Flexible Two-Factor-Authentication
Book your two factor authentication workshop
or get an easy remote installation.
Get in touch
privacyIDEA
The award winning open source solution for flexible 2FA
Learn more about privacyIDEA
Previous
Next

NEWS

privacyIDEA Credential Provider
Two-Factor Authentication at the Windows Desktop – Offline
The new version 3.0 of the privacyIDEA Credential Provider is available now. It allows easy authentication with push notifications via smartphone and offline functionality with HOTP tokens like the Yubikey.
WebAuthn
privacyIDEA 3.3 allows central management of WebAuthn tokens
Open source security specialist NetKnights has released a new version of its multi-factor authentication software privacyIDEA. The new version allows organizations to centrally manage users' WebAuthn tokens in privacyIDEA, making modern authentication technologies available to the enterprise. A new event handler module will also allow individual connection to central logging systems such as Logstash or Splunk.
Event
privacyIDEA at Chemnitzer Linux Tage 2020
Once again, privacyIDEA will be at the Chemnitzer Linux Tage, CLT2020. This time Cornelius Kölbel will talk about two-factor authentication (2FA) in the Single Sign-On (SSO) context.
Event
privacyIDEA at Southern California Linux Expo – SCaLE 18X
privacyIDEA Vortrag auf der Southern California Linux Expo (SCaLE 18X) über den Nutzen von Open Source in Zeiten von Mergers & Akquisitions
ownCloud
Login at ownCloud using Push notification
Using the privacyIDEA ownCloud App users can now login to ownCloud receiving a Push notification on their smartphone. The user logs in to the ownCloud web interface using his username and password. He then receives a push notification on his smartphone. Only after accepting this notification the user is finally logged in to ownCloud.
Two-Factor-System privacyIDEA 3.2 offers fully customizable authentication workflows
With version 3.2 of privacyIDEA, the administrator receives two new event handler modules to define rules that can modify both HTTP requests and HTTP responses of the REST API as required. This allows workflows to be highly customized. It is now possible to easily forward audit information to external log management tools such as Splunk or Logstash and process it there. The authentication at the REST-API has been extended so that a robust integration into any other application can be implemented.