{"id":26300,"date":"2013-11-28T21:15:23","date_gmt":"2013-11-28T21:15:23","guid":{"rendered":"https:\/\/wordpress.org\/plugins-wp\/wp-identity\/"},"modified":"2014-11-02T01:05:47","modified_gmt":"2014-11-02T01:05:47","slug":"wp-identity","status":"publish","type":"plugin","link":"https:\/\/twd.wordpress.org\/plugins\/wp-identity\/","author":13300284,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","version":"2.2.3","stable_tag":"trunk","tested":"4.0.38","requires":"3.5","requires_php":"","requires_plugins":"","header_name":"Identity Plugin","header_author":"Richard Levenberg","header_description":"","assets_banners_color":"00337e","last_updated":"2014-11-02 01:05:47","external_support_url":"","external_repository_url":"","donate_link":"","header_plugin_uri":"https:\/\/www.ufp.com","header_author_uri":"","rating":0,"author_block_rating":0,"active_installs":30,"downloads":1724,"num_ratings":0,"support_threads":0,"support_threads_resolved":0,"author_block_count":0,"sections":["description","installation","changelog"],"tags":[],"upgrade_notice":[],"ratings":{"1":0,"2":0,"3":0,"4":0,"5":0},"assets_icons":{"icon-128x128.png":{"filename":"icon-128x128.png","revision":"988323","resolution":"128x128","location":"assets"},"icon-256x256.png":{"filename":"icon-256x256.png","revision":"988323","resolution":"256x256","location":"assets"}},"assets_banners":{"banner-1544x500.png":{"filename":"banner-1544x500.png","revision":"942275","resolution":"1544x500","location":"assets"},"banner-772x250.png":{"filename":"banner-772x250.png","revision":"942275","resolution":"772x250","location":"assets"}},"assets_blueprints":{},"all_blocks":[],"tagged_versions":[],"block_files":[],"assets_screenshots":[],"screenshots":[],"jetpack_post_was_ever_published":false},"plugin_section":[],"plugin_tags":[5511,22649,602,600,599],"plugin_category":[38,54],"plugin_contributors":[94134],"plugin_business_model":[],"class_list":["post-26300","plugin","type-plugin","status-publish","hentry","plugin_tags-filtering","plugin_tags-identity","plugin_tags-login","plugin_tags-security","plugin_tags-spam","plugin_category-authentication","plugin_category-security-and-spam-protection","plugin_contributors-richardlufpcom","plugin_committers-richardlufpcom"],"banners":{"banner":"https:\/\/ps.w.org\/wp-identity\/assets\/banner-772x250.png?rev=942275","banner_2x":"https:\/\/ps.w.org\/wp-identity\/assets\/banner-1544x500.png?rev=942275","banner_rtl":false,"banner_2x_rtl":false},"icons":{"svg":false,"icon":"https:\/\/ps.w.org\/wp-identity\/assets\/icon-128x128.png?rev=988323","icon_2x":"https:\/\/ps.w.org\/wp-identity\/assets\/icon-256x256.png?rev=988323","generated":false},"screenshots":[],"raw_content":"<!--section=description-->\n<p>UFP Identity is the only dynamic security platform created for e-commerce sites, design agencies and developers that simplifies login authentication.<\/p>\n\n<p>If there is a token, we support it. UFP Identity supports a wide variety of secure tokens enabling faster, more streamlined access to your websites all the while protecting user accounts from being compromised and preventing spam enrollments to your website.<\/p>\n\n<h4>Our challenge<\/h4>\n\n<p>UFP Identity set out to solve a huge technical challenge: To protect (I mean really, really make private!) online user\u2019s personal info, make the process to access any number of websites at once really easy, and stop bad guys from hacking your stuff.<\/p>\n\n<p>Our technology platform includes:<\/p>\n\n<ul>\n<li>Strongest level of password authentication and encryption!<\/li>\n<li>Spam protection preventing unwanted user account creation<\/li>\n<li>Account-compromise protection<\/li>\n<li>Threat level adjustment to heighten login protection for your users<\/li>\n<li>Seamless token integration (password, Yubico, OTP, various OATH tokens, one-time codes to phone\/email\/irc)<\/li>\n<li>Quicker logins for your users. By the way we\u2019re building a mobile app for that.<\/li>\n<li>Universal password support for websites that use UFP Identity. This means login credentials can work on multiple websites.<\/li>\n<li>Real-time monitoring of every login ensures your users are your users<\/li>\n<li>Reporting tool for website administrators details every login transaction and outcome (coming soon!)<\/li>\n<li>Multiple tokens to single account<\/li>\n<li>Multiple accounts to single account<\/li>\n<\/ul>\n\n<h4>Certificate Signing Request<\/h4>\n\n<p>The Certificate Signing Request requires a private\/public key\npair and the private key is encrypted with a secret key. In order to\ncreate a good secret key the plugin attempts to get good random data\nfrom \/dev\/urandom. If this fails, the plugin makes an attempt to\nsecurely retrieve random data from https:\/\/www.random.org<\/p>\n\n<h4>Enrolling users<\/h4>\n\n<p>Activating this plugin by installing the certificate will upload\ninformation about your users to our servers. We only enroll the\nusername, email and hashed password over a private SSL connection\nusing 2048 bit keys. We will never use any information about your\nusers for any purpose other than authentication and verification. We\nwill never use the email for any purpose other than resetting\ncredentials or authentication. We will never sell or give up any of\nthe information about your users.<\/p>\n\n<h4>Telemetry<\/h4>\n\n<p>We send telemetry data to our servers over an SSL connection with 2048 bit keys. This telemetry data only contains data that we \nwould otherwise get with a successful install of the UFP Identity plugin. The telemetry can be turned off by adding an option\n\u2018identity_telemetry_enabled\u2019 =&gt; \u2018no\u2019.<\/p>\n\n<h4>Location Information<\/h4>\n\n<p>We make a call to http:\/\/freegeoip.net\/json\/ to get location information for the Certificate Signing Request. This\nis to help pre-populate the required fields and minimize the amount of work you need to do. We only do this once, upon install.<\/p>\n\n<!--section=installation-->\n<p>The Wordpress UFP Identity plugin requires OpenSSL.<\/p>\n\n<ol>\n<li>Just activating the plugin will not protect your site with UFP Identity. If you need help please email us at info@ufp.com<\/li>\n<li>As admin, navigate to Plugins\/Add New, Search Plugins for 'UFP Identity'<\/li>\n<li>Click the 'Install Now' link in the search results for 'UFP Identity' and confirm the installation<\/li>\n<li>After a successful installation, click 'Activate Plugin'<\/li>\n<li>Navigate to Settings\/Identity<\/li>\n<li>Create a Certificate Signing Request following the instructions, if successful the CSR will be mailed to info@ufp.com<\/li>\n<li>Upon receiving a certificate, navigate to Settings\/Identity and install the certificate. This will cause existing users to be enrolled with UFP Identity<\/li>\n<li>After enrolling existing users, the plugin will be fully initialized and handling logins for your site.<\/li>\n<\/ol>\n\n<!--section=changelog-->\n<h4>1.0<\/h4>\n\n<ul>\n<li>Initial version<\/li>\n<\/ul>\n\n<h4>1.0.1<\/h4>\n\n<ul>\n<li>changed readme to reflect install from wordpress.org<\/li>\n<li>identity enabled for new users, even while enrolling and editing is disabled<\/li>\n<li>disable delete user if editing disabled. n.b. no way to indicate why delete was stopped<\/li>\n<li>more detailed status on Settings\/Identity<\/li>\n<li>if openssl_random_pseudo_bytes doesn't exist, try uniqid<\/li>\n<li>telemetry on activate, deactivate, uninstall<\/li>\n<\/ul>\n\n<h4>1.0.2<\/h4>\n\n<ul>\n<li>fix check status and call it if editing disabled and nothing scheduled<\/li>\n<li>Pulled out loading up library so that it can be used in places that don't require the provider loaded.<\/li>\n<\/ul>\n\n<h4>2.0.0<\/h4>\n\n<ul>\n<li>handle reset properly<\/li>\n<li>static method call generates E_STRICT warning<\/li>\n<li>check to make sure certificate file uploaded is really a certificate file<\/li>\n<li>additional text changes<\/li>\n<li>removed un-necessary label<\/li>\n<li>migrate to strong, cohesive naming strategy<\/li>\n<li>fix missing locality description; add in Company\/Organization header<\/li>\n<li>removing old drupal links; expecting wordpress links<\/li>\n<li>remove need for output_buffering<\/li>\n<li>remove cURL dependencies<\/li>\n<\/ul>\n\n<h4>2.0.1<\/h4>\n\n<ul>\n<li>handle both cases users_can_register = TRUE\/FALSE<\/li>\n<\/ul>\n\n<h4>2.1.0<\/h4>\n\n<ul>\n<li>simplify enrollment check timing<\/li>\n<li>update instructios for CSR creation<\/li>\n<li>remove documented requirement for cURL<\/li>\n<li>describe location functionality<\/li>\n<li>formatting and some additional explanatory text<\/li>\n<li>prefill as much as we can for CSR<\/li>\n<li>nothing to remove with interim_login<\/li>\n<li>admin notice that identity is not installed<\/li>\n<\/ul>\n\n<h4>2.1.1<\/h4>\n\n<ul>\n<li>clean up unused certificate files<\/li>\n<li>copy key to certificate file if dealing with PHP_VERSION &lt; 5.3.3<\/li>\n<li>must specify mode to fopen<\/li>\n<\/ul>\n\n<h4>2.1.2<\/h4>\n\n<ul>\n<li>if we don't handle the login page return an empty error<\/li>\n<li>only prevent updates\/edits when editing is disabled<\/li>\n<li>indicate status more simply and clearly<\/li>\n<li>really simplify checking enroll status<\/li>\n<li>tested with 4.0<\/li>\n<\/ul>\n\n<h4>2.2.2<\/h4>\n\n<ul>\n<li>woocommerce integration<\/li>\n<li>consistent usage of true vs. TRUE<\/li>\n<li>reduction in irrelevant error_log'ing<\/li>\n<li>don't override color in username input<\/li>\n<li>handle profile update with errors and potential blank user<\/li>\n<li>handle whether token is resettable (forgot password)<\/li>\n<\/ul>\n\n<h4>2.2.3<\/h4>\n\n<ul>\n<li>https:\/\/github.com\/woothemes\/woocommerce\/issues\/6667<\/li>\n<li>override pluggable wp_check_password<\/li>\n<\/ul>","raw_excerpt":"The UFP Identity plugin integrates Wordpress login and user management seamlessly with the UFP Identity platform.","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin\/26300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin"}],"about":[{"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/types\/plugin"}],"replies":[{"embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/comments?post=26300"}],"author":[{"embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wporg\/v1\/users\/richardlufpcom"}],"wp:attachment":[{"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/media?parent=26300"}],"wp:term":[{"taxonomy":"plugin_section","embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_section?post=26300"},{"taxonomy":"plugin_tags","embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_tags?post=26300"},{"taxonomy":"plugin_category","embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_category?post=26300"},{"taxonomy":"plugin_contributors","embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_contributors?post=26300"},{"taxonomy":"plugin_business_model","embeddable":true,"href":"https:\/\/twd.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_business_model?post=26300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}