Privacyidea

Latest version: v3.9.3

Safety actively analyzes 629359 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 10 of 14

2.18

Not secure
Features:
* Allow to disable the WebUI (605)
* The WebUI will lock the screen after a timeout instead of
logging out the user. This allows to easily continue
configuration work. (621)
* Improve the creation and handling of local CAs (630, 632, 633)
Allow certificate template for certificates with different runtime
and x509v3 extensions.

Enhancements
Enhancements in Policies:
* Allow regular expressions in usernames in policies. (581)
* Improve Policy creation with pi-manage from JSON formatted file.
* WebUI: Add action grouping in policies.
* WebUI: Add action filter in policy view.
* Allow token specific PIN policies: The SPASS token can now
have dedicated PIN policies.
* Add PIN policies for administrators during enrollment and
during assignment.
* Add WebUI policy: only search on enter being pressed (617)

Enhancements in Event Handlers:
* Add token_validity_period condition to event handlers. (618)
* Add additional options in token handler when creating
SMS, Email or mOTP tokens.
* Allow tokenhandler to set tokeninfo field.
* Allow tokenhandler to set syncwindow.
* Add event handler condition for count_auth_success and
cound_auth_fail
* Add event handler condition for last_auth.
* Improve Audit Log for Event Handler. Each triggered action
will now also create an audit entry. (609)
* Allow the use of {current_time} in tokenevent handler. (628)

Enhancements in LDAP Resolver:
* Upgrade dependency to ldap3 version >=2.1.1 to improve LDAP
performance in regards to redundancy and security
* LDAP Resolver: Use get_info in bind requests to avoid querying
of subschema. (585)
* LDAP Resolver: Support StartTLS over Port 389.
* Simplify LDAP Resolver: Remove username from Attribute Mapping.
* Simplefy LDAP Resolver: Remove reverse filter.

Misc Enhancements:
* Automatically add user's mobile number if tokentype is SMS.
* Add example configuration for GTX messaging SMS gateway.
* Add a script "privacyidea-get-unused-tokens" to find
unused tokens
* WebUI: Add a busy indicator spinner.
* Improve the pi-manage script in regards to backup and restore.
Let you choose whether to backup encryption key or not.
Better handling for individual pathes. (626, 623)

Fixes:
* LDAP Resolver: Verify SSL Certificate (Security)
* LDAP Resolver: Allow special characters in NTLM password
* LDAP Resolver: Allow searching for users with German umlaut
* Remove the "unsafe" notation in the QR-Code link, so that
a smartphone may import the key during HOTP/TOTP token enrollment
by clicking the link. (620)
* Use defusexml to avoid XML bombs on token import (Security)
* Replace eval with ast.literal_evel (Security)
* Add missing attributes for U2F tokens in
validate/triggerchallenge API
* Let /validate/triggerchallenge write to audit log.
* Fix mangle policy for users and realms
* Avoid logging of password in check_user_pass in debug level
(level=10)
* Set encrypted PIN on enrollment for certificate tokens (625)
* Remove unused policy action "motp_webprovision"
* Allow emailtext policy in triggerchallenge API (642)

2.17

Not secure
Features
* Token Handler. Using the token handler the administrator
can defined actions in response to events, to modify tokens
like deleting, modifying, initilizing... tokens (532)
* Script Event Handler or Shell Event Handler allows to
trigger an external shell script, if some event occurs. (536)
* Add additional endpoint to trigger a challenge response
like the sending of an SMS, if the token PIN is not
available (531)
* Policy Handling to also check for secondary resolvers of
a user. This way a user can authenticate with his primary
resolver but policy will also work for secondary resolvers (543)

Enhancements
* The event handler conditions also determine a serial number
even if there is no serial number in the request:
If the user from the request only has one token assigned. (571)
* Allow event definitions to be disabled (537)
* Allow event to be addressed by a destinct name (522)
* Improving LDAP performance by addressing different functionality
of ldap3 version 1.x and 2.x. (549)
* Improve SQL Audit by adding the SQL Audit table to the schema.
Table is not created during HTTP request. (557)
* Limit audit log entry age. Users may only view audit
log entries up to a certain age. (541)
* Add checkbox to only display used actions in a policy (573)
* In event handler: Use serial number of a user's token if the
user has only one token (571)
* Download a filtered audit log (539)

Fixes
* Add missing token serial number to audit log if token is
deletes (546)
* Fix event handler saving (551)
* HttpSMSProvider accepts status codes 201 and 202 in addition
to 200 (562)
* Fix checkbox bug in NOREFERRALS of LDAP resolver (563)
* Add documentation for SMS provider (566)
* Remove 301 redirects from WebUI (576)

2.16

Not secure
Featurs
* Add HSM support via AES keys (534)
* Improved Event Handler for flexible notification (511)
* Signed subscription files for adding and checking
for extra functionality during authentication request (502)

Enhancements
* Allow additional filter attributes in the Audit Log (519)
* Show or hide realms in the login dialog via policy (517)
* Improve UI if admin is not allowed for certain actions (516, 512)
* Disable OTP PIN during enrollment via policy (439)
* Allow automatic sending of registration code via email (514)

Fixes
* Allow compatibility with ldap3 >= 2.0.7 (533 535)
* Fix problem with Notification when no tokenowner is available (528)
* Fix confusion of client HTTP parameters (529)
* Fix enabled flag with certain database types (527)
* Catch error in case of faulty overrideClient definition (526)
* Truncate Audit lines, that are too long for the DB table (525)

2.15

Not secure
Features
* Client Overview. Display the type of the requesting
authenticating clients (489)
* Support for NitroKey OTP mode (admin client)

Enhancements
* Performance enhancements using Caching singletons for
Config, Realm, Resolver and Policies
* Allow configuration of the registration email text (494)
* Return SAML attributes only in case of successful
authentication (500)
* Policy "reset_all_user_tokens" allow to reset all
failcounters on successful authentication (471)
* Client rewrite mapping also checks for
X-Forwarded-For (395, 495)

Fixes
* Fixing RemoteUser fails to display WebUI (499)
* String comparison in HOSTS resolver (484)

2.14

Not secure
Features
* Import PGP encrypted seed files
* Allow UserNotification for user actions
* Allow UserNotification on validate/check events,
to notify the user on a failed authentication or
a locked token.

Enhancements
* Add thread ID in REST API Response
* Performance improvement: Cache LDAP Requests 473
* Performance improvement: Optimize resolver iteration 474
* Add "Check OTP only" in WebUI
* Improve "get serial by OTP" in WebUI
* Add script to get serial by OTP

Fixes
* Restrict GET /user for corresponding admins 460

2.13

Not secure
Features
* Allow central definition of SMS gateways
to be used with tokens. 392
* User SMS for User Notificaton Event Handler. 435
* Add PIN change setting for each token. 429
* Force PIN change in web UI. 432

Enhancements
* Performence enhancements
* speed up loading of audit log in web UI.
* avoid double loadin of tokens and audit entries in web UI. 436
* Additional log level (enhanced Debug) to even log passwords in
debug mode.
* Add new logo. 430
* Add quick actions in the token list: reset failcounter,
toggle active. 426
* REST API returns OTP length on successful authentication. 407
* Add intelligent OverrideAuthorizationClient system setting,
that allows defined proxies to reset the client IP. 395

Fixes
* Display token count in web UI. 437
* Use correct default_tokentype in token enrollment. 427
* Fix HOTP resync problems. 412

Page 10 of 14

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.