is in the <strong>database schema</strong>. For years tokens were assigned to a user, by storing the link to the user in the token database table in the columns <em>userid</em> and <em>resolver</em>. From this, the limitation came that a token could originally only be assigned to one user. In version 3 we store the token assignment in a new database table &#8220;tokenowner&#8221;. This way the database schema allows that a token can have multiple token owners. While currently the API and Web UI still only allow to assign one user to a token, we have laid the foundation for an even greater flexibility in the future.</p>



<p>This change leads to something, we did not have before during update. Data migration! While the past versions contained schema migrations, that added new columns and features to privacyIDEA, this is the first time, that the update process will also change data in the database! The <em>userid</em> and <em>resolver</em> is removed from the <em>token</em> table and migrated to the <em>tokenowner</em> table. We tested this successfully with roughly 25.000 assigned tokens. Migrating more tokens will just be a matter of time.</p>



<h2 class="wp-block-heading">Push and Queue</h2>



<p>Two new main features are the Push Token and internal Queueing.</p>



<p>With the Push Token privacyIDEA will send a push notification to the user&#8217;s smartphone informing the user about the login request. Using the privacyIDEA Authenticator App the user can confirm the login request by simply clicking the notification. In the background a cryptographic challenge is signed on the smartphone and sent back to privacyIDEA. privacyIDEA verifies the signature and the login for the user is granted. The Push Token adds another unique authentication mechanism to privacyIDEA. Thus the administrator can choose between a lot of different authentication types like TOTP, HOTP, Yubikey, U2F, Email, SMS&#8230; and decide which matches the user&#8217;s needs.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1024" height="680" src="https://www.privacyidea.org/wp-content/uploads/2019/04/concept-privacyidea-push-token-1024x680.jpg" alt="" class="wp-image-1541" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/concept-privacyidea-push-token-1024x680.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/concept-privacyidea-push-token-300x199.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/concept-privacyidea-push-token-768x510.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Developing the concept for the Push Token</figcaption></figure>



<p>privacyIDEA now offers a queue, that can run tasks outside of the request context of e.g. an authentication request. For starters the task of sending an email (e.g. during authentication with an email token or with the notification event handler) can now be pushed to the queue and thus be decoupled from the original request, resulting in reliably quicker response times.</p>



<p>In the future the queue can be used for a lot more tasks.</p>



<h2 class="wp-block-heading">Tell me what happend &#8211; helping the administrator understanding his complex system</h2>



<p>In big installations the administrator might have configured a lot of different <a href="https://www.privacyidea.org/setting-policies-via-command-line/">policies</a>, to tweek the system exactly to his needs. Policies define the way, how the systems responds to an authentication request, the enrollment of a token or any other API request. The combination of the policies can make things more complex and the administrator can loose the overview. &#8220;What policy combination caused the system to respond in this way?&#8221;</p>



<div class="wp-block-image"><figure class="alignright is-resized"><img loading="lazy" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2019/04/library-2614804_1920-1024x768.jpg" alt="" class="wp-image-1546" width="319" height="239" srcset="https://www.privacyidea.org/wp-content/uploads/2019/04/library-2614804_1920-1024x768.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/04/library-2614804_1920-300x225.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/04/library-2614804_1920-768x576.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/04/library-2614804_1920.jpg 1920w" sizes="auto, (max-width: 319px) 100vw, 319px" /><figcaption>The Audit Log helps the administrator to track and reproduce what exactly happened and why!</figcaption></figure></div>



<p>The audit log already saves every API request that was sent to privacyIDEA. In version 3.0 the audit log also contains a list of all used or relevant policies during this request. I.e. the administrator can easily see, why the system behaved this way it did. The audit log will contain the complete list of policies, that led to this very decision. This will help the administrator or service desk to trouble shoot user&#8217;s requests in a shorter time.</p>



<h2 class="wp-block-heading">Get it and authenticate</h2>



<p>As always you can find the complete <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank">changelog at Github</a>. Please be sure, to read the <a rel="noreferrer noopener" aria-label="READ_BEFORE_UPDATE (opens in a new tab)" href="https://github.com/privacyidea/privacyidea/blob/master/READ_BEFORE_UPDATE.md" target="_blank">READ_BEFORE_UPDATE</a>, before updating! (Just like the name suggests)</p>



<p>privacyIDEA 3.0 is available via the Python Package Index and via repositories for Ubuntu 16.04LTS and 18.04LTS. The repositories have been changed to be able to provide more strictly defined installation scenarios. Please read the <a rel="noreferrer noopener" aria-label="online documentation for install methods (opens in a new tab)" href="https://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank">online documentation for install methods</a> and the update process.</p>



<p>New users are welcome at our <a rel="noreferrer noopener" aria-label="community forum (opens in a new tab)" href="https://community.privacyidea.org/" target="_blank">community forum</a>! Enterprise users can get an Enterprise Edition <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noreferrer noopener" aria-label="here (opens in a new tab)">here</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-3-0-python-3-push-and-policies/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
