Privacyidea

Latest version: v3.10.1

Safety actively analyzes 688634 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 6 of 14

3.3

Not secure
Features:
* New token type: WebAuthn/FIDO2 token is initially supported by privacyIDEA (1468)
* New token type: Indexed Secret token allows user
to authenticate with a pre-known secret that can be
initialized from the user store. (1986)
* New Event Handler Module: Logging module enables custom event-driven logging (1580)

Enhancements:
* Event Handler:
* The OTP token QR code can now be added not only inline but also as an attachment
to email notifications (1226)
* Policies:
* Added a policy to define the allowed characters for PINs (2051)
* Add policies to limit the number of destinct tokentypes per user (1375)
* Improved distinction between the username of the administrator
and the username of the user. Add an admin username to policies. (1867)
Thus allowing:
* User attribute conditions in admin policies
* default settings for hashlib and otplen for HOTP and TOTP token
and default timestep for TOTP token can now be dependent on
admin user and for which user the admin does the enrollment
* Enrollment settings for push tokens can distinguish better
between admin users and user
* Random PIN settings can be user dependent
* WebUI
* Added the option to filter tokens by tokenrealm (545)
* Prior to enrollment of soft tokens, such as HOTP, TOTP and PUSH the user is
offered with a QR codes to direct him to the Authenticator App stores (1919).
* Adding version hashes to WebUI components to avoid working with outdated
templates (1871)
* Updated bootstrap and AngularJS (830)
* Rework policy matching (1691 2024 2038)
* Documentation
* The documentation was restructured and updated (1967 1981 1504 2049 2089 2090).
* Tools
* Added a migration script to update the database schema from 2.23.5 to 3.2.2 (2040)
* Misc
* Added the remote serial to the tokeninfo of a remote token to better track
authenticated devices (2031)
* Use dictConfig instead of fileConfig to read configurations (2059)
* Support logging configuration file in YAML format (2080)
* Support custom audit logger names (2106)

Fixes:
* Fix unauthorized statistics view (1238)
* Fix a bug which caused an exception during PSKC key file container import (1915)
* Fix link on privacyIDEA logo in the WebUI when no user is logged in (1944)
* Updated CA files in testdata which were about to expire (1960)
* Fix API endpoints to avoid redirects (1999)
* Fix url_decode padding before it could cause any issues (2000)
* Initialize rtype in user_object correctly (2007)
* Fix an inconsistency of start_tls with postgres SQL (2025)
* Fix wrong type splitting of questionnaire token (2026)
* Fix a bug which could cause missing audit entries when using the
ContainerAudit module (2029)
* Fix a bug which prevented defining an SQL resolver without a password (2030)
* Fix missing "position" argument on event import with pi-manage (2036)
* Fix timing issues in tests (2041)
* Fix documentation (2049)
* Fix sorting token table by column (2111)

3.2.2

Not secure
Fixes:
* Fix Popen calls like with pi-manage backup restore
* Fix retrieving the correct database for restore (1993)
* Fix caconnectorread policy (1994)

3.2.1

Not secure
Fixes:
* Fix the wording and translation of the lost token scenario

3.2

Not secure
Features:
* New Event Handler: RequestMangler to modify request attributes (1810)
* New Event Handler: ResponseMangler to modify the response data (1138)
* New Audit Module to write to a file (1072)
* New Container Audit Module to write to several audit modules at once (1072)
* Applications can use the API with predefined asymmetric JWT (1773)

Enhancements:
* Authentication:
* Add endpoint /validate/polltransaction for an improved workflow
for out-of-band challenges-responses like PUSH token (1838)
* Allow registration token to work as challenge/response (1897)
* RADIUS token also uses timeout and retries (1931)
* Improve the handling of splitAtSign, so that a multi-realm
setup will be more consistent (1808)
* Use authentication and authorization policies also for the
/auth endpoint (1722, 1537)
* Policies and events:
* Allow HTTP AGENT and any arbitrary HTTP header in extended policy conditions (1425)
* Allow HTTP AGENT as condition for event handlers (1260)
* Event Handlers can match for the rollout_state (1801)
* Add write-to-file action to the notification handler (717)
* Allow user endpoints to trigger events (1822)
* Management:
* Allow help desk to trigger a token PIN reset without actually seeing the PIN (1196)
* Allow "file:" syntax in email notification handler (1939)
* Allow more sophisticated Proxy settings for the OverrideClient settings (1868)
* LinOTP migration script to work with LDAP mixed endian notation (1883)
* triggerchallenge also writes the serial of the triggered token
to the audit log (1862)
* Allow a dash ("-") in policy names (1813)
* The token janitor can return a list of users with tokens (1705)
* Restrict OTP length, hash and timestep also in admin policies (1566)
* User experience:
* Clean up event handler view and put handler and
position in extra columns (1920)
* Improve the serial number checking for disallowed characters (1826)
* The event handler list can be sorted and filtered (1818)
* The policy list can be sorted and filtered (1817)
* Show disallowed policy name characters in the UI (1674)
* Ask before deleting a hardware token (954)
* Performance:
* Improve performance by reading event handlers only if the
configuration has changed (1823)
* Store statistics data like event counters per node to improve
HA and replication performance (1819)
* Improve performance of the pre-auth event handler (1686)

Fixes:
* Delete entries from database tables, when the parent object
is deleted (fixed for machineresolverconfig, resolverconfig,
eventhandleroption) (1927)
* Comply to new pyredis parameters for apache auth module (1925)
* Fix filename parameter of HostMachineResolver (1912)
* Fix JSON content detection for endpoints like /validate/radiuscheck (1850)
* Fix integer UID with PostgreSQL databases (1825)
* Make the policy creation at the command line with pi-manage more
consistent (1807)

3.1.2

Not secure
Fixes:
* Fix the missing phone number field for SMS token, when a user
wants to enroll an SMS token. (1929)

3.1.1

Not secure
Fixes:
* Fix the wrong token_type key in the audit log which caused the tokentype
to not be contained in the audit (1846)

Page 6 of 14

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.