Skip to main content

privacyIDEA: identity, multifactor authentication, authorization, audit

Project description

privacyIDEA is an open solution for strong two-factor authentication. privacyIDEA aims to not bind you to any decision of the authentication protocol or it does not dictate you where your user information should be stored. This is achieved by its totally modular architecture. privacyIDEA is not only open as far as its modular architecture is concerned. But privacyIDEA is completely licensed under the AGPLv3.

privacyIDEA is a fork of LinOTP.

Code test on travis-ci.org

Tests are running on travis-ci.org. See the test coverage at coveralls.io.

[![Build Status][BS img]][Build Status] [![Coverage Status][CS img]][Coverage Status]

[Build Status]: https://travis-ci.org/privacyidea/privacyidea [Coverage Status]: https://coveralls.io/r/privacyidea/privacyidea

[BS img]: https://travis-ci.org/privacyidea/privacyidea.svg?branch=master [CS img]: https://coveralls.io/repos/privacyidea/privacyidea/badge.png?branch=master

Installation

You can install privacyIDEA into a python virtualenv. Installing privacyIDEA can be performed easily by issuing the pip command:

$ pip install privacyidea

privacyIDEA comes with its own user authentication for administrators and normal users. Thus you can start directly by creating the database. In the example configuration file the database is an SQLite database located at:

$ paster setup-app etc/privacyidea/privacyidea.ini.example

In the config file privacyidea.ini.example the already shipped encryption key “dummy-encKey” is referenced. Of course, you should create an encryption key and change in in the privacyidea.ini.example:

$ dd if=/dev/random of=etc/privacyidea/encKey bs=1 count=96

Then start the webserver by issuing:

$ paster serve etc/privacyidea/privacyidea.ini.example

Authentication

privacyIDEA has one login window at https://localhost:5001 to login for either as normal users or administrators. You need to create the first administrator to login. This administrator than can * create UserIdResolvers * a realm * and enroll tokens.

To create an administrator do this:

$ privacyidea-create-pwidresolver-user -u admin_name -p secret_password -i 1000 >> etc/privacyidea/admin-users

You then can login with the user admin-name and the password secret-password. All the administrators are stored in the file defined in the privacyIDEA.ini entry “privacyideaSuperuserFile”.

Options

You can adapt the file etc/privacyidea/privacyidea.ini.example. There you need to configure the database connection with an existing database and user:

sqlalchemy.url = mysql://user:password@localhost/privacyIDEA

Then you can create the database like above:

$ paster setup-app etc/privacyidea/privacyidea.ini.example

You can change the location of your log file:

$ mkdir /var/log/privacyidea

Authentication

You can use the web API to authenticate users. If you enrolled a token for a user, you can authenticate the user by calling the URL:

http://yourserver:5001/validate/check?user=you&pass=pin123456

Yubikeys

privacyIDEA supports Yubikeys. To enroll yubikeys you need to install the admin client:

$ pip install privacyideaadm

Tests

If you want to see, if everything works fine, you can run the functional tests. There are roughly 350 sometimes complex tests, running the tests will take about 30 minutes. Do it like this:

$ python setup.py build
$ ./test.sh

Questions

Take a look at http://privacyidea.org and join the google group https://groups.google.com/forum/#!forum/privacyidea.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

privacyIDEA-1.3.2.tar.gz (4.3 MB view details)

Uploaded Source

File details

Details for the file privacyIDEA-1.3.2.tar.gz.

File metadata

  • Download URL: privacyIDEA-1.3.2.tar.gz
  • Upload date:
  • Size: 4.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for privacyIDEA-1.3.2.tar.gz
Algorithm Hash digest
SHA256 0e878f53f6c58dbc0b4b6c5fa526960dd933fe0509fb53eda457440dcb53da31
MD5 d020672809f148559f4e83c845db6359
BLAKE2b-256 31b6dcad5b24275ca4675cddad14c2c4647a0c000e90d4ef4fcb875f3067ef7c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page