Skip to main content

privacyIDEA: identity, multifactor authentication, authorization, audit

Project description

privacyIDEA is an open solution for strong two-factor authentication. privacyIDEA aims to not bind you to any decision of the authentication protocol or it does not dictate you where your user information should be stored. This is achieved by its totally modular architecture. privacyIDEA is not only open as far as its modular architecture is concerned. But privacyIDEA is completely licensed under the AGPLv3.

privacyIDEA is a fork of LinOTP.

Code test on travis-ci.org

Tests are running on travis-ci.org. See the test coverage at coveralls.io.

[![Build Status][BS img]][Build Status] [![Coverage Status][CS img]][Coverage Status]

[Build Status]: https://travis-ci.org/privacyidea/privacyidea [Coverage Status]: https://coveralls.io/r/privacyidea/privacyidea

[BS img]: https://travis-ci.org/privacyidea/privacyidea.svg?branch=master [CS img]: https://coveralls.io/repos/privacyidea/privacyidea/badge.png?branch=master

Installation

Installing privacyIDEA can be performed easily by issuing the commands:

$ pip install privacyidea

privacyIDEA comes with its own user authentication for administrators and normal users. Thus you can start directly by creating the database. In the example configuration file the database is an SQLite database:: located at:

$ paster setup-app config/privacyidea.ini.example

In the config file privacyidea.ini.example the already shipped encryption key “dummy-encKey” is referenced. Of course, you should create an encryption key and change in in the privacyidea.ini.example:

$ dd if=/dev/random of=etc/privacyidea/encKey bs=1 count=96

Then start the webserver by issuing:

$ paster serve config/privacyidea.ini.example

Authentication

privacyIDEA has one login window at https://localhost:5001 to login for either as normal users or administrators. You need to create the first administrator to login. This administrator than can * create UserIdResolvers * a realm * and enroll tokens. To create an administrator do this:

$ privacyidea-create-pwidresolver-user -u <admin-name> -p <secret-password> -i 1000 >> config/admin-users

You then can login with the user <admin-name> and the password <secret-password>. All the administrators are stored in the file defined in the privacyIDEA.ini entry “privacyideaSuperuserFile”.

Options

You can adapt the file etc/privacyidea/privacyidea.ini.example. There you need to configure the database connection with an existing database and user:

sqlalchemy.url = mysql://user:password@localhost/privacyIDEA

Then you can create the database like above:

$ paster setup-app etc/privacyidea/privacyidea.ini.example

You can change the location of your log file:

$ mkdir /var/log/privacyidea

Authentication

You can use the web API to authenticate users. If you enrolled a token for a user, you can authenticate the user by calling the URL:

http://yourserver:5001/validate/check?user=you&pass=pin123456

Yubikeys

privacyIDEA supports Yubikeys. To enroll yubikeys you need to install the admin client:

$ pip install privacyidea-adm

Tests

If you want to see, if everything works fine, you can run the functional tests. There are roughly 350 sometimes complex tests, running the tests will take about 10 minutes. Do it like this:

$ python setup.py build
$ ./test.sh

Questions

Take a look at http://privacyidea.org and join the google group https://groups.google.com/forum/#!forum/privacyidea.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

privacyIDEA-1.0dev4.tar.gz (4.6 MB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page