How to Install and Uninstall glewlwyd Package on Kali Linux
Last updated: December 23,2024
1. Install "glewlwyd" package
Here is a brief guide to show you how to install glewlwyd on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
glewlwyd
Copied
2. Uninstall "glewlwyd" package
Please follow the guidelines below to uninstall glewlwyd on Kali Linux:
$
sudo apt remove
glewlwyd
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the glewlwyd package on Kali Linux
Package: glewlwyd
Version: 2.7.6+ds-2
Installed-Size: 1999
Maintainer: Debian IoT Maintainers
Architecture: amd64
Depends: libc6 (>= 2.34), libcbor0.10 (>= 0.10.2), libconfig9, libcrypt1 (>= 1:4.1.0), libgnutls30 (>= 3.7.3), libhoel1.4 (>= 1.4.20), libiddawc1.1 (>= 1.1), libjansson4 (>= 2.14), libldap-2.5-0 (>= 2.5.4), libnettle8, liboath0 (>= 1.12.0), liborcania2.3 (>= 2.3.0), librhonabwy1.1 (>= 1.1), libulfius2.7 (>= 2.7.0), libyder2.0 (>= 1.4.17), zlib1g (>= 1:1.1.4), debconf (>= 0.5) | debconf-2.0, glewlwyd-common, sqlite3, ucf, dbconfig-mysql | dbconfig-sqlite3 | dbconfig-pgsql | dbconfig-no-thanks, adduser
Pre-Depends: init-system-helpers (>= 1.54~)
Suggests: rnbyc
Size: 561856
SHA256: a44237c324d7314ff8561874cbd73347b6d42a979728cd3bc7c0038fa0507188
SHA1: e633f0b6952edd87ac8691707161ba257fb71462
MD5sum: 84dbf32013a31282aa42e54378adeeee
Description: Experimental Single-Sign-On server with multiple factor authentication
Experimental Single Sign On server, OAuth2, Openid Connect, multiple factor
authentication with, HOTP/TOTP, FIDO2, TLS Certificates, etc. extensible via
plugins.
.
It's recommended not to use Glewlwyd in production, more likely to test
OAuth2/OpenID behavior, MFA connections, or IdP in general. You can also
explore its functionalities and help yourself with its source code for other
implementations.
.
If you intend to use it in production, it's highly recommended to follow the
documentation and enable only the features you will use.
Authentication processus supported:
- OAuth2
- OpenID Connect
.
Allows users to authenticate via multiple factors:
- Password
- One-time password (TOTP/HOTP)
- Webauthn (Yubikey, Android devices)
- One-time password sent via e-mail
- TLS Certificate
- External OAuth2/OIDC providers
.
Users and clients can be stored and managed from various backends:
- Database
- LDAP service
- HTTP Backend service providing Basic Authentication
.
Allows users to register a new account with the possibility to confirm their
e-mail address or not. During the registration process, the new user may be
expected to register their passwords, as well as other authentication factors:
- One-time password (TOTP/HOTP)
- Webauthn (Yubikey, Android devices)
- TLS Certificate
- External OAuth2/OIDC providers
Description-md5:
Homepage: https://github.com/babelouest/glewlwyd
Section: web
Priority: optional
Filename: pool/main/g/glewlwyd/glewlwyd_2.7.6+ds-2_amd64.deb
Version: 2.7.6+ds-2
Installed-Size: 1999
Maintainer: Debian IoT Maintainers
Architecture: amd64
Depends: libc6 (>= 2.34), libcbor0.10 (>= 0.10.2), libconfig9, libcrypt1 (>= 1:4.1.0), libgnutls30 (>= 3.7.3), libhoel1.4 (>= 1.4.20), libiddawc1.1 (>= 1.1), libjansson4 (>= 2.14), libldap-2.5-0 (>= 2.5.4), libnettle8, liboath0 (>= 1.12.0), liborcania2.3 (>= 2.3.0), librhonabwy1.1 (>= 1.1), libulfius2.7 (>= 2.7.0), libyder2.0 (>= 1.4.17), zlib1g (>= 1:1.1.4), debconf (>= 0.5) | debconf-2.0, glewlwyd-common, sqlite3, ucf, dbconfig-mysql | dbconfig-sqlite3 | dbconfig-pgsql | dbconfig-no-thanks, adduser
Pre-Depends: init-system-helpers (>= 1.54~)
Suggests: rnbyc
Size: 561856
SHA256: a44237c324d7314ff8561874cbd73347b6d42a979728cd3bc7c0038fa0507188
SHA1: e633f0b6952edd87ac8691707161ba257fb71462
MD5sum: 84dbf32013a31282aa42e54378adeeee
Description: Experimental Single-Sign-On server with multiple factor authentication
Experimental Single Sign On server, OAuth2, Openid Connect, multiple factor
authentication with, HOTP/TOTP, FIDO2, TLS Certificates, etc. extensible via
plugins.
.
It's recommended not to use Glewlwyd in production, more likely to test
OAuth2/OpenID behavior, MFA connections, or IdP in general. You can also
explore its functionalities and help yourself with its source code for other
implementations.
.
If you intend to use it in production, it's highly recommended to follow the
documentation and enable only the features you will use.
Authentication processus supported:
- OAuth2
- OpenID Connect
.
Allows users to authenticate via multiple factors:
- Password
- One-time password (TOTP/HOTP)
- Webauthn (Yubikey, Android devices)
- One-time password sent via e-mail
- TLS Certificate
- External OAuth2/OIDC providers
.
Users and clients can be stored and managed from various backends:
- Database
- LDAP service
- HTTP Backend service providing Basic Authentication
.
Allows users to register a new account with the possibility to confirm their
e-mail address or not. During the registration process, the new user may be
expected to register their passwords, as well as other authentication factors:
- One-time password (TOTP/HOTP)
- Webauthn (Yubikey, Android devices)
- TLS Certificate
- External OAuth2/OIDC providers
Description-md5:
Homepage: https://github.com/babelouest/glewlwyd
Section: web
Priority: optional
Filename: pool/main/g/glewlwyd/glewlwyd_2.7.6+ds-2_amd64.deb