Privacyidea

Latest version: v3.9.3

Safety actively analyzes 629436 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 6 of 14

3.2.2

Not secure
Fixes:
* Fix Popen calls like with pi-manage backup restore
* Fix retrieving the correct database for restore (1993)
* Fix caconnectorread policy (1994)

3.2.1

Not secure
Fixes:
* Fix the wording and translation of the lost token scenario

3.2

Not secure
Features:
* New Event Handler: RequestMangler to modify request attributes (1810)
* New Event Handler: ResponseMangler to modify the response data (1138)
* New Audit Module to write to a file (1072)
* New Container Audit Module to write to several audit modules at once (1072)
* Applications can use the API with predefined asymmetric JWT (1773)

Enhancements:
* Authentication:
* Add endpoint /validate/polltransaction for an improved workflow
for out-of-band challenges-responses like PUSH token (1838)
* Allow registration token to work as challenge/response (1897)
* RADIUS token also uses timeout and retries (1931)
* Improve the handling of splitAtSign, so that a multi-realm
setup will be more consistent (1808)
* Use authentication and authorization policies also for the
/auth endpoint (1722, 1537)
* Policies and events:
* Allow HTTP AGENT and any arbitrary HTTP header in extended policy conditions (1425)
* Allow HTTP AGENT as condition for event handlers (1260)
* Event Handlers can match for the rollout_state (1801)
* Add write-to-file action to the notification handler (717)
* Allow user endpoints to trigger events (1822)
* Management:
* Allow help desk to trigger a token PIN reset without actually seeing the PIN (1196)
* Allow "file:" syntax in email notification handler (1939)
* Allow more sophisticated Proxy settings for the OverrideClient settings (1868)
* LinOTP migration script to work with LDAP mixed endian notation (1883)
* triggerchallenge also writes the serial of the triggered token
to the audit log (1862)
* Allow a dash ("-") in policy names (1813)
* The token janitor can return a list of users with tokens (1705)
* Restrict OTP length, hash and timestep also in admin policies (1566)
* User experience:
* Clean up event handler view and put handler and
position in extra columns (1920)
* Improve the serial number checking for disallowed characters (1826)
* The event handler list can be sorted and filtered (1818)
* The policy list can be sorted and filtered (1817)
* Show disallowed policy name characters in the UI (1674)
* Ask before deleting a hardware token (954)
* Performance:
* Improve performance by reading event handlers only if the
configuration has changed (1823)
* Store statistics data like event counters per node to improve
HA and replication performance (1819)
* Improve performance of the pre-auth event handler (1686)

Fixes:
* Delete entries from database tables, when the parent object
is deleted (fixed for machineresolverconfig, resolverconfig,
eventhandleroption) (1927)
* Comply to new pyredis parameters for apache auth module (1925)
* Fix filename parameter of HostMachineResolver (1912)
* Fix JSON content detection for endpoints like /validate/radiuscheck (1850)
* Fix integer UID with PostgreSQL databases (1825)
* Make the policy creation at the command line with pi-manage more
consistent (1807)

3.1.2

Not secure
Fixes:
* Fix the missing phone number field for SMS token, when a user
wants to enroll an SMS token. (1929)

3.1.1

Not secure
Fixes:
* Fix the wrong token_type key in the audit log which caused the tokentype
to not be contained in the audit (1846)

3.1

Not secure
Features:
* Allow user attributes in policy conditions (1645)
* Assign tokens and set old PIN during migration (1619)
* Admins can only see tokens within the realm they are allowed to manage (1713)
**Note**: During update a policy "pi-update-policy-b9131d0686eb" is added, which
gives admins the previous read rights on tokens.
* Add adminread policies for policies, events, resolvers, system, machineresolvers,
smtpserver, radiusserver, privacyidea server, periodic tasks, smsgateways. (1495)
**Note**: During update a policy "pi-update-policy-3d7f8b29cbb1" is added, which
gives read rights to all admins to provide backward compatibility

Enhancements:
* Authentication and Challenge Response:
* RADIUS token supports a single AccessChallenge with the remote RADIUS server (1790)
* Improving Push token performance by reusing still valid access token (1795)
* Improving TiQR token: It returns the remaining attemps after a wrong PIN is given (1777)
* Improving TiQR token: Make TiQR info URL configurable (1782)
* Enhance validate check logic in regards to serials and user names (1768)
* User may now have several TiQR tokens at the same time (1739)
* Do not increase fail counter when *checking* for an answered challenge (1697)
* Allow additional token specific checks when answering challenge response (1695)
* Endpoint GET /token/challenges also takes transaction_id (1689)
* Push token can delay the response of /validate/check, so that there is no need
to query the server to check if the push notification has been answered (1583)
* User experience:
* Improve user experience when enrolling Yubikeys via ykpersonalize - Automatically
removing whitespaces (1735)
* Allow user to change the token description (1717)
* Customize Web UI page title (1624, 1243)
* *search_on_enter* also applies to audit log (1493)
* Allow a welcome message in the Web UI if the user has no token (1074)
* Do not display token configuration hints in the UI to normal users (1789)
* Management:
* Event handlers allow rollout_state as condition (1801)
* Add script to export OTP counters (1728)
* Allow many additional tags in email notifications: serial, user, givenname,
surname, username, userrealm, tokentype, recipient_givenname, recipient_surname,
time, date (1703)
* Improve diagnostics script by adding SQLAlchemy URL (1667)
* Add resolver conditions to several policy checks (1646)
* /auth entries in the audit log now also fill in resolver and serial (1593)
* `pi-manage backup` also backs up the FreeRADIUS configuration (1575)
* Allow event handlers on /auth endpoint (1567)
* Allow to force a PIN on tokens in the privacyIDEA Authenticator App (1295)
* New policy *max_active_tokens_per_user* (1241)
* Add image url to the otpauth QR code, allow images in e.g. FreeOTP (1228)
* Add MAC to PSKC token export (1663)
* Performance:
* Make the serverpool in LDAP resolver persistant improving redundancy performance (1396)

Fixes:
* Improve the stability of the schema-update-script (1760)
* Rearrange update order in migration scripts (1733)
* Adapt privacyidea-token-janitor to run with the TokenOwner table (1709)
* Reordering decorators and policy checks to avoid unnecessary error messages (1751)
* Fix user enrollment for tokens that require certain read rights for RADIUS and
certificates by adding additional endpoint /system/names/... (1749, 1748)
* Use same transaction ID for all user tokens even with a TiQR token (1723)
* Improve challenge response to also check the matching of the transaction ID
right at the beginning (1699)
* Add event API requests to Audit log (1600)
* Fix configuring pre-eventhandler with empty condition makes authentication fail (1658)
* Improve UI by changing the cursor on all clickable elements (1725)
* Web UI: Focus the filter entry field in tables, when the filter is activated (1661)
* Fix some broken links in UI (1610)
* Fix double listing in policy list (1132)
* Remove additional empty line in audit log in case of an error (1707)
* Fix enrollment of certificate tokens under Python 3 (1799)

Page 6 of 14

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.