Skip to main content

privacyIDEA: multifactor authentication management system

Project description

https://codecov.io/gh/privacyidea/privacyidea/coverage.svg?branch=master Latest Version PyPI - Python Version License Documentation

privacyIDEA: Open-Source Multi-Factor Authentication

privacyIDEA is an open-source MFA platform for orchestrating all your multi-factor authentication needs. Secure your entire stack with a flexible, self-hosted solution that puts you in control. As an on-premise platform, your sensitive user data always remains within your infrastructure.

Key Features

  • Universal MFA: Add a second factor to virtually any application—from SSH and VPNs to IdPs like Keycloak and web portals.

  • Extensive Factor Support: Go beyond simple OTP. We support everything from cutting-edge Passkeys and push authentication to various OTP types.

  • Vendor-Agnostic: Connect to your existing user stores (AD, LDAP, SQL, EntraID) without being locked into a specific ecosystem.

  • Truly Open: Licensed under AGPLv3 to guarantee your software freedom, always.

Supported Authentication Factors

  • 🔑 Passkeys & Hardware: FIDO2/WebAuthn devices (like YubiKey, Plug-Up).

  • 💳 Smartcards (PIV/x509): Connect to a Microsoft CA using the ms-ca-service and enroll certificates directly to PIV-compatible devices with our enrollment client for Windows.

  • 📱 Software & Mobile: Use the privacyIDEA Authenticator for PUSH notifications, TOTP, and HOTP; for standard TOTP/HOTP, other apps like Google Authenticator are also compatible. TiQR is also supported.

  • 📜 Classic & Remote: SMS, Email, SSH Keys, Security Questionnaires, and simple Registration Codes for easy rollout.

Seamless Integration

Enhance the security of your existing infrastructure:


Join the Community

Have feedback, questions, or ideas? Join the discussion on our community forum: https://community.privacyidea.org

Setup

For setting up the system to run it, please read install instructions at privacyidea.readthedocs.io.

If you want to setup a development environment start like this:

git clone https://github.com/privacyidea/privacyidea.git
cd privacyidea
virtualenv venv
source venv/bin/activate
pip install -r requirements.txt

You may additionally want to set up your environment for testing, by adding the additional dependencies:

pip install -r tests/requirements.txt

You may also want to read the blog post about development and debugging at https://www.privacyidea.org/privacyidea-development-howto/

Running it

First You need to create a config-file.

Then create the database tables and the encryption key:

./pi-manage create_tables
./pi-manage create_enckey

If You want to keep the development database upgradable, You should stamp it to simplify updates:

./pi-manage db stamp head -d migrations/

Create the key for the audit log:

./pi-manage create_audit_keys

Create the first administrator:

./pi-manage admin add <username>

Run it:

./pi-manage run

Now you can connect to http://localhost:5000 with your browser and login as administrator.

Run tests

If you have followed the steps above to set up your environment for testing, running the test suite should be as easy as running pytest with the following options:

python -m pytest -v --cov=privacyidea --cov-report=html tests/

Contributing

There are a lot of different ways to contribute to privacyIDEA, even if you are not a developer.

If you found a security vulnerability please report it to security@privacyidea.org.

You can find detailed information about contributing here: https://github.com/privacyidea/privacyidea/blob/master/CONTRIBUTING.md

Code structure

The database models are defined in models.py and tested in tests/test_db_model.py.

Based on the database models there are the libraries lib/config.py which is responsible for basic configuration in the database table config. And the library lib/resolver.py which provides functions for the database table resolver. This is tested in tests/test_lib_resolver.py.

Based on the resolver there is the library lib/realm.py which provides functions for the database table realm. Several resolvers are combined into a realm.

Based on the realm there is the library lib/user.py which provides functions for users. There is no database table user, since users are dynamically read from the user sources like SQL, LDAP, SCIM or flat files.

Subscriptions and limitations of community edition

Using privacyIDEA Server and the privacyIDEA FreeRADIUS plugin there is technically no limitation of the community edition or the code in this repository. Admins will receive a welcome message about possible support, if more than 50 users are enrolled.

Plugins

The privacyIDEA project also provides several plugins for 3rd party applications like SSO Identity Providers or Windows Login.

Plugins can be limited in the number of users. I.e. the plugin will complain, if the total number of users in privacyIDEA with an active token exceeds a certain limit. There is a certain base number of users, with which the plugin will work. To enhance this number, you will need a subscription. In some cases an additional demo subscription can be found in the release list of the corresponding github plugin repository, you can get a subscription from the company NetKnights or if you have a very good understanding of this Open Source code, you could create a subscription on your own.

Plugin

Number of users

Name

contained

in demo subscription

Keycloak

10000

N/A

SimpleSAMLphp

10000

N/A

Shibboleth

10000

N/A

ADFS

50

50

privacyIDEA PAM

10000

N/A

Credential Provider

50

50

nextCloud

50

N/A

ownCloud

50

N/A

LDAP proxy

50

N/A

Versioning

privacyIDEA adheres to Semantic Versioning.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

privacyidea-3.12.1.tar.gz (16.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

privacyidea-3.12.1-py3-none-any.whl (7.6 MB view details)

Uploaded Python 3

File details

Details for the file privacyidea-3.12.1.tar.gz.

File metadata

  • Download URL: privacyidea-3.12.1.tar.gz
  • Upload date:
  • Size: 16.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for privacyidea-3.12.1.tar.gz
Algorithm Hash digest
SHA256 5b1edf3fe02fb4594bb3282c1ae117f9c9e81d591656608fe5a3ef5541a29c98
MD5 47223cfd5aa0900c01b07dacc999b9d0
BLAKE2b-256 568720529970d44eda1e276744ef77abefc6e470378eb7eafea5a7991d5f6757

See more details on using hashes here.

File details

Details for the file privacyidea-3.12.1-py3-none-any.whl.

File metadata

  • Download URL: privacyidea-3.12.1-py3-none-any.whl
  • Upload date:
  • Size: 7.6 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for privacyidea-3.12.1-py3-none-any.whl
Algorithm Hash digest
SHA256 dcaf19c358d755f4499ae1747a7d19c1bc00a09584aa0ccf91d8e2b10c6d806d
MD5 69f654d94a19fbcd14784ba801c3678d
BLAKE2b-256 12d82b64eaf547efd6437b78e115ac0491d2e77523890053e791ce2e586ddc4a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page