kanidm

Kanidm: A simple, secure and fast identity management platform

MPL-2.0 License

Downloads
65
Stars
2.6K
Committers
40

Bot releases are hidden (Show)

kanidm - v1.3.3

Published by Firstyear 2 months ago

2024-08-20 - Kanidm 1.3.3 Patch

  • A required re-index of the database was not correctly executed when upgrading from 1.2.x to 1.3.x. This triggers the re-index to occur on next server restart.
  • Substring indexes on mail attributes via ldap matched no entries.

2024-08-10 - Kanidm 1.3.2 Patch (Security)

  • Newer versions of Rust/LLVM would optimise-out a call to pam_get_user due to a library using const incorrectly on a pointer. This could result in a username not being set with an invalid fall through condition. In some cases this COULD CAUSE UNAUTHENTICATED system access.
    • Affected versions: 1.3.0 and 1.3.1.
  • Reduce logging of client_requests in INFO for unix resolver.
  • Security key migrations had an incorrect migration warning displayed.

2024-08-08 - Kanidm 1.3.1 Patch

  • Resolve incorrect logic in kanidm cli which prevented valid credential update sessions from being committed

2024-08-07 - Kanidm 1.3.0

This is the latest stable release of the Kanidm Identity Management project. Every release is the combined effort of our community and we appreciate their invaluable contributions, comments, questions, feedback and support.

You should review our support documentation
as this may have important effects on your distribution or upgrades in future.

Before upgrading you should review our upgrade documentation

1.3.0 Important Changes

  • New GID number constraints are now enforced in this version. To upgrade from 1.2.0 all accounts
    and groups must adhere to these rules. See our upgrade documentation.
    about tools to help you detect and correct affected entries.
  • OAuth2 URIs require stricter matching rules to be applied from 1.4.0.
  • Security Keys will be removed as a second factor alternative to TOTP from accounts in 1.4.0. It
    has not been possible to register a new security for more than 1 year. Security Keys are surpassed
    by PassKeys which give a better user experience.
  • Kanidm now supports FreeBSD and Illumos in addition to Linux

1.3.0 Release Highlights

  • TOTP update user interface improvements
  • Improved error messages when a load balancer is failing
  • Reduced server log noise to improve event clarity
  • Replace jemalloc with mimalloc
  • User session storage can optionally use cookies
  • Strictly enforce same-version for backup/restore processes
  • Allow name self-write to be withheld
  • Add support for LDAP Compare operations
  • Upgrade Axum HTTP framework to the latest stable
  • Reduced memory usage
  • Improved update flow when changing from dev to stable server versions
  • PIV authentication foundations
  • Significant improvements to performance for write and search operations
  • Support Illumos
  • Begin rewrite of the webui
  • OAuth2 allows multiple origins
  • Lengthen replication MTLS certificate lifetime
  • UNIX daemon allows home paths to be in an external mount folder
  • Strict redirect URI enforcement in OAuth2
  • Substring indexing for improved search performance
kanidm - v1.3.2

Published by Firstyear 2 months ago

2024-08-10 - Kanidm 1.3.2 Patch (Security)

  • Newer versions of Rust/LLVM would optimise-out a call to pam_get_user due to a library using const incorrectly on a pointer. This could result in a username not being set with an invalid fall through condition. In some cases this COULD CAUSE UNAUTHENTICATED system access.
    • Affected versions: 1.3.0 and 1.3.1.
  • Reduce logging of client_requests in INFO for unix resolver.
  • Security key migrations had an incorrect migration warning displayed.

2024-08-08 - Kanidm 1.3.1 Patch

  • Resolve incorrect logic in kanidm cli which prevented valid credential update sessions from being committed

2024-08-07 - Kanidm 1.3.0

This is the latest stable release of the Kanidm Identity Management project. Every release is the combined effort of our community and we appreciate their invaluable contributions, comments, questions, feedback and support.

You should review our support documentation
as this may have important effects on your distribution or upgrades in future.

Before upgrading you should review our upgrade documentation

1.3.0 Important Changes

  • New GID number constraints are now enforced in this version. To upgrade from 1.2.0 all accounts
    and groups must adhere to these rules. See our upgrade documentation.
    about tools to help you detect and correct affected entries.
  • OAuth2 URIs require stricter matching rules to be applied from 1.4.0.
  • Security Keys will be removed as a second factor alternative to TOTP from accounts in 1.4.0. It
    has not been possible to register a new security for more than 1 year. Security Keys are surpassed
    by PassKeys which give a better user experience.
  • Kanidm now supports FreeBSD and Illumos in addition to Linux

1.3.0 Release Highlights

  • TOTP update user interface improvements
  • Improved error messages when a load balancer is failing
  • Reduced server log noise to improve event clarity
  • Replace jemalloc with mimalloc
  • User session storage can optionally use cookies
  • Strictly enforce same-version for backup/restore processes
  • Allow name self-write to be withheld
  • Add support for LDAP Compare operations
  • Upgrade Axum HTTP framework to the latest stable
  • Reduced memory usage
  • Improved update flow when changing from dev to stable server versions
  • PIV authentication foundations
  • Significant improvements to performance for write and search operations
  • Support Illumos
  • Begin rewrite of the webui
  • OAuth2 allows multiple origins
  • Lengthen replication MTLS certificate lifetime
  • UNIX daemon allows home paths to be in an external mount folder
  • Strict redirect URI enforcement in OAuth2
  • Substring indexing for improved search performance
kanidm - v1.3.1

Published by Firstyear 3 months ago

2024-08-08 - Kanidm 1.3.1 Patch

  • Resolve incorrect logic in kanidm cli which prevented valid credential update sessions from being committed

2024-08-07 - Kanidm 1.3.0

This is the latest stable release of the Kanidm Identity Management project. Every release is the combined effort of our community and we appreciate their invaluable contributions, comments, questions, feedback and support.

You should review our support documentation
as this may have important effects on your distribution or upgrades in future.

Before upgrading you should review our upgrade documentation

1.3.0 Important Changes

  • New GID number constraints are now enforced in this version. To upgrade from 1.2.0 all accounts
    and groups must adhere to these rules. See our upgrade documentation.
    about tools to help you detect and correct affected entries.
  • OAuth2 URIs require stricter matching rules to be applied from 1.4.0.
  • Security Keys will be removed as a second factor alternative to TOTP from accounts in 1.4.0. It
    has not been possible to register a new security for more than 1 year. Security Keys are surpassed
    by PassKeys which give a better user experience.
  • Kanidm now supports FreeBSD and Illumos in addition to Linux

1.3.0 Release Highlights

  • TOTP update user interface improvements
  • Improved error messages when a load balancer is failing
  • Reduced server log noise to improve event clarity
  • Replace jemalloc with mimalloc
  • User session storage can optionally use cookies
  • Strictly enforce same-version for backup/restore processes
  • Allow name self-write to be withheld
  • Add support for LDAP Compare operations
  • Upgrade Axum HTTP framework to the latest stable
  • Reduced memory usage
  • Improved update flow when changing from dev to stable server versions
  • PIV authentication foundations
  • Significant improvements to performance for write and search operations
  • Support Illumos
  • Begin rewrite of the webui
  • OAuth2 allows multiple origins
  • Lengthen replication MTLS certificate lifetime
  • UNIX daemon allows home paths to be in an external mount folder
  • Strict redirect URI enforcement in OAuth2
  • Substring indexing for improved search performance
kanidm - v1.3.0

Published by Firstyear 3 months ago

2024-08-07 - Kanidm 1.3.0

This is the latest stable release of the Kanidm Identity Management project. Every release is
the combined effort of our community and we appreciate their invaluable contributions, comments,
questions, feedback and support.

You should review our
support documentation
as this may have important effects on your distribution or upgrades in future.

Before upgrading you should review our upgrade documentation

1.3.0 Important Changes

  • New GID number constraints are now enforced in this version. To upgrade from 1.2.0 all accounts
    and groups must adhere to these rules. See [our upgrade documentation].
    about tools to help you detect and correct affected entries.
  • OAuth2 URIs require stricter matching rules to be applied from 1.4.0.
  • Security Keys will be removed as a second factor alternative to TOTP from accounts in 1.4.0. It
    has not been possible to register a new security for more than 1 year. Security Keys are surpassed
    by PassKeys which give a better user experience.
  • Kanidm now supports FreeBSD and Illumos in addition to Linux

1.3.0 Release Highlights

  • TOTP update user interface improvements
  • Improved error messages when a load balancer is failing
  • Reduced server log noise to improve event clarity
  • Replace jemalloc with mimalloc
  • User session storage can optionally use cookies
  • Strictly enforce same-version for backup/restore processes
  • Allow name self-write to be withheld
  • Add support for LDAP Compare operations
  • Upgrade Axum HTTP framework to the latest stable
  • Reduced memory usage
  • Improved update flow when changing from dev to stable server versions
  • PIV authentication foundations
  • Significant improvements to performance for write and search operations
  • Support Illumos
  • Begin rewrite of the webui
  • OAuth2 allows multiple origins
  • Lengthen replication MTLS certificate lifetime
  • UNIX daemon allows home paths to be in an external mount folder
  • Strict redirect URI enforcement in OAuth2
  • Substring indexing for improved search performance
kanidm - v1.2.3

Published by Firstyear 5 months ago

2024-06-04 - Kanidm 1.2.3

In 1.2.0 a bug was discovered where the db_path variable was incorrectly handled.

This update corrects setting the db_path.

kanidm - v1.2.2

Published by Firstyear 5 months ago

2024-05-30 - Kanidm 1.2.2

In 1.2.0 a bug was discovered which prevented the commandline tools from removing session tokens after a logout. This did not affect the logout process, it only prevented removal of the now revoked token.

This update corrects the behaviour, improves output if a corrupted token is detected, and allows local token removal even if the token itself is invalid.

kanidm - v1.2.1

Published by Firstyear 5 months ago

2024-05-18 - Kanidm 1.2.1

In 1.2.0 a bug was discovered where the dynamic groups idm_all_persons and idm_all_accounts were not loaded correctly on restart. This caused users created after the restart to be missing these dynamic groups.

This patch release resolves the loading of these groups and contains an automated fix that triggers all dynamic groups to re-evaluate their members at start up to automatically fix any missing memberships.

We would like to thank @rungmc for their assistance to isolate and resolve this issue.

kanidm - v1.2.0

Published by Firstyear 6 months ago

2024-05-01 - Kanidm 1.2.0

This is the first stable release of the Kanidm Identity Management project. We want to thank every
one in our community who has supported to the project to this point with their invaluable
contributions, comments, questions, feedback and support.

Importantly this release makes a number of changes to our project's support processes. You should
review our support documentation
as this may have important effects on your distribution or upgrades in future.

1.2.0 Important Changes

  • On upgrade all OAuth2 sessions and user sessions will be reset due to changes in cryptographic key handling. This does not affect api tokens.
  • There is a maximum limit of 48 interactive sessions for persons where older sessions are automatically removed.

1.2.0 Release Highlights

  • The book now contains a list of supported RFCs and standards
  • Add code challenge methods to OIDC discovery
  • CLI lists authentication methods in security preference order
  • Mark replication as stable for two node usage
  • Automatically conflict and disable nscd and sssd in the unixd resolver
  • Harden unixd resolver against memory inspection
  • Enable unixd hardware TPM support
  • Allow setting resource limits in account policy to raise query limits
  • Reduce logging noise on /status checks
  • Allow /dev/tpmrm0 access on older systemd versions
  • Add an improved migration test framework
  • Create an object graph in the experimental admin ui
  • Add a built-in class for all entries that are system provided
  • Fix uid number range handling with systemd
  • Remodel orca for improved load testing features
  • Upgrade concread with non-blocking read transaction acquisition
  • ldap-sync allows re-use of attributes on entry import
  • Support improved MFA challenge response process in unixd
  • Add support for async tasks in unixd
  • Add improved TPM handling for unixd
  • Migrate cryptographic key handling to an object model with future HSM support
  • Limit maximum active sessions on an account to 48
kanidm - v1.2.0-pre

Published by Firstyear 6 months ago

Staged release for 1.2.0, due to be finalised on 2024-05-01.

kanidm - v1.1.0-rc.16

Published by Firstyear 9 months ago

2024-02-07 - Kanidm 1.1.0-rc.16

This is the sixteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

This is the final release candidate before we publish a release version. We believe that the API and
server interfaces are stable and reliable enough for people to depend on, and to develop external
tools to interact with Kanidm.

1.1.0-rc.16 Release Highlights

  • Replication for two node environments is now supported
  • Account policy supports password minimum length
  • Improve performance of webui
  • Add transitional compatability with SSSD
  • Improve TPM interfaces in unix clients
  • Allow importing more weak password schemes from FreeIPA
  • Support Attestation of Passkeys/Webauthn - this makes us the first IDM to support this!
  • Add entry-managed-by and hierarchial access control profiles
  • Rework and improve default access controls to further restrict default privileges
  • New replicated domain migration framework for distributed updates
  • Start to add PIV/Smartcard authentication groundwork
  • Allow changes to OAuth2 RS origin
  • Support RFC8414 OAuth2 metadata
  • Improve TLS error dialogs to assist administrators
  • Support RFC6749 Client Credentials Grant
  • Support custom claim maps in OIDC
kanidm - v1.1.0-rc.15

Published by yaleman 12 months ago

2023-10-31 - Kanidm 1.1.0-beta15

This is the fourteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

At this point we believe we are on the final stretch to making something we consider "release
ready". After this we will start to ship release candidates as our focus will now be changing to
finish our production components and the stability of the API's for longer term support.

1.1.0-beta15 Release Highlights

  • Replication is in Beta! Please test carefully!
  • Web UI WASM has been split up, significantly improving the responsiveness.
  • Resolved API JSON issues from 1.1.0-beta13
  • Swapped a lot of internal string constants for enums.
  • Added shortcuts for RW token sessions.
  • TLS client validation improvement
  • Minimum TLS key length enforcement on server code.
  • Improvements to exit code returns on CLI commands.
  • Credential reset link timeout issues resolved.
  • Removed a lot of uses of unwrap and expect to improve reliabilty.
  • Account policy framework is now in place.
kanidm - v1.1.0-beta.13

Published by Firstyear about 1 year ago

2023-05-01 - Kanidm 1.1.0-beta13

This is the thirteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

At this point we believe we are on the final stretch to making something we consider "release
ready". After this we will start to ship release candidates as our focus will now be changing to
finish our production components and the stability of the API's for longer term support.

Release Highlights

  • Replication foundations
    • Full implementation of replication refresh
    • Full implementation of incremental replication
    • RUV consistency is now stricter
  • Allow tpm binding unixd password hash cache
  • Use argon2id for all password hash types
  • Allow distros to set default shell
  • Convert from tide to axum
  • Modularise unix integration for third party modules
  • Improve account recovery by performing over unix socket for live changes
  • Support hsts in all responses
  • Allow sync agreements to yield some attrs to kanidm
  • Fix bug with posix account gid setting causing gid to be randomised
  • Improve account sync import, including mail attrs and better session handling
  • Bug fix in unixd when certain operation orders could cause group cache to be ignored
  • pre-compress all wasm to improve loading times
  • Add preflight headers for SPA oauth2 clients
  • Persist nonce through refresh tokens to support public clients
  • Allow public (pkce) oauth2 clients
  • Add client UX for external credential portals for synchronised accounts
  • Improve migration durability with a global transaction
  • Cli now shows spn instead of username to allow better multidomain admin
  • Add qrcode for self-enrolling other devices with auth methods
  • Add tls certgen to main binary to improve developer and quickstart setup
  • Unixd now blocks all local account names and id's resolving prevent priv-esc
  • Fix bug with service-account session logout access
  • Oauth2 app list shows when no applications are available
  • Improve ip audit logging
  • Improve cli with re-auth when session is expired
  • Support legacy cron syntax in backup config
  • Improve socket startup in main daemon
  • Add support for selinux labeling of home dirs by tasks daemon
  • Resolve bug in ssh key management if key tag has a space in it
  • Allow tokens to be identified
  • Remove incompatible credentials for service accounts during recovery
  • Fix issues with signal handling for unix tasks daemon
  • Improve create-reset-token user experience
  • Improve self-healing for some reference issues
kanidm - v1.1.0-alpha.12

Published by Firstyear over 1 year ago

2023-02-01 - Kanidm 1.1.0-alpha12

This is the twelfth alpha series release of the Kanidm Identity Management project. Alpha releases
are to help get feedback and ideas from the community on how we can continue to make this project
better for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon! The main reason we haven't
done so yet is we haven't decided if we want to commit to the current API layout and freeze it yet.
There are still things we want to change there. Otherwise the server is stable and reliable for
production usage.

Release Highlights

  • Allow full server content replication in testing (yes we're finally working on replication!)
  • Improve oauth2 to allow scoped members to see RS they can access for UI flows
  • Performance improvement by reducing clones
  • Track credential uuid used for session authentication in the session
  • Remove the legacy webauthn types for newer attributes
  • Improve the logo to recurse
  • Add privilege separation and re-authentication for time limited access
  • Improve builds on windows
  • Cleanup source tree layout to make it easier for new contributors
  • Improve exit codes of unixd tools
  • Restrict valid chars in some string contexts in entries
  • Allow configuration of ldap basedn
  • Extend oauth2 session lifetimes, add refresh token support
  • Improve user experience of credential updates via intent tokens
  • Consolidate unix tools
  • Add exclusive process lock to daemon
  • Allow dns/rdns in ldap search contexts
kanidm - v1.1.0-alpha.11

Published by Firstyear over 1 year ago

2023-02-01 - Kanidm 1.1.0-alpha11

This is the eleventh alpha series release of the Kanidm Identity Management project. Alpha releases are
to help get feedback and ideas from the community on how we can continue to make this project better
for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon! The main reason we haven't done
so yet is we haven't decided if we want to commit to the current API layout and freeze it yet. There
are still things we want to change there. Otherwise the server is stable and reliable.

Release Highlights

  • Support /etc/skel home dir templates in kanidm-unixd
  • Improve warning messages for openssl when a cryptographic routine is not supported
  • Support windows for server tests
  • Add a kanidm tools container
  • Initial support for live sync/import of users and groups from FreeIPA
  • Oauth2 session logout and global logout support
  • UI polish based on hint flags to dynamically enable/disable elements
  • Oauth2 single sign on application portal
  • Support dn=token for ldap client binds
  • Trap more signals for daemons
  • Mail read permission group
  • Oauth2 add a groups claim
  • LDAP support for mail primary and alternate address selectors in queries
  • Fix handling of virtual attrs with '*' searches in ldap
  • Support multiple TOTP on accounts
  • Add kanidmd healthcheck for containers
  • Improve the access control module to evaluate access in a clearer way
  • Allow synced users to correct modify their local sessions
kanidm - v1.1.0-alpha.10

Published by Firstyear almost 2 years ago

2022-11-01 - Kanidm 1.1.0-alpha10

This is the tenth alpha series release of the Kanidm Identity Management
project. Alpha releases are to help get feedback and ideas from the community
on how we can continue to make this project better for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon!

Upgrade Note!

This version will require TLS on all servers, even if behind a load balancer or
TLS terminating proxy. You should be ready for this change when you upgrade to the
latest version.

Release Highlights

  • Management and tracking of authenticated sessions
  • Make upgrade migrations more robust when upgrading over multiple versions
  • Add support for service account tokens via ldap for extended read permissions
  • Unix password management in web ui for posix accounts
  • Support internal dynamic group entries
  • Allow selection of name/spn in oidc claims
  • Admin UI wireframes and basic elements
  • TLS enforced as a requirement for all servers
  • Support API service account tokens
  • Make name rules stricter due to issues found in production
  • Improve Oauth2 PKCE testing
  • Add support for new password import hashes
  • Allow configuration of trusting x forward for headers
  • Components for account permission elevation modes
  • Make pam_unix more robust in high latency environments
  • Add proc macros for test cases
  • Improve authentication requests with cookie/token seperation
  • Cleanup of expired authentication sessions
  • Improved administration of password badlists
kanidm - v1.1.0-alpha.9

Published by Firstyear about 2 years ago

2022-08-02 - Kanidm 1.1.0-alpha9

This is the ninth alpha series release of the Kanidm Identity Management
project. Alpha releases are to help get feedback and ideas from the community
on how we can continue to make this project better for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon!

Release Highlights

  • Inclusion of a Python3 API library
  • Improve orca usability
  • Improved content security hashes of js/wasm elements
  • Performance improvements in builds
  • Windows development and service support
  • WebUI polish and improvements
  • Consent is remembered in oauth2 improving access flows
  • Replication changelog foundations
  • Compression middleware for static assests to reduce load times
  • User on boarding now possible with self service credential reset
  • TOTP and Webauthn/Passkey support in self service credential reset
  • CTAP2+ support in Webauthn via CLI
  • Radius supports EAP TLS identities in addition to EAP PEAP
kanidm - v1.1.0-alpha.8

Published by Firstyear over 2 years ago

2022-05-01 - Kanidm 1.1.0-alpha8

This is the eighth alpha series release of the Kanidm Identity Management
project. Alpha releases are to help get feedback and ideas from the community
on how we can continue to make this project better for a future supported release.

Release Highlights

  • Foundations for cryptographic trusted device authentication
  • Foundations for new user onboarding and credential reset
  • Improve acis for administration of radius secrets
  • Simplify initial server setup related to domain naming
  • Improve authentication performance during high load
  • Developer documentation improvements
  • Resolve issues with client tool outputs not being displayed
  • Show more errors on api failures
  • Extend the features of account person set
  • Link pam with pkg-config allowing more portable builds
  • Allow self-service email addresses to be delegated
  • Highlight that the WebUI is in alpha to prevent confusion
  • Remove sync only client paths
kanidm - v1.1.0-alpha.7

Published by Firstyear over 2 years ago

What's Changed

New Contributors

Full Changelog: https://github.com/kanidm/kanidm/compare/v1.1.0-alpha.6...v1.1.0-alpha.7

kanidm - v1.1.0-alpha.6

Published by Firstyear about 3 years ago

2021-10-01 - Kanidm 1.1.0-alpha6

This is the sixth alpha series release of the Kanidm Identity Management
project. Alpha releases are to help get feedback and ideas from the community
on how we can continue to make this project better for a future supported release.

It's also a special release as Kanidm has just turned 3 years old! Thank you all
for helping to bring the project this far! 🎉 🦀

Release Highlights

  • Support backup codes as MFA in case of lost TOTP/Webauthn
  • Dynamic menus on CLI for usernames when multiple sessions exist
  • Dynamic menus on CLI for auth factors when choices exist
  • Better handle missing resources for web ui elements at server startup
  • Add WAL checkpointing to improve disk usage
  • Oauth2 user interface flows for simple authorisation scenarioes
  • Improve entry memory usage based on valueset rewrite
  • Allow online backups to be scheduled and taken
  • Reliability improvements for unixd components with missing sockets
  • Error message improvements for humans
  • Improve client address logging for auditing
  • Add strict HTTP resource headers for incoming/outgoing requests
  • Replace rustls with openssl for HTTPS endpoint
  • Remove auditscope in favour of the new tracing logging subsystem
  • Reduce server memory usage with entry tracking improvements
  • Improvements to performance with high cache sizes
  • Session tokens persist over a session restart
kanidm - v1.1.0-alpha.3

Published by Firstyear almost 4 years ago

Release Highlights

  • Account "valid from" and "expiry" times.
  • Rate limiting and softlocking of account credentials to prevent bruteforcing.
  • Foundations of webauthn and multiple credential support.
  • Rewrite of json authentication protocol components.
  • Unixd will cache "non-existant" items to improve nss/pam latency.
Package Rankings
Top 6.75% on Proxy.golang.org
Top 9.24% on Crates.io
Top 15.55% on Pypi.org