Skip to content

Instantly share code, notes, and snippets.

@michimau
Created January 14, 2022 12:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save michimau/473e7ab2908271b897ede0775fb36ee3 to your computer and use it in GitHub Desktop.
Save michimau/473e7ab2908271b897ede0775fb36ee3 to your computer and use it in GitHub Desktop.
privacyidea 3.3.1 pi-ad
2022-01-14 11:58:32,227][557][140069404256000][DEBUG][privacyidea.api.before_after:84] Begin handling of request u'/validate/check?'
[2022-01-14 11:58:32,227][557][140069404256000][DEBUG][privacyidea.api.lib.utils:254] Can not get param: No JSON object could be decoded
[2022-01-14 11:58:32,227][557][140069404256000][DEBUG][privacyidea.lib.user:186] Entering get_user_from_param with arguments ({'user': u'admin', 'pass': u'changeme'},) and keywords {}
[2022-01-14 11:58:32,228][557][140069404256000][DEBUG][privacyidea.lib.config:186] Entering get_from_config with arguments ('splitAtSign',) and keywords {'return_bool': True}
[2022-01-14 11:58:32,228][557][140069404256000][DEBUG][privacyidea.lib.config:323] Cloning request-local config from shared config object
[2022-01-14 11:58:32,228][557][140069404256000][DEBUG][privacyidea.lib.config:280] Creating new shared config object
[2022-01-14 11:58:32,281][557][140069404256000][DEBUG][privacyidea.lib.utils:759] Values are not initialized. We need to reread policies from DB.
[2022-01-14 11:58:32,282][557][140069404256000][DEBUG][privacyidea.lib.utils:764] timestamp in DB newer. We need to reread policies from DB.
[2022-01-14 11:58:32,282][557][140069404256000][DEBUG][privacyidea.lib.config:102] Reloading shared config from database
[2022-01-14 11:58:32,286][557][140069404256000][DEBUG][privacyidea.lib.crypto:186] Entering decryptPassword with arguments (u'1b333fbb28f2c4522c6e504d416a6937:6352cd4ce414c4bf5690df5e36584000acbb492da426a956f5e51c35a78bdb0d',) and keywords {}
[2022-01-14 11:58:32,287][557][140069404256000][DEBUG][privacyidea.lib.utils:1198] klass: <class 'privacyidea.lib.security.default.DefaultSecurityModule'>
[2022-01-14 11:58:32,287][557][140069404256000][INFO][privacyidea.lib.crypto:781] initializing HSM class: <class 'privacyidea.lib.security.default.DefaultSecurityModule'>
[2022-01-14 11:58:32,287][557][140069404256000][INFO][privacyidea.lib.crypto:220] Initialized HSM object {'obj': <privacyidea.lib.security.default.DefaultSecurityModule object at 0x7f645692f310>}
[2022-01-14 11:58:32,288][557][140069404256000][DEBUG][privacyidea.lib.crypto:186] Entering aes_cbc_decrypt with arguments ("\xb6l\x02\xe0\x08\xe7\xc1\xd8\xd5l\x0f '\x10HV\xf5\x88Q\xd4\x8f\xe2\xba\x81\x8a\xf2|!H\x85O\xa9", '\x1b3?\xbb(\xf2\xc4R,nPMAji7', 'cR\xcdL\xe4\x14\xc4\xbfV\x90\xdf^6X@\x00\xac\xbbI-\xa4&\xa9V\xf5\xe5\x1c5\xa7\x8b\xdb\r') and keywords {}
[2022-01-14 11:58:32,288][557][140069404256000][DEBUG][privacyidea.lib.crypto:200] Exiting aes_cbc_decrypt with result HIDDEN
[2022-01-14 11:58:32,288][557][140069404256000][DEBUG][privacyidea.lib.crypto:200] Exiting decryptPassword with result HIDDEN
[2022-01-14 11:58:32,300][557][140069404256000][DEBUG][privacyidea.lib.config:198] Exiting get_from_config with result True
[2022-01-14 11:58:32,300][557][140069404256000][DEBUG][privacyidea.lib.user:186] Entering split_user with arguments (u'admin',) and keywords {}
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.user:198] Exiting split_user with result (u'admin', '')
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.realm:186] Entering get_default_realm with arguments () and keywords {}
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.realm:198] Exiting get_default_realm with result ad
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.user:186] Entering __init__ with arguments (User(login='', realm='', resolver=''),) and keywords {'login': u'admin', 'realm': u'ad', 'resolver': None}
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.config:186] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
[2022-01-14 11:58:32,301][557][140069404256000][DEBUG][privacyidea.lib.config:198] Exiting get_from_config with result 0
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.user:186] Entering get_ordererd_resolvers with arguments (User(login=u'admin', realm=u'ad', resolver=''),) and keywords {}
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.realm:186] Entering get_realms with arguments (u'ad',) and keywords {}
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.realm:198] Exiting get_realms with result {u'ad': {'default': True, 'option': u'', 'resolver': [{'priority': None, 'type': u'ldapresolver', 'name': u'AD'}]}}
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.user:198] Exiting get_ordererd_resolvers with result [u'AD']
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.resolver:186] Entering get_resolver_object with arguments (u'AD',) and keywords {}
[2022-01-14 11:58:32,302][557][140069404256000][DEBUG][privacyidea.lib.resolver:186] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'AD'}
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.resolver:200] Exiting get_resolver_list with result HIDDEN
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.config:186] Entering get_resolver_list with arguments () and keywords {}
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.config:649] None
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.config:198] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.config:786] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
[2022-01-14 11:58:32,303][557][140069404256000][DEBUG][privacyidea.lib.config:794] import module: privacyidea.lib.resolvers.PasswdIdResolver
[2022-01-14 11:58:32,304][557][140069404256000][DEBUG][privacyidea.lib.config:794] import module: privacyidea.lib.resolvers.SCIMIdResolver
[2022-01-14 11:58:32,304][557][140069404256000][DEBUG][privacyidea.lib.config:794] import module: privacyidea.lib.resolvers.SQLIdResolver
[2022-01-14 11:58:32,311][557][140069404256000][DEBUG][privacyidea.lib.config:794] import module: privacyidea.lib.resolvers.LDAPIdResolver
[2022-01-14 11:58:32,339][557][140069404256000][DEBUG][privacyidea.lib.config:603] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
[2022-01-14 11:58:32,339][557][140069404256000][DEBUG][privacyidea.lib.config:603] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
[2022-01-14 11:58:32,339][557][140069404256000][DEBUG][privacyidea.lib.config:603] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
[2022-01-14 11:58:32,340][557][140069404256000][DEBUG][privacyidea.lib.config:603] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
[2022-01-14 11:58:32,340][557][140069404256000][DEBUG][privacyidea.lib.resolver:186] Entering get_resolver_config with arguments (u'AD',) and keywords {}
[2022-01-14 11:58:32,340][557][140069404256000][DEBUG][privacyidea.lib.resolver:186] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'AD'}
[2022-01-14 11:58:32,340][557][140069404256000][DEBUG][privacyidea.lib.resolver:200] Exiting get_resolver_list with result HIDDEN
[2022-01-14 11:58:32,340][557][140069404256000][DEBUG][privacyidea.lib.resolver:200] Exiting get_resolver_config with result HIDDEN
[2022-01-14 11:58:32,342][557][140069404256000][DEBUG][privacyidea.lib.resolvers.LDAPIdResolver:173] Get LDAP schema info: 'SCHEMA'
[2022-01-14 11:58:32,342][557][140069404256000][DEBUG][privacyidea.lib.resolver:198] Exiting get_resolver_object with result <privacyidea.lib.resolvers.LDAPIdResolver.IdResolver object at 0x7f645691c4d0>
[2022-01-14 11:58:32,343][557][140069404256000][DEBUG][privacyidea.lib.resolvers.LDAPIdResolver:869] Added plover.eea.eu.int, 389, False to server pool.
[2022-01-14 11:58:32,483][557][140069404256000][DEBUG][privacyidea.lib.resolvers.LDAPIdResolver:1276] Doing start_tls
[2022-01-14 11:58:34,159][557][140069404256000][DEBUG][privacyidea.lib.resolvers.LDAPIdResolver:608] login name filter: u'mail=admin'
[2022-01-14 11:58:34,160][557][140069404256000][DEBUG][privacyidea.lib.resolvers.LDAPIdResolver:616] Searching user u'admin' in LDAP.
[2022-01-14 11:58:34,195][557][140069404256000][DEBUG][privacyidea.lib.user:241] user u'admin' not found in resolver u'AD'
[2022-01-14 11:58:34,195][557][140069404256000][DEBUG][privacyidea.lib.resolver:186] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': ''}
[2022-01-14 11:58:34,196][557][140069404256000][DEBUG][privacyidea.lib.resolver:200] Exiting get_resolver_list with result HIDDEN
[2022-01-14 11:58:34,196][557][140069404256000][DEBUG][privacyidea.lib.user:198] Exiting __init__ with result None
[2022-01-14 11:58:34,196][557][140069404256000][DEBUG][privacyidea.lib.user:198] Exiting get_user_from_param with result <admin@ad>
[2022-01-14 11:58:34,196][557][140069404256000][DEBUG][privacyidea.lib.audit:189] Entering getAudit with arguments HIDDEN and keywords HIDDEN
[2022-01-14 11:58:34,198][557][140069404256000][DEBUG][privacyidea.lib.utils:1198] klass: <class 'privacyidea.lib.auditmodules.sqlaudit.Audit'>
[2022-01-14 11:58:34,198][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:186] Entering read_keys with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f64550733d0>, '/etc/privacyidea/public.pem', '/etc/privacyidea/private.pem') and keywords {}
[2022-01-14 11:58:34,199][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:198] Exiting read_keys with result None
[2022-01-14 11:58:34,199][557][140069404256000][INFO][privacyidea.lib.pooling:119] Created a new engine registry: <privacyidea.lib.pooling.SharedEngineRegistry object at 0x7f6455073450>
[2022-01-14 11:58:34,200][557][140069404256000][INFO][privacyidea.lib.pooling:84] Creating a new engine and connection pool for key sqlaudit
[2022-01-14 11:58:34,200][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.sqlaudit:122] using the connect string mysql+pymysql://pi:xxxx@localhost/pi
[2022-01-14 11:58:34,202][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.sqlaudit:129] Using SQL pool size of 20
[2022-01-14 11:58:34,203][557][140069404256000][DEBUG][privacyidea.lib.audit:198] Exiting getAudit with result <privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f64550733d0>
[2022-01-14 11:58:34,204][557][140069404256000][DEBUG][privacyidea.lib.config:186] Entering get_from_config with arguments ('OverrideAuthorizationClient',) and keywords {}
[2022-01-14 11:58:34,204][557][140069404256000][DEBUG][privacyidea.lib.config:198] Exiting get_from_config with result None
[2022-01-14 11:58:34,206][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'push_wait', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,207][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,207][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,207][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,208][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,209][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,209][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'setrealm', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authorization', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,210][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,210][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,210][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,210][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,211][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,211][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,211][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,211][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,211][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,212][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,212][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'mangle', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,213][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,214][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,214][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,214][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,214][557][140069404256000][DEBUG][privacyidea.lib.clientapplication:186] Entering save_clientapplication with arguments ('172.17.0.3', 'python-requests/2.22.0') and keywords {}
[2022-01-14 11:58:34,283][557][140069404256000][DEBUG][privacyidea.lib.clientapplication:198] Exiting save_clientapplication with result None
[2022-01-14 11:58:34,284][557][140069404256000][DEBUG][privacyidea.lib.tokens.webauthntoken:186] Entering get_class_info with arguments ('policy',) and keywords {}
[2022-01-14 11:58:34,287][557][140069404256000][DEBUG][privacyidea.lib.tokens.webauthntoken:198] Exiting get_class_info with result {'authentication': {'webauthn_timeout': {'type': 'int', 'desc': u'The time in seconds the user has to confirm authorization on his WebAuthn token. Note: You will want to increase the ChallengeValidityTime along with this. Default: 60'}, 'webauthn_allowed_transports': {'type': 'str', 'desc': u'A list of transports to prefer to communicate with WebAuthn tokens. Default: usb ble nfc internal lightning (All standard transports)'}, 'webauthn_user_verification_requirement': {'type': 'str', 'value': ['required', 'preferred', 'discouraged'], 'desc': u"Whether the user's identity should be verified when authenticating with a WebAuthn token. Default: preferred (verify the user if supported by the token)"}, 'challenge_text': {'type': 'str', 'desc': u'Use an alternative challenge text for telling the user to confirm with his WebAuthn token.'}}, 'enrollment': {'webauthn_req': {'group': 'WebAuthn', 'type': 'str', 'desc': u'Only the specified WebAuthn-tokens are allowed to be registered.'}, 'max_active_token_per_user': {'group': 'token', 'type': 'int', 'desc': u'The user may only have this number of active WebAuthn tokens assigned.'}, 'max_token_per_user': {'group': 'token', 'type': 'int', 'desc': u'The user may only have this number of WebAuthn tokens assigned.'}, 'webauthn_authenticator_selection_list': {'group': 'WebAuthn', 'type': 'str', 'desc': u'A list of WebAuthn authenticators acceptable for enrollment, given as a space-separated list of AAGUIDs. Per default all authenticators are acceptable.'}, 'challenge_text': {'group': 'WebAuthn', 'type': 'str', 'desc': u'Use an alternate challenge text for telling the user to confirm with his WebAuthn device.'}, 'webauthn_relying_party_id': {'group': 'WebAuthn', 'type': 'str', 'desc': u'A domain name that is a subset of the respective FQDNs for all the webservices the users should be able to sign in to using WebAuthn tokens.'}, 'webauthn_timeout': {'group': 'WebAuthn', 'type': 'int', 'desc': u'The time in seconds the user has to confirm enrollment on his WebAuthn token. Note: You will want to increase the ChallengeValidityTime along with this. Default: 60'}, 'webauthn_relying_party_name': {'group': 'WebAuthn', 'type': 'str', 'desc': u'A human readable name for the organization rolling out WebAuthn tokens.'}, 'webauthn_authenticator_attestation_form': {'group': 'WebAuthn', 'type': 'str', 'value': ['none', 'indirect', 'direct'], 'desc': u'Whether to request attestation data when enrolling a new WebAuthn token. Note: for u2f_req to work with WebAuthn, this cannot be set to none. Default: direct (ask for non-anonymized attestation data)'}, 'webauthn_authenticator_attachment': {'group': 'WebAuthn', 'type': 'str', 'value': ['platform', 'cross-platform', 'either'], 'desc': u'Whether to limit roll out of WebAuthn tokens to either only platform authenticators, or only cross-platform authenticators. Default: either'}, 'webauthn_user_verification_requirement': {'group': 'WebAuthn', 'type': 'str', 'value': ['required', 'preferred', 'discouraged'], 'desc': u"Whether the user's identity should be verified when rolling out a new WebAuthn token. Default: preferred (verify the user if supported by the token)"}, 'webauthn_authenticator_attestation_level': {'group': 'WebAuthn', 'type': 'str', 'value': ['none', 'untrusted', 'trusted'], 'desc': u'Whether and how strictly to check authenticator attestation data. Note: If the attestation form is none, the attestation level needs to also be none. Default: untrusted (attestation is required, but can be unknown or self-signed)'}, 'webauthn_public_key_credential_algorithm_preference': {'group': 'WebAuthn', 'type': 'str', 'value': ['ecdsa_preferred', 'ecdsa_only', 'rsassa-pss_preferred', 'rsassa-pss_only'], 'desc': u'Which algorithm to use for creating public key credentials for WebAuthn tokens. Default: ecdsa_preferred'}}, 'authorization': {'webauthn_authenticator_selection_list': {'type': 'str', 'desc': u'A list of WebAuthn authenticators acceptable for authorization, given as a space-separated list of AAGUIDs. Per default all authenticators are acceptable.'}, 'webauthn_req': {'type': 'str', 'desc': u'Only the specified WebAuthn-tokens are authorized.'}}}
[2022-01-14 11:58:34,290][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'webauthn_timeout', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,291][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,291][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,291][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,292][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,293][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,293][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'webauthn_user_verification_requirement', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,294][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,294][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,295][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,296][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,296][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,296][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'webauthn_allowed_transports', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,297][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,297][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,298][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,298][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,298][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,298][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,298][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,299][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,299][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,299][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,299][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'webauthn_challenge_text', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,301][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,301][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,302][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,302][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,302][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,303][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,303][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,303][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,304][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,304][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,305][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'api_key_required', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authorization', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,306][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,306][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,306][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,306][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,306][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,307][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:186] Entering log with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f64550733d0>, {'realm': u'ad', 'user': u'admin', 'resolver': ''}) and keywords {}
[2022-01-14 11:58:34,308][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:198] Exiting log with result None
[2022-01-14 11:58:34,308][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'auth_cache', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,309][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,309][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,310][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,311][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,311][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'passOnNoUser', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,312][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,312][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,312][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,312][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,313][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'passOnNoToken', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,314][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,315][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,315][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,315][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,315][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,315][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,316][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,316][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,316][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,316][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,316][557][140069404256000][DEBUG][privacyidea.lib.policy:186] Entering list_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f64550d5dd0>,) and keywords {'realm': u'ad', 'name': None, 'sort_by_priority': True, 'action': 'passthru', 'client': '172.17.0.3', 'user': u'admin', 'resolver': '', 'active': True, 'scope': 'authentication', 'adminrealm': None, 'adminuser': None}
[2022-01-14 11:58:34,318][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching active: []
[2022-01-14 11:58:34,318][557][140069404256000][DEBUG][privacyidea.lib.policy:526] Policies after matching scope: []
[2022-01-14 11:58:34,318][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching action: []
[2022-01-14 11:58:34,319][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching user: []
[2022-01-14 11:58:34,319][557][140069404256000][DEBUG][privacyidea.lib.policy:551] Policies after matching realm: []
[2022-01-14 11:58:34,319][557][140069404256000][DEBUG][privacyidea.lib.policy:586] Policies after matching resolver: []
[2022-01-14 11:58:34,319][557][140069404256000][DEBUG][privacyidea.lib.policy:617] Policies after matching client: []
[2022-01-14 11:58:34,320][557][140069404256000][DEBUG][privacyidea.lib.policy:198] Exiting list_policies with result []
[2022-01-14 11:58:34,320][557][140069404256000][DEBUG][privacyidea.lib.policy:683] Policies after matching time: []
[2022-01-14 11:58:34,320][557][140069404256000][DEBUG][privacyidea.lib.policy:688] Policies after matching conditions
[2022-01-14 11:58:34,322][557][140069404256000][DEBUG][privacyidea.lib.token:186] Entering check_user_pass with arguments () and keywords {}
[2022-01-14 11:58:34,323][557][140069404256000][DEBUG][privacyidea.lib.token:186] Entering get_tokens with arguments () and keywords {'user': User(login=u'admin', realm=u'ad', resolver='')}
[2022-01-14 11:58:34,324][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:186] Entering log with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f64550733d0>, {'info': u'ERR904: The user can not be found in any resolver in this realm!'}) and keywords {}
[2022-01-14 11:58:34,325][557][140069404256000][DEBUG][privacyidea.lib.auditmodules.base:198] Exiting log with result None
[2022-01-14 11:58:34,354][557][140069404256000][DEBUG][privacyidea.api.lib.utils:254] Can not get param: No JSON object could be decoded
[2022-01-14 11:58:34,357][557][140069404256000][DEBUG][privacyidea.api.lib.utils:254] Can not get param: No JSON object could be decoded
[2022-01-14 11:58:34,360][557][140069404256000][DEBUG][privacyidea.api.before_after:90] End handling of request u'/validate/check?'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment