Advertisement
Guest User

PrivacyIdea log

a guest
Sep 26th, 2017
49
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 100.01 KB | None | 0 0
  1. [2017-09-26 08:47:57,066][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  2. [2017-09-26 08:47:57,074][11958][140640815691968][DEBUG][privacyidea.api.lib.utils:239] Can not get param: No JSON object could be decoded
  3. [2017-09-26 08:47:57,074][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering get_user_from_param with arguments ({'user': u'testotp', 'pass': u'[...]'},) and keywords {}
  4. [2017-09-26 08:47:57,074][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('splitAtSign',) and keywords {'default': False, 'return_bool': True}
  5. [2017-09-26 08:47:57,074][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  6. [2017-09-26 08:47:57,077][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result True
  7. [2017-09-26 08:47:57,078][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering split_user with arguments (u'testotp',) and keywords {}
  8. [2017-09-26 08:47:57,078][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting split_user with result (u'testotp', '')
  9. [2017-09-26 08:47:57,078][11958][140640815691968][DEBUG][privacyidea.lib.realm:185] Entering get_default_realm with arguments () and keywords {}
  10. [2017-09-26 08:47:57,078][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  11. [2017-09-26 08:47:57,081][11958][140640815691968][DEBUG][privacyidea.lib.realm:197] Exiting get_default_realm with result myrealm
  12. [2017-09-26 08:47:57,081][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering User with arguments () and keywords {'login': u'testotp', 'realm': u'myrealm', 'resolver': None}
  13. [2017-09-26 08:47:57,081][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
  14. [2017-09-26 08:47:57,082][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  15. [2017-09-26 08:47:57,085][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
  16. [2017-09-26 08:47:57,085][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering get_ordererd_resolvers with arguments (User(login=u'testotp', realm=u'myrealm', resolver=''),) and keywords {}
  17. [2017-09-26 08:47:57,085][11958][140640815691968][DEBUG][privacyidea.lib.realm:185] Entering get_realms with arguments (u'myrealm',) and keywords {}
  18. [2017-09-26 08:47:57,085][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  19. [2017-09-26 08:47:57,088][11958][140640815691968][DEBUG][privacyidea.lib.realm:197] Exiting get_realms with result {u'myrealm': {'default': True, 'option': u'', 'resolver': [{'priority': None, 'type': u'passwdresolver', 'name': u'Passwd_Resolver'}]}}
  20. [2017-09-26 08:47:57,088][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting get_ordererd_resolvers with result [u'Passwd_Resolver']
  21. [2017-09-26 08:47:57,089][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  22. [2017-09-26 08:47:57,089][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  23. [2017-09-26 08:47:57,089][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  24. [2017-09-26 08:47:57,092][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  25. [2017-09-26 08:47:57,092][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  26. [2017-09-26 08:47:57,092][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  27. [2017-09-26 08:47:57,092][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  28. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  29. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  30. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  31. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  32. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  33. [2017-09-26 08:47:57,093][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  34. [2017-09-26 08:47:57,094][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  35. [2017-09-26 08:47:57,094][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  36. [2017-09-26 08:47:57,094][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  37. [2017-09-26 08:47:57,094][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_config with arguments (u'Passwd_Resolver',) and keywords {}
  38. [2017-09-26 08:47:57,095][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  39. [2017-09-26 08:47:57,095][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  40. [2017-09-26 08:47:57,098][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  41. [2017-09-26 08:47:57,098][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_config with result HIDDEN
  42. [2017-09-26 08:47:57,099][11958][140640815691968][INFO][privacyidea.lib.resolvers.PasswdIdResolver:130] loading users from file /etc/privacyidea/users from within '/'
  43. [2017-09-26 08:47:57,099][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  44. [2017-09-26 08:47:57,099][11958][140640815691968][INFO][privacyidea.lib.user:230] user u'testotp' found in resolver u'Passwd_Resolver'
  45. [2017-09-26 08:47:57,099][11958][140640815691968][INFO][privacyidea.lib.user:231] userid resolved to '1234'
  46. [2017-09-26 08:47:57,100][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  47. [2017-09-26 08:47:57,100][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  48. [2017-09-26 08:47:57,100][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  49. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  50. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  51. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  52. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  53. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  54. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  55. [2017-09-26 08:47:57,103][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  56. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  57. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  58. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  59. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  60. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  61. [2017-09-26 08:47:57,104][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  62. [2017-09-26 08:47:57,105][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  63. [2017-09-26 08:47:57,105][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  64. [2017-09-26 08:47:57,105][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  65. [2017-09-26 08:47:57,108][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  66. [2017-09-26 08:47:57,108][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting User with result <testotp.Passwd_Resolver@myrealm>
  67. [2017-09-26 08:47:57,108][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting get_user_from_param with result <testotp.Passwd_Resolver@myrealm>
  68. [2017-09-26 08:47:57,108][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.policy.PolicyClass'> already exists.
  69. [2017-09-26 08:47:57,111][11958][140640815691968][DEBUG][privacyidea.lib.audit:185] Entering getAudit with arguments (<Config {'JSON_AS_ASCII': True, 'PI_HSM': 'default', 'SESSION_REFRESH_EACH_REQUEST': True, 'PI_LOGFILE': '/var/log/privacyidea/privacyidea.log', 'BABEL_DEFAULT_TIMEZONE': 'UTC', 'PI_AUDIT_KEY_PUBLIC': '/etc/privacyidea/encauditpu.key', 'BABEL_DOMAIN': 'messages', 'SQLALCHEMY_POOL_RECYCLE': None, 'SQLALCHEMY_ECHO': False, 'PI_PEPPER': '[...]_admin', 'SQLALCHEMY_TRACK_MODIFICATIONS': None, 'SQLALCHEMY_POOL_TIMEOUT': None, 'SQLALCHEMY_RECORD_QUERIES': None, 'PI_ENCFILE': '/etc/privacyidea/enckey', 'SESSION_COOKIE_DOMAIN': None, 'SESSION_COOKIE_NAME': 'session', 'pi_token_types': ['registration', 'yubikey', 'radius', 'tiqr', 'pw', 'daplug', 'u2f', 'spass', '4eyes', 'paper', 'motp', 'sms', 'email', 'totp', 'remote', 'hotp', 'certificate', 'yubico', 'sshkey', 'question'], 'LOGGER_HANDLER_POLICY': 'always', 'PI_EXTERNAL_LINKS': True, 'SQLALCHEMY_NATIVE_UNICODE': None, 'MAX_CONTENT_LENGTH': None, 'PERMANENT_SESSION_LIFETIME': datetime.timedelta(31), 'SQLALCHEMY_POOL_SIZE': None, 'SQLALCHEMY_MAX_OVERFLOW': None, 'TRAP_HTTP_EXCEPTIONS': False, 'PRESERVE_CONTEXT_ON_EXCEPTION': None, 'SESSION_COOKIE_PATH': None, 'SQLALCHEMY_DATABASE_URI': 'mysql+pymysql://pi:[...]@localhost/pi', 'LOGGER_NAME': 'privacyidea.app', 'SECRET_KEY': '[...]_auth', 'APPLICATION_ROOT': None, 'SERVER_NAME': None, 'BABEL_DEFAULT_LOCALE': 'en', 'PREFERRED_URL_SCHEME': 'http', 'TESTING': False, 'TEMPLATES_AUTO_RELOAD': None, 'JSONIFY_MIMETYPE': 'application/json', 'USE_X_SENDFILE': False, 'PI_AUDIT_MODULE': 'privacyidea.lib.auditmodules.sqlaudit', 'SESSION_COOKIE_SECURE': False, 'SQLALCHEMY_BINDS': None, 'DEBUG': False, 'SQLALCHEMY_COMMIT_ON_TEARDOWN': False, 'EXPLAIN_TEMPLATE_LOADING': False, 'CACHE_TYPE': 'simple', 'JSONIFY_PRETTYPRINT_REGULAR': True, 'PROPAGATE_EXCEPTIONS': None, 'PI_LOGLEVEL': 10, 'TRAP_BAD_REQUEST_ERRORS': False, 'JSON_SORT_KEYS': True, 'SESSION_COOKIE_HTTPONLY': True, 'SEND_FILE_MAX_AGE_DEFAULT': datetime.timedelta(0, 43200), 'PI_AUDIT_KEY_PRIVATE': '/etc/privacyidea/encauditpr.key', 'SUPERUSER_REALM': ['super', 'administrators']}>,) and keywords {}
  70. [2017-09-26 08:47:57,112][11958][140640815691968][DEBUG][privacyidea.lib.audit:185] Entering getAuditClass with arguments ('privacyidea.lib.auditmodules.sqlaudit', 'Audit') and keywords {}
  71. [2017-09-26 08:47:57,112][11958][140640815691968][DEBUG][privacyidea.lib.audit:76] klass: <class 'privacyidea.lib.auditmodules.sqlaudit.Audit'>
  72. [2017-09-26 08:47:57,112][11958][140640815691968][DEBUG][privacyidea.lib.audit:197] Exiting getAuditClass with result <class 'privacyidea.lib.auditmodules.sqlaudit.Audit'>
  73. [2017-09-26 08:47:57,112][11958][140640815691968][DEBUG][privacyidea.lib.auditmodules.sqlaudit:92] using the connect string mysql+pymysql://pi:[...]@localhost/pi
  74. [2017-09-26 08:47:57,114][11958][140640815691968][DEBUG][privacyidea.lib.auditmodules.sqlaudit:99] Using SQL pool_size of 20
  75. [2017-09-26 08:47:57,114][11958][140640815691968][DEBUG][privacyidea.lib.audit:197] Exiting getAudit with result <privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7fe96e548fd0>
  76. [2017-09-26 08:47:57,129][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('OverrideAuthorizationClient',) and keywords {}
  77. [2017-09-26 08:47:57,130][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  78. [2017-09-26 08:47:57,132][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result None
  79. [2017-09-26 08:47:57,133][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'setrealm') and keywords {'scope': 'authorization', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': u'testotp'}
  80. [2017-09-26 08:47:57,133][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': None, 'action': 'setrealm', 'scope': 'authorization', 'adminrealm': None}
  81. [2017-09-26 08:47:57,133][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  82. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  83. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  84. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  85. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  86. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  87. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  88. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  89. [2017-09-26 08:47:57,134][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  90. [2017-09-26 08:47:57,135][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'mangle') and keywords {'scope': 'authentication', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': u'testotp'}
  91. [2017-09-26 08:47:57,135][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': None, 'action': 'mangle', 'scope': 'authentication', 'adminrealm': None}
  92. [2017-09-26 08:47:57,135][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  93. [2017-09-26 08:47:57,135][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  94. [2017-09-26 08:47:57,135][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  95. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  96. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  97. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  98. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  99. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  100. [2017-09-26 08:47:57,136][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  101. [2017-09-26 08:47:57,137][11958][140640815691968][DEBUG][privacyidea.lib.clientapplication:185] Entering save_clientapplication with arguments ('192.168.111.1', 'Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0') and keywords {}
  102. [2017-09-26 08:47:57,147][11958][140640815691968][DEBUG][privacyidea.lib.clientapplication:197] Exiting save_clientapplication with result 1
  103. [2017-09-26 08:47:57,148][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'action': 'api_key_required', 'scope': 'authorization'}
  104. [2017-09-26 08:47:57,148][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  105. [2017-09-26 08:47:57,148][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  106. [2017-09-26 08:47:57,148][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  107. [2017-09-26 08:47:57,148][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  108. [2017-09-26 08:47:57,149][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  109. [2017-09-26 08:47:57,149][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  110. [2017-09-26 08:47:57,149][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  111. [2017-09-26 08:47:57,149][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  112. [2017-09-26 08:47:57,149][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'action': 'passOnNoUser', 'scope': 'authentication'}
  113. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  114. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  115. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  116. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  117. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  118. [2017-09-26 08:47:57,150][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  119. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  120. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  121. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'action': 'passOnNoToken', 'scope': 'authentication'}
  122. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  123. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  124. [2017-09-26 08:47:57,151][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  125. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  126. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  127. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  128. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  129. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  130. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'action': 'passthru', 'scope': 'authentication'}
  131. [2017-09-26 08:47:57,152][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  132. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  133. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  134. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  135. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  136. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  137. [2017-09-26 08:47:57,153][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  138. [2017-09-26 08:47:57,154][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  139. [2017-09-26 08:47:57,157][11958][140640815691968][DEBUG][privacyidea.lib.token:185] Entering check_user_pass with arguments () and keywords {}
  140. [2017-09-26 08:47:57,157][11958][140640815691968][DEBUG][privacyidea.lib.token:185] Entering get_tokens with arguments () and keywords {'user': User(login=u'testotp', realm=u'myrealm', resolver=u'Passwd_Resolver')}
  141. [2017-09-26 08:47:57,187][11958][140640815691968][DEBUG][privacyidea.lib.token:185] Entering create_tokenclass_object with arguments (<<class 'privacyidea.models.Token'> {"'active'": 'True', "'count_window'": '10', "'key_enc'": "u'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438'", "'pin_hash'": "u''", "'so_pin'": "u''", "'user_id'": "u'1234'", "'otplen'": '6', "'so_pin_iv'": "u''", "'serial'": "u'PIEM00007E85'", "'revoked'": 'False', "'locked'": 'False', "'maxfail'": '10', "'count'": '0', "'pin_seed'": "u''", "'sync_window'": '1000', "'description'": "u''", "'resolver_type'": "u'passwdresolver'", "'user_pin_iv'": "u''", "'user_pin'": "u''", "'rollout_state'": "u''", "'failcount'": '1', "'_sa_instance_state'": '<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>', "'id'": '12', "'resolver'": "u'Passwd_Resolver'", "'key_iv'": "u'e12467fabd7ada64e3c8b552734844a3'", "'tokentype'": "u'email'"}>,) and keywords {}
  142. [2017-09-26 08:47:57,188][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_token_module_list with arguments () and keywords {}
  143. [2017-09-26 08:47:57,188][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_token_list with arguments () and keywords {}
  144. [2017-09-26 08:47:57,188][11958][140640815691968][DEBUG][privacyidea.lib.config:620] None
  145. [2017-09-26 08:47:57,188][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_token_list with result set(['privacyidea.lib.tokens.tiqrtoken', 'privacyidea.lib.tokens.smstoken', 'privacyidea.lib.tokens.hotptoken', 'privacyidea.lib.tokens.remotetoken', 'privacyidea.lib.tokens.yubicotoken', 'privacyidea.lib.tokens.registrationtoken', 'privacyidea.lib.tokens.passwordtoken', 'privacyidea.lib.tokens.motptoken', 'privacyidea.lib.tokens.emailtoken', 'privacyidea.lib.tokens.papertoken', 'privacyidea.lib.tokens.daplugtoken', 'privacyidea.lib.tokens.spasstoken', 'privacyidea.lib.tokens.certificatetoken', 'privacyidea.lib.tokens.foureyestoken', 'privacyidea.lib.tokens.questionnairetoken', 'privacyidea.lib.tokens.yubikeytoken', 'privacyidea.lib.tokens.u2ftoken', 'privacyidea.lib.tokens.sshkeytoken', 'privacyidea.lib.tokens.totptoken', 'privacyidea.lib.tokens.radiustoken'])
  146. [2017-09-26 08:47:57,188][11958][140640815691968][DEBUG][privacyidea.lib.config:645] using the module list: set(['privacyidea.lib.tokens.tiqrtoken', 'privacyidea.lib.tokens.smstoken', 'privacyidea.lib.tokens.hotptoken', 'privacyidea.lib.tokens.remotetoken', 'privacyidea.lib.tokens.yubicotoken', 'privacyidea.lib.tokens.registrationtoken', 'privacyidea.lib.tokens.passwordtoken', 'privacyidea.lib.tokens.motptoken', 'privacyidea.lib.tokens.emailtoken', 'privacyidea.lib.tokens.papertoken', 'privacyidea.lib.tokens.daplugtoken', 'privacyidea.lib.tokens.spasstoken', 'privacyidea.lib.tokens.certificatetoken', 'privacyidea.lib.tokens.foureyestoken', 'privacyidea.lib.tokens.questionnairetoken', 'privacyidea.lib.tokens.yubikeytoken', 'privacyidea.lib.tokens.u2ftoken', 'privacyidea.lib.tokens.sshkeytoken', 'privacyidea.lib.tokens.totptoken', 'privacyidea.lib.tokens.radiustoken'])
  147. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.tiqrtoken
  148. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.smstoken
  149. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.hotptoken
  150. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.remotetoken
  151. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.yubicotoken
  152. [2017-09-26 08:47:57,189][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.registrationtoken
  153. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.passwordtoken
  154. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.motptoken
  155. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.emailtoken
  156. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.papertoken
  157. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.daplugtoken
  158. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.spasstoken
  159. [2017-09-26 08:47:57,190][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.certificatetoken
  160. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.foureyestoken
  161. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.questionnairetoken
  162. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.yubikeytoken
  163. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.u2ftoken
  164. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.sshkeytoken
  165. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.totptoken
  166. [2017-09-26 08:47:57,191][11958][140640815691968][DEBUG][privacyidea.lib.config:659] import module: privacyidea.lib.tokens.radiustoken
  167. [2017-09-26 08:47:57,192][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_token_module_list with result [<module 'privacyidea.lib.tokens.tiqrtoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/tiqrtoken.pyc'>, <module 'privacyidea.lib.tokens.smstoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/smstoken.pyc'>, <module 'privacyidea.lib.tokens.hotptoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/hotptoken.pyc'>, <module 'privacyidea.lib.tokens.remotetoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/remotetoken.pyc'>, <module 'privacyidea.lib.tokens.yubicotoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/yubicotoken.pyc'>, <module 'privacyidea.lib.tokens.registrationtoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/registrationtoken.pyc'>, <module 'privacyidea.lib.tokens.passwordtoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/passwordtoken.pyc'>, <module 'privacyidea.lib.tokens.motptoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/motptoken.pyc'>, <module 'privacyidea.lib.tokens.emailtoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/emailtoken.pyc'>, <module 'privacyidea.lib.tokens.papertoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/papertoken.pyc'>, <module 'privacyidea.lib.tokens.daplugtoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/daplugtoken.pyc'>, <module 'privacyidea.lib.tokens.spasstoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/spasstoken.pyc'>, <module 'privacyidea.lib.tokens.certificatetoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/certificatetoken.pyc'>, <module 'privacyidea.lib.tokens.foureyestoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/foureyestoken.pyc'>, <module 'privacyidea.lib.tokens.questionnairetoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/questionnairetoken.pyc'>, <module 'privacyidea.lib.tokens.yubikeytoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/yubikeytoken.pyc'>, <module 'privacyidea.lib.tokens.u2ftoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/u2ftoken.pyc'>, <module 'privacyidea.lib.tokens.sshkeytoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/sshkeytoken.pyc'>, <module 'privacyidea.lib.tokens.totptoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/totptoken.pyc'>, <module 'privacyidea.lib.tokens.radiustoken' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/tokens/radiustoken.pyc'>]
  168. [2017-09-26 08:47:57,193][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:185] Entering __init__ with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {}>, <<class 'privacyidea.models.Token'> {"'active'": 'True', "'count_window'": '10', "'key_enc'": "u'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438'", "'pin_hash'": "u''", "'so_pin'": "u''", "'user_id'": "u'1234'", "'otplen'": '6', "'so_pin_iv'": "u''", "'serial'": "u'PIEM00007E85'", "'revoked'": 'False', "'locked'": 'False', "'maxfail'": '10', "'count'": '0', "'pin_seed'": "u''", "'sync_window'": '1000', "'description'": "u''", "'resolver_type'": "u'passwdresolver'", "'user_pin_iv'": "u''", "'user_pin'": "u''", "'rollout_state'": "u''", "'failcount'": '1', "'_sa_instance_state'": '<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>', "'id'": '12', "'resolver'": "u'Passwd_Resolver'", "'key_iv'": "u'e12467fabd7ada64e3c8b552734844a3'", "'tokentype'": "u'email'"}>) and keywords {}
  169. [2017-09-26 08:47:57,193][11958][140640815691968][DEBUG][privacyidea.lib.tokenclass:185] Entering __init__ with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {}>, <<class 'privacyidea.models.Token'> {"'active'": 'True', "'count_window'": '10', "'key_enc'": "u'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438'", "'pin_hash'": "u''", "'so_pin'": "u''", "'user_id'": "u'1234'", "'otplen'": '6', "'so_pin_iv'": "u''", "'serial'": "u'PIEM00007E85'", "'revoked'": 'False', "'locked'": 'False', "'maxfail'": '10', "'count'": '0', "'pin_seed'": "u''", "'sync_window'": '1000', "'description'": "u''", "'resolver_type'": "u'passwdresolver'", "'user_pin_iv'": "u''", "'user_pin'": "u''", "'rollout_state'": "u''", "'failcount'": '1', "'_sa_instance_state'": '<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>', "'id'": '12', "'resolver'": "u'Passwd_Resolver'", "'key_iv'": "u'e12467fabd7ada64e3c8b552734844a3'", "'tokentype'": "u'email'"}>) and keywords {}
  170. [2017-09-26 08:47:57,194][11958][140640815691968][DEBUG][privacyidea.lib.tokenclass:197] Exiting __init__ with result None
  171. [2017-09-26 08:47:57,194][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:197] Exiting __init__ with result None
  172. [2017-09-26 08:47:57,194][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('hotp.hashlib', 'sha1') and keywords {}
  173. [2017-09-26 08:47:57,194][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  174. [2017-09-26 08:47:57,198][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result sha1
  175. [2017-09-26 08:47:57,199][11958][140640815691968][DEBUG][privacyidea.lib.token:197] Exiting create_tokenclass_object with result <<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>
  176. [2017-09-26 08:47:57,199][11958][140640815691968][DEBUG][privacyidea.lib.token:197] Exiting get_tokens with result [<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>]
  177. [2017-09-26 08:47:57,199][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering get_username with arguments (u'1234', u'Passwd_Resolver') and keywords {}
  178. [2017-09-26 08:47:57,200][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
  179. [2017-09-26 08:47:57,200][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  180. [2017-09-26 08:47:57,203][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
  181. [2017-09-26 08:47:57,203][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  182. [2017-09-26 08:47:57,203][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  183. [2017-09-26 08:47:57,203][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  184. [2017-09-26 08:47:57,206][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  185. [2017-09-26 08:47:57,206][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  186. [2017-09-26 08:47:57,206][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  187. [2017-09-26 08:47:57,206][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  188. [2017-09-26 08:47:57,207][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  189. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  190. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  191. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  192. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  193. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  194. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  195. [2017-09-26 08:47:57,208][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  196. [2017-09-26 08:47:57,209][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  197. [2017-09-26 08:47:57,209][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  198. [2017-09-26 08:47:57,209][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting get_username with result testotp
  199. [2017-09-26 08:47:57,214][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering User with arguments () and keywords {'login': 'testotp', 'realm': u'myrealm', 'resolver': u'Passwd_Resolver'}
  200. [2017-09-26 08:47:57,214][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
  201. [2017-09-26 08:47:57,214][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  202. [2017-09-26 08:47:57,217][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
  203. [2017-09-26 08:47:57,217][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  204. [2017-09-26 08:47:57,217][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  205. [2017-09-26 08:47:57,217][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  206. [2017-09-26 08:47:57,220][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  207. [2017-09-26 08:47:57,220][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  208. [2017-09-26 08:47:57,220][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  209. [2017-09-26 08:47:57,220][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  210. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  211. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  212. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  213. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  214. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  215. [2017-09-26 08:47:57,221][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  216. [2017-09-26 08:47:57,222][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  217. [2017-09-26 08:47:57,222][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  218. [2017-09-26 08:47:57,222][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  219. [2017-09-26 08:47:57,222][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  220. [2017-09-26 08:47:57,222][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  221. [2017-09-26 08:47:57,223][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  222. [2017-09-26 08:47:57,225][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  223. [2017-09-26 08:47:57,225][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting User with result <testotp.Passwd_Resolver@myrealm>
  224. [2017-09-26 08:47:57,226][11958][140640815691968][DEBUG][privacyidea.lib.token:185] Entering check_token_list with arguments ([<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'realm_list\'": \'[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>], u'[...]') and keywords {'user': User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'), 'options': {'clientip': '192.168.111.1', 'user': u'testotp', 'g': <flask.g of 'privacyidea.app'>, 'pass': u'[...]'}}
  225. [2017-09-26 08:47:57,226][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering get_username with arguments (u'1234', u'Passwd_Resolver') and keywords {}
  226. [2017-09-26 08:47:57,226][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
  227. [2017-09-26 08:47:57,227][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  228. [2017-09-26 08:47:57,229][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
  229. [2017-09-26 08:47:57,230][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  230. [2017-09-26 08:47:57,230][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  231. [2017-09-26 08:47:57,230][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  232. [2017-09-26 08:47:57,232][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  233. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  234. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  235. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  236. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  237. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  238. [2017-09-26 08:47:57,233][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  239. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  240. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  241. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  242. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  243. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  244. [2017-09-26 08:47:57,234][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  245. [2017-09-26 08:47:57,235][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  246. [2017-09-26 08:47:57,235][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting get_username with result testotp
  247. [2017-09-26 08:47:57,235][11958][140640815691968][DEBUG][privacyidea.lib.user:185] Entering User with arguments () and keywords {'login': 'testotp', 'realm': u'myrealm', 'resolver': u'Passwd_Resolver'}
  248. [2017-09-26 08:47:57,235][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('UserCacheExpiration', '0') and keywords {}
  249. [2017-09-26 08:47:57,235][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  250. [2017-09-26 08:47:57,238][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
  251. [2017-09-26 08:47:57,238][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_object with arguments (u'Passwd_Resolver',) and keywords {}
  252. [2017-09-26 08:47:57,239][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  253. [2017-09-26 08:47:57,239][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  254. [2017-09-26 08:47:57,241][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  255. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_resolver_list with arguments () and keywords {}
  256. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:549] None
  257. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_resolver_list with result set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  258. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:680] using the module list: set(['privacyidea.lib.resolvers.PasswdIdResolver', 'privacyidea.lib.resolvers.SCIMIdResolver', 'privacyidea.lib.resolvers.SQLIdResolver', 'privacyidea.lib.resolvers.LDAPIdResolver'])
  259. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.PasswdIdResolver
  260. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SCIMIdResolver
  261. [2017-09-26 08:47:57,242][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.SQLIdResolver
  262. [2017-09-26 08:47:57,243][11958][140640815691968][DEBUG][privacyidea.lib.config:688] import module: privacyidea.lib.resolvers.LDAPIdResolver
  263. [2017-09-26 08:47:57,243][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.PasswdIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/PasswdIdResolver.pyc'>
  264. [2017-09-26 08:47:57,243][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SCIMIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SCIMIdResolver.pyc'>
  265. [2017-09-26 08:47:57,243][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.SQLIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/SQLIdResolver.pyc'>
  266. [2017-09-26 08:47:57,243][11958][140640815691968][DEBUG][privacyidea.lib.config:503] module: <module 'privacyidea.lib.resolvers.LDAPIdResolver' from '/opt/privacyidea/lib/python2.7/site-packages/privacyidea/lib/resolvers/LDAPIdResolver.pyc'>
  267. [2017-09-26 08:47:57,244][11958][140640815691968][DEBUG][privacyidea.lib.resolver:197] Exiting get_resolver_object with result <privacyidea.lib.resolvers.PasswdIdResolver.IdResolver object at 0x7fe96e49bf10>
  268. [2017-09-26 08:47:57,244][11958][140640815691968][DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {'filter_resolver_name': u'Passwd_Resolver'}
  269. [2017-09-26 08:47:57,244][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  270. [2017-09-26 08:47:57,247][11958][140640815691968][DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
  271. [2017-09-26 08:47:57,247][11958][140640815691968][DEBUG][privacyidea.lib.user:197] Exiting User with result <testotp.Passwd_Resolver@myrealm>
  272. [2017-09-26 08:47:57,247][11958][140640815691968][DEBUG][privacyidea.lib.token:1917] Found user with loginId User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'): u'PIEM00007E85'
  273. [2017-09-26 08:47:57,248][11958][140640815691968][DEBUG][privacyidea.lib.tokens.emailtoken:185] Entering is_challenge_request with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'realm_list\'": \'[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, u'[...]') and keywords {'user': User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'), 'options': {'clientip': '192.168.111.1', 'user': User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'), 'g': <flask.g of 'privacyidea.app'>, 'pass': u'[...]'}}
  274. [2017-09-26 08:47:57,248][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'otppin') and keywords {'scope': 'authentication', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': 'testotp'}
  275. [2017-09-26 08:47:57,248][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': 'testotp', 'resolver': None, 'action': 'otppin', 'scope': 'authentication', 'adminrealm': None}
  276. [2017-09-26 08:47:57,248][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  277. [2017-09-26 08:47:57,248][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  278. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  279. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  280. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  281. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  282. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  283. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  284. [2017-09-26 08:47:57,249][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  285. [2017-09-26 08:47:57,250][11958][140640815691968][DEBUG][privacyidea.models:378] we got a hashed PIN!
  286. [2017-09-26 08:47:57,250][11958][140640815691968][DEBUG][privacyidea.lib.tokens.emailtoken:197] Exiting is_challenge_request with result False
  287. [2017-09-26 08:47:57,251][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments () and keywords {'default': False, 'return_bool': True, 'key': 'PrependPin'}
  288. [2017-09-26 08:47:57,251][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  289. [2017-09-26 08:47:57,254][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result True
  290. [2017-09-26 08:47:57,254][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'otppin') and keywords {'scope': 'authentication', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': 'testotp'}
  291. [2017-09-26 08:47:57,254][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': 'testotp', 'resolver': None, 'action': 'otppin', 'scope': 'authentication', 'adminrealm': None}
  292. [2017-09-26 08:47:57,254][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  293. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  294. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  295. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  296. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  297. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  298. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  299. [2017-09-26 08:47:57,255][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  300. [2017-09-26 08:47:57,256][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  301. [2017-09-26 08:47:57,256][11958][140640815691968][DEBUG][privacyidea.models:378] we got a hashed PIN!
  302. [2017-09-26 08:47:57,256][11958][140640815691968][DEBUG][privacyidea.lib.tokens.emailtoken:185] Entering check_otp with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'realm_list\'": \'[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, u'[...]') and keywords {'options': {'clientip': '192.168.111.1', 'user': User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'), 'g': <flask.g of 'privacyidea.app'>, 'pass': u'[...]'}}
  303. [2017-09-26 08:47:57,257][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:185] Entering check_otp with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'realm_list\'": \'[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, u'[...]', None, None, {'clientip': '192.168.111.1', 'user': User(login='testotp', realm=u'myrealm', resolver=u'Passwd_Resolver'), 'g': <flask.g of 'privacyidea.app'>, 'pass': u'[...]'}) and keywords {}
  304. [2017-09-26 08:47:57,257][11958][140640815691968][DEBUG][privacyidea.models:185] Entering get_otpkey with arguments (<<class 'privacyidea.models.Token'> {"'active'": 'True', "'count_window'": '10', "'key_enc'": "u'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438'", "'pin_hash'": "u''", "'so_pin'": "u''", "'user_id'": "u'1234'", "'otplen'": '6', "'so_pin_iv'": "u''", "'serial'": "u'PIEM00007E85'", "'revoked'": 'False', "'locked'": 'False', "'maxfail'": '10', "'realm_list'": '[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]', "'count'": '0', "'pin_seed'": "u''", "'sync_window'": '1000', "'description'": "u''", "'resolver_type'": "u'passwdresolver'", "'user_pin_iv'": "u''", "'user_pin'": "u''", "'rollout_state'": "u''", "'failcount'": '1', "'_sa_instance_state'": '<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>', "'id'": '12', "'resolver'": "u'Passwd_Resolver'", "'key_iv'": "u'e12467fabd7ada64e3c8b552734844a3'", "'tokentype'": "u'email'"}>,) and keywords {}
  305. [2017-09-26 08:47:57,258][11958][140640815691968][DEBUG][privacyidea.models:197] Exiting get_otpkey with result <privacyidea.lib.crypto.SecretObj object at 0x7fe96ea39890>
  306. [2017-09-26 08:47:57,261][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:185] Entering checkOtp with arguments (<privacyidea.lib.tokens.HMAC.HmacOtp object at 0x7fe96e4e7390>, u'[...]', 10) and keywords {}
  307. [2017-09-26 08:47:57,262][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:145] OTP range counter: 0 - 10
  308. [2017-09-26 08:47:57,262][11958][140640815691968][DEBUG][privacyidea.lib.crypto:185] Entering decrypt with arguments ('3\x83\xbdus\xc1F\xd5;<z\xf8\r\xd3Z\xb9w\xac\n}\xfb\xce\x0f\x9f8\xdc\xc5aa\x9e\xed\x02!\xdc\x83&\x91\xa5S&m\xd0CE\\$\xd7\tV\xa0\xac\x82Y\xa7\x85\x17\xf0\x98\x8e\xa2\x9dJ\xcbO~\x9cUs\xf1\x04x+[1\xef\xff\xa2\xb7\xe7\xcd\x8e\xc1\xe0\xae\xaa\xa9uPB\x13\x10\x82\x1c\xdd\x948', '\xe1$g\xfa\xbdz\xdad\xe3\xc8\xb5RsHD\xa3') and keywords {}
  309. [2017-09-26 08:47:57,267][11958][140640815691968][INFO][privacyidea.lib.crypto:299] initializing HSM class: <class 'privacyidea.lib.security.default.DefaultSecurityModule'>
  310. [2017-09-26 08:47:57,267][11958][140640815691968][INFO][privacyidea.lib.crypto:319] Initialized HSM object {'obj': <privacyidea.lib.security.default.DefaultSecurityModule object at 0x7fe96e4d7310>}
  311. [2017-09-26 08:47:57,269][11958][140640815691968][DEBUG][privacyidea.lib.crypto:199] Exiting decrypt with result HIDDEN
  312. [2017-09-26 08:47:57,269][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:197] Exiting checkOtp with result -1
  313. [2017-09-26 08:47:57,270][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:185] Entering _autosync with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'info_list\'": \'[<privacyidea.models.TokenInfo object at 0x7fe96e4d71d0>, <privacyidea.models.TokenInfo object at 0x7fe96e4d7350>, <privacyidea.models.TokenInfo object at 0x7fe96e4d7250>]\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'realm_list\'": \'[<privacyidea.models.TokenRealm object at 0x7fe96e4957d0>]\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'1\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, <privacyidea.lib.tokens.HMAC.HmacOtp object at 0x7fe96e4e7390>, u'[...]') and keywords {}
  314. [2017-09-26 08:47:57,270][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments ('AutoResync', False) and keywords {'return_bool': True}
  315. [2017-09-26 08:47:57,270][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  316. [2017-09-26 08:47:57,275][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result False
  317. [2017-09-26 08:47:57,275][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:408] end. _autosync is not enabled : res -1
  318. [2017-09-26 08:47:57,275][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:197] Exiting _autosync with result -1
  319. [2017-09-26 08:47:57,275][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:197] Exiting check_otp with result -1
  320. [2017-09-26 08:47:57,275][11958][140640815691968][DEBUG][privacyidea.lib.tokens.emailtoken:197] Exiting check_otp with result -1
  321. [2017-09-26 08:47:57,287][11958][140640815691968][DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments () and keywords {'default': False, 'return_bool': True, 'key': 'PrependPin'}
  322. [2017-09-26 08:47:57,288][11958][140640815691968][DEBUG][privacyidea.lib.config:72] The singleton <class 'privacyidea.lib.config.ConfigClass'> already exists.
  323. [2017-09-26 08:47:57,290][11958][140640815691968][DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result True
  324. [2017-09-26 08:47:57,291][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:185] Entering is_previous_otp with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'2\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, u'[...]') and keywords {}
  325. [2017-09-26 08:47:57,291][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:185] Entering check_otp_exist with arguments (<<class 'privacyidea.lib.tokens.emailtoken.EmailTokenClass'> {"'token'": '<<class \'privacyidea.models.Token\'> {"\'active\'": \'True\', "\'count_window\'": \'10\', "\'key_enc\'": "u\'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438\'", "\'pin_hash\'": "u\'\'", "\'so_pin\'": "u\'\'", "\'user_id\'": "u\'1234\'", "\'otplen\'": \'6\', "\'so_pin_iv\'": "u\'\'", "\'serial\'": "u\'PIEM00007E85\'", "\'revoked\'": \'False\', "\'locked\'": \'False\', "\'maxfail\'": \'10\', "\'count\'": \'0\', "\'pin_seed\'": "u\'\'", "\'sync_window\'": \'1000\', "\'description\'": "u\'\'", "\'resolver_type\'": "u\'passwdresolver\'", "\'user_pin_iv\'": "u\'\'", "\'user_pin\'": "u\'\'", "\'rollout_state\'": "u\'\'", "\'failcount\'": \'2\', "\'_sa_instance_state\'": \'<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>\', "\'id\'": \'12\', "\'resolver\'": "u\'Passwd_Resolver\'", "\'key_iv\'": "u\'e12467fabd7ada64e3c8b552734844a3\'", "\'tokentype\'": "u\'email\'"}>', "'mode'": "['challenge']", "'type'": "u'email'", "'init_details'": '{}', "'auth_details'": '{}', "'hashlibStr'": "u'sha1'", "'hKeyRequired'": 'True'}>, u'[...]') and keywords {'window': 10, 'symetric': True, 'inc_counter': False}
  326. [2017-09-26 08:47:57,292][11958][140640815691968][DEBUG][privacyidea.models:185] Entering get_otpkey with arguments (<<class 'privacyidea.models.Token'> {"'active'": 'True', "'count_window'": '10', "'key_enc'": "u'3383bd7573c146d53b3c7af80dd35ab977ac0a7dfbce0f9f38dcc561619eed0221dc832691a553266dd043455c24d70956a0ac8259a78517f0988ea29d4acb4f7e9c5573f104782b5b31efffa2b7e7cd8ec1e0aeaaa97550421310821cdd9438'", "'pin_hash'": "u''", "'so_pin'": "u''", "'user_id'": "u'1234'", "'otplen'": '6', "'so_pin_iv'": "u''", "'serial'": "u'PIEM00007E85'", "'revoked'": 'False', "'locked'": 'False', "'maxfail'": '10', "'count'": '0', "'pin_seed'": "u''", "'sync_window'": '1000', "'description'": "u''", "'resolver_type'": "u'passwdresolver'", "'user_pin_iv'": "u''", "'user_pin'": "u''", "'rollout_state'": "u''", "'failcount'": '2', "'_sa_instance_state'": '<sqlalchemy.orm.state.InstanceState object at 0x7fe96e4b9350>', "'id'": '12', "'resolver'": "u'Passwd_Resolver'", "'key_iv'": "u'e12467fabd7ada64e3c8b552734844a3'", "'tokentype'": "u'email'"}>,) and keywords {}
  327. [2017-09-26 08:47:57,292][11958][140640815691968][DEBUG][privacyidea.models:197] Exiting get_otpkey with result <privacyidea.lib.crypto.SecretObj object at 0x7fe96e49be10>
  328. [2017-09-26 08:47:57,296][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:185] Entering checkOtp with arguments (<privacyidea.lib.tokens.HMAC.HmacOtp object at 0x7fe96e4d7810>, u'[...]', 10) and keywords {'symetric': True}
  329. [2017-09-26 08:47:57,296][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:145] OTP range counter: 0 - 10
  330. [2017-09-26 08:47:57,296][11958][140640815691968][DEBUG][privacyidea.lib.crypto:185] Entering decrypt with arguments ('3\x83\xbdus\xc1F\xd5;<z\xf8\r\xd3Z\xb9w\xac\n}\xfb\xce\x0f\x9f8\xdc\xc5aa\x9e\xed\x02!\xdc\x83&\x91\xa5S&m\xd0CE\\$\xd7\tV\xa0\xac\x82Y\xa7\x85\x17\xf0\x98\x8e\xa2\x9dJ\xcbO~\x9cUs\xf1\x04x+[1\xef\xff\xa2\xb7\xe7\xcd\x8e\xc1\xe0\xae\xaa\xa9uPB\x13\x10\x82\x1c\xdd\x948', '\xe1$g\xfa\xbdz\xdad\xe3\xc8\xb5RsHD\xa3') and keywords {}
  331. [2017-09-26 08:47:57,296][11958][140640815691968][DEBUG][privacyidea.lib.crypto:199] Exiting decrypt with result HIDDEN
  332. [2017-09-26 08:47:57,297][11958][140640815691968][DEBUG][privacyidea.lib.tokens.HMAC:197] Exiting checkOtp with result -1
  333. [2017-09-26 08:47:57,297][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:367] end. "otp counter u'[...]' was not found": res -1
  334. [2017-09-26 08:47:57,297][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:197] Exiting check_otp_exist with result -1
  335. [2017-09-26 08:47:57,298][11958][140640815691968][DEBUG][privacyidea.lib.tokens.hotptoken:197] Exiting is_previous_otp with result False
  336. [2017-09-26 08:47:57,324][11958][140640815691968][DEBUG][privacyidea.lib.token:197] Exiting check_token_list with result (False, {'message': 'wrong otp value', 'type': u'email', 'serial': u'PIEM00007E85', 'otplen': 6})
  337. [2017-09-26 08:47:57,324][11958][140640815691968][DEBUG][privacyidea.lib.token:197] Exiting check_user_pass with result (False, {'message': 'wrong otp value', 'type': u'email', 'serial': u'PIEM00007E85', 'otplen': 6})
  338. [2017-09-26 08:47:57,325][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'action': 'auth_max_success', 'scope': 'authorization', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': u'testotp'}
  339. [2017-09-26 08:47:57,325][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': None, 'action': 'auth_max_success', 'scope': 'authorization', 'adminrealm': None}
  340. [2017-09-26 08:47:57,325][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  341. [2017-09-26 08:47:57,325][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  342. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  343. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  344. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  345. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  346. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  347. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  348. [2017-09-26 08:47:57,326][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  349. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'action': 'auth_max_fail', 'scope': 'authorization', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': u'testotp'}
  350. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': None, 'action': 'auth_max_fail', 'scope': 'authorization', 'adminrealm': None}
  351. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  352. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  353. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  354. [2017-09-26 08:47:57,327][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  355. [2017-09-26 08:47:57,328][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  356. [2017-09-26 08:47:57,328][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  357. [2017-09-26 08:47:57,328][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  358. [2017-09-26 08:47:57,328][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  359. [2017-09-26 08:47:57,328][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  360. [2017-09-26 08:47:57,331][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'client': '192.168.111.1', 'user': u'testotp', 'resolver': u'Passwd_Resolver', 'action': 'autoassignment', 'scope': 'enrollment'}
  361. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': u'Passwd_Resolver', 'action': 'autoassignment', 'scope': 'enrollment', 'adminrealm': None}
  362. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  363. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  364. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  365. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  366. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  367. [2017-09-26 08:47:57,332][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  368. [2017-09-26 08:47:57,333][11958][140640815691968][DEBUG][privacyidea.lib.policy:538] Policies after matching resolver: []
  369. [2017-09-26 08:47:57,333][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  370. [2017-09-26 08:47:57,333][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  371. [2017-09-26 08:47:57,333][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  372. [2017-09-26 08:47:57,333][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'serial') and keywords {'scope': 'authorization', 'client': '192.168.111.1'}
  373. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': None, 'active': True, 'client': '192.168.111.1', 'user': None, 'resolver': None, 'action': 'serial', 'scope': 'authorization', 'adminrealm': None}
  374. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  375. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  376. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  377. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  378. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  379. [2017-09-26 08:47:57,334][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  380. [2017-09-26 08:47:57,335][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  381. [2017-09-26 08:47:57,335][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>, 'tokentype') and keywords {'scope': 'authorization', 'client': '192.168.111.1', 'realm': u'myrealm', 'user': u'testotp', 'resolver': u'Passwd_Resolver'}
  382. [2017-09-26 08:47:57,335][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'realm': u'myrealm', 'active': True, 'client': '192.168.111.1', 'user': u'testotp', 'resolver': u'Passwd_Resolver', 'action': 'tokentype', 'scope': 'authorization', 'adminrealm': None}
  383. [2017-09-26 08:47:57,335][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  384. [2017-09-26 08:47:57,335][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  385. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  386. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  387. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching user: []
  388. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching realm: []
  389. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:538] Policies after matching resolver: []
  390. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  391. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  392. [2017-09-26 08:47:57,336][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result []
  393. [2017-09-26 08:47:57,337][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'action': 'add_user_in_response', 'scope': 'authorization', 'client': '192.168.111.1', 'active': True}
  394. [2017-09-26 08:47:57,337][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  395. [2017-09-26 08:47:57,337][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  396. [2017-09-26 08:47:57,337][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  397. [2017-09-26 08:47:57,337][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  398. [2017-09-26 08:47:57,338][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  399. [2017-09-26 08:47:57,338][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  400. [2017-09-26 08:47:57,338][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'action': 'no_detail_on_success', 'scope': 'authorization', 'client': '192.168.111.1', 'active': True}
  401. [2017-09-26 08:47:57,338][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  402. [2017-09-26 08:47:57,338][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  403. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  404. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  405. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  406. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  407. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7fe96ee0f490>,) and keywords {'action': 'no_detail_on_fail', 'scope': 'authorization', 'client': '192.168.111.1', 'active': True}
  408. [2017-09-26 08:47:57,339][11958][140640815691968][DEBUG][privacyidea.lib.policy:469] Policies after matching time: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  409. [2017-09-26 08:47:57,340][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching active: [{'time': u'', 'user': [], 'resolver': [u'Passwd_Resolver'], 'active': True, 'adminrealm': [], 'condition': 0, 'realm': [u'myrealm'], 'name': u'PassUser', 'client': [], 'check_all_resolvers': False, 'action': {u'challenge_response': u'email'}, 'scope': u'authentication'}]
  410. [2017-09-26 08:47:57,340][11958][140640815691968][DEBUG][privacyidea.lib.policy:479] Policies after matching scope: []
  411. [2017-09-26 08:47:57,340][11958][140640815691968][DEBUG][privacyidea.lib.policy:503] Policies after matching action: []
  412. [2017-09-26 08:47:57,340][11958][140640815691968][DEBUG][privacyidea.lib.policy:575] Policies after matching client
  413. [2017-09-26 08:47:57,340][11958][140640815691968][DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
  414. [2017-09-26 08:47:57,390][11958][140640815691968][DEBUG][privacyidea.api.lib.utils:239] Can not get param: No JSON object could be decoded
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement