<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - MIDAS - Room Booking System | Blog</title>
	<atom:link href="https://mid.as/blog/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>...Making your facilities work for you!</description>
	<lastBuildDate>Wed, 27 Aug 2025 11:17:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>New &#8220;Stay Signed In&#8221; feature</title>
		<link>https://mid.as/blog/new-stay-signed-in-feature/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 12:46:05 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[v4.39]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=5722</guid>

					<description><![CDATA[<p>Have you ever hit the reload/refresh button in your browser whilst logged into MIDAS? Were you surprised to be bounced back to a login screen when you did? Well no more! We&#8217;ve redesigned and improved the sign-in experience for MIDAS v4.39. In previous versions, two options were offered on the sign-in screen.. Remember Me Previously, [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/new-stay-signed-in-feature/">New &#8220;Stay Signed In&#8221; feature</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Have you ever hit the reload/refresh button in your browser whilst logged into MIDAS? Were you surprised to be bounced back to a login screen when you did? Well no more!</p>



<p>We&#8217;ve redesigned and improved the sign-in experience for MIDAS v4.39.</p>



<p>In previous versions, two options were offered on the sign-in screen..</p>



<h2 class="wp-block-heading">Remember Me</h2>



<figure class="wp-block-image size-full"><img decoding="async" width="260" height="80" src="https://mid.as/blog/wp-content/uploads/2025/04/remember-me.png" alt="Remember Me" class="wp-image-5743"/></figure>



<p>Previously, the login screen included a &#8220;Remember Me&#8221; tick box. If this was selected when a user logged in, MIDAS would store their credentials in a cookie. The next time they accessed the login screen in the same browser, MIDAS would read this cookie and automatically populate the various fields on the login screen.</p>



<h2 class="wp-block-heading">Auto-Login</h2>



<figure class="wp-block-image size-full"><img decoding="async" width="210" height="80" src="https://mid.as/blog/wp-content/uploads/2025/04/auto-login.png" alt="Auto Login" class="wp-image-5744"/></figure>



<p>An optional &#8220;Auto-Login&#8221; box was also present on the login screen whenever the &#8220;Remember Me&#8221; box was selected.</p>



<p>If &#8220;Auto-Login&#8221; was also selected, then the next time the user accessed the login screen, MIDAS would not only read the &#8216;remember me&#8217; cookie and automatically populate the fields on the login screen, but also automatically click the &#8220;Login&#8221; button.</p>



<h2 class="wp-block-heading">Drawbacks</h2>



<p>There were a number of drawbacks to this approach. The primary drawback being that the &#8220;Remember Me&#8221; option stored a user&#8217;s credentials in a cookie. Whilst this data was encoded and obfuscated, it is no longer best practice to store such data in this manner.</p>



<p>The &#8220;Remember Me&#8221; option is also now somewhat outdated redundant. It was first introduced some 16 years ago &#8211; way back with MIDAS v2 in September 2009. Back then, password managers weren&#8217;t really a thing, and web browsers themselves didn&#8217;t provide a means to remember logins to websites.</p>



<p>Nowadays, all modern browsers off users the ability to remember credentials to websites and webapps. In addition, third party password managers are now also common place.</p>



<p>So it was time to give the &#8220;Remember Me&#8221; function a complete overhall.</p>



<p>In doing so, we also wanted to address a frustration which a number of our customers have reported over the years. If, when using MIDAS, they accidentally hit their browser&#8217;s reload/refresh button, MIDAS jumps them back to a login screen. (That is, unless they had selected both the &#8220;Remember Me&#8221; and the &#8220;Auto-Login&#8221; options when they initially logged in).</p>



<p>To combat this frustration, and to simplify the number of options on the MIDAS login screen, starting with v4.39 users will see a single &#8220;Stay signed in&#8221; option on their sign in screen.</p>



<p>The previous &#8220;Remember Me&#8221; and &#8220;Auto-login&#8221; options have been removed.</p>



<h2 class="wp-block-heading">Staying signed in</h2>



<p>Selecting this new &#8220;Stay signed in&#8221; option when signing in will keep the user signed-in to MIDAS on that browser until they sign out (or until their session times out, based upon the security settings setup by an administrator in your booking system.</p>



<p>Here&#8217;s how the new sign-in screen looks:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="360" height="360" src="https://mid.as/blog/wp-content/uploads/2025/04/stay-signed-in.png" alt="MIDAS sign-in screen with the new 'Stay signed in' option" class="wp-image-5739" srcset="https://mid.as/blog/wp-content/uploads/2025/04/stay-signed-in.png 360w, https://mid.as/blog/wp-content/uploads/2025/04/stay-signed-in-300x300.png 300w, https://mid.as/blog/wp-content/uploads/2025/04/stay-signed-in-150x150.png 150w" sizes="(max-width: 360px) 100vw, 360px" /><figcaption class="wp-element-caption">MIDAS sign-in screen with the new &#8216;Stay signed in&#8217; option</figcaption></figure>
</div>


<p>Like the previous &#8220;Remember Me&#8221; option, the new &#8220;Stay signed in&#8221; option also stores data in a cookie. However, unlike the former, the new &#8220;Stay Signed In&#8221; option only stores a randomly generated and unique session ID. No credentials themselves are stored in a cookie.</p>



<h2 class="wp-block-heading">Refreshing and Reloading</h2>



<p>Regardless of whether the new &#8220;Stay signed in&#8221; option is selected on a user&#8217;s sign-in screen, once the user has signed in, hitting refresh or reload in their browser will no longer jump the user back to a login screen &#8211; they will remain signed in!</p>



<p>With the &#8220;Stay signed in&#8221; option selected (and assuming the user isn&#8217;t accessing via a private/incognito browser window), the user can completely close their browser, and the next time they open it and access your MIDAS URL, they will still be signed in.</p>



<h2 class="wp-block-heading">Security Considerations</h2>



<p>Naturally, if the browser/device you use is shared by multiple people, then you should not select the &#8220;Stay signed in&#8221; option when signing in to MIDAS.</p>



<p>An administrative setting also exists to prevent the &#8220;Stay signed in&#8221; option from being shown to users.</p>



<p>An administrator may also still wish to force user&#8217;s sessions to expire if there is an extended period of no activity. To accommodate this, new settings have been added to the Session Control section of the security screen. This screen may be accessed via MIDAS Admin Options → Manage MIDAS → Security.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="520" height="310" src="https://mid.as/blog/wp-content/uploads/2025/04/session-control-in-439.png" alt="New Session Control security options in MIDAS v4.39" class="wp-image-5741" srcset="https://mid.as/blog/wp-content/uploads/2025/04/session-control-in-439.png 520w, https://mid.as/blog/wp-content/uploads/2025/04/session-control-in-439-300x179.png 300w" sizes="auto, (max-width: 520px) 100vw, 520px" /><figcaption class="wp-element-caption">New Session Control security options in MIDAS v4.39</figcaption></figure>
</div><p>The post <a href="https://mid.as/blog/new-stay-signed-in-feature/">New &#8220;Stay Signed In&#8221; feature</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authenticator App Support</title>
		<link>https://mid.as/blog/authenticator-app-support/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 20:27:03 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[v4.38]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=5337</guid>

					<description><![CDATA[<p>Two-Factor Authentication (sometimes referred to as 2FA) is a more secure method of logging into websites or online services. Traditionally, when you &#8220;log in&#8221; to a website or online service, you enter your username (typically your email address) and password. Then you click a button, and if the details you enter are valid, you&#8217;re logged [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/authenticator-app-support/">Authenticator App Support</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-post-featured-image"><img loading="lazy" decoding="async" width="960" height="400" src="https://mid.as/blog/wp-content/uploads/2024/11/authenticator-app-support.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Authenticator App" style="object-fit:cover;" srcset="https://mid.as/blog/wp-content/uploads/2024/11/authenticator-app-support.jpg 960w, https://mid.as/blog/wp-content/uploads/2024/11/authenticator-app-support-300x125.jpg 300w, https://mid.as/blog/wp-content/uploads/2024/11/authenticator-app-support-768x320.jpg 768w" sizes="auto, (max-width: 960px) 100vw, 960px" /></figure>


<p>Two-Factor Authentication (sometimes referred to as <a href="https://mid.as/glossary/2fa" class="dfn">2FA</a>) is a more secure method of logging into websites or online services.</p>



<p>Traditionally, when you &#8220;log in&#8221; to a website or online service, you enter your username (typically your email address) and password. Then you click a button, and if the details you enter are valid, you&#8217;re logged in.</p>



<p>Unfortunately, many people reuse the same credentials (username / password combination) again and again for multiple websites and online services. The danger of this is that if one of those services gets &#8220;hacked&#8221; or suffers a data breach where user credentials are exposed, an attacker could potentially then access all other websites and online services that that person uses.</p>



<p>Two-factor authentication combats this. It does so by employing a secondary means of authentication in addition to the traditional username / password combination in order to authenticate a user&#8217;s access.</p>



<p>This means that even if a user&#8217;s password has been compromised, an attacker couldn&#8217;t then this to gain access to someone&#8217;s account.</p>



<h2 class="wp-block-heading">Two Factor Authentication in MIDAS</h2>



<p>Since 2015, all MIDAS room booking systems have included optional two-factor authentication. If enabled, this adds an additional layer of account security to our software.</p>



<p>With Two-Factor Authentication enabled, each time a user logins in, a code is sent to their email inbox. The user must then enter this code into MIDAS in order to complete their log in.</p>



<p>But starting with MIDAS v4.38, we&#8217;re improving 2FA options and support in our software!</p>



<p>MIDAS v4.38 (and later) now support authenticator apps &#8211; including Google Authenticator and Microsoft Authenticator &#8211; as an alternative 2FA login option to email.</p>



<h2 class="wp-block-heading">Per User Two Factor Authentication Settings</h2>



<p>Previously, the 2FA option in MIDAS was a &#8216;global&#8217; setting. This meant that it could be enabled or disabled for all user accounts at once. It was not possible to have &#8216;per account&#8217; 2FA settings.</p>



<p>We&#8217;ve made this more flexible for MIDAS v4.38!</p>



<p>Now, administrators can set whether 2FA is enabled for each individual user account. The 2FA option for each account can also be set.</p>



<p>Available 2FA options are now:</p>



<ul class="wp-block-list">
<li>Authenticator App</li>



<li>Email</li>
</ul>



<h2 class="wp-block-heading">Enabling 2FA Authenticator App Globally in MIDAS</h2>



<p>To globally turn on 2FA for all users, administrators can go to MIDAS Admin Options &gt; Manage MIDAS &gt; Security. In the &#8220;Two Factor Authentication (2FA)&#8221; section, tick the &#8220;Enable Two-Factor Authentication For All Users?&#8221; box, and then select the &#8220;Authenticator App&#8221; option:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="500" height="150" src="https://mid.as/blog/wp-content/uploads/2024/11/438-global-2fa.png" alt="Global Two-Factor Authentication Options - now includes authenticator apps" class="wp-image-5348" srcset="https://mid.as/blog/wp-content/uploads/2024/11/438-global-2fa.png 500w, https://mid.as/blog/wp-content/uploads/2024/11/438-global-2fa-300x90.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /><figcaption class="wp-element-caption">Global Two-Factor Authentication Options &#8211; now includes authenticator apps</figcaption></figure>
</div>


<p>Click &#8220;Save Changes&#8221; and 2FA via Authenticator Apps will be enabled for all user accounts.</p>



<h2 class="wp-block-heading">Enabling 2FA Authenticator App For Individual User Accounts</h2>



<p>2FA options are also available on a per-user account basis. Administrators can enable, disable, or change the 2FA method on a user account by going to MIDAS Admin Options &gt; Manage Users &amp; Permissions.</p>



<p>Select the user account you wish to enable 2FA for, and choose &#8220;Authenticator App&#8221; from the &#8220;2FA Login&#8221; setting:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="465" height="400" src="https://mid.as/blog/wp-content/uploads/2024/11/438-per-user-2fa.png" alt="New per-user Two-Factor Authentication Options" class="wp-image-5349" srcset="https://mid.as/blog/wp-content/uploads/2024/11/438-per-user-2fa.png 465w, https://mid.as/blog/wp-content/uploads/2024/11/438-per-user-2fa-300x258.png 300w" sizes="auto, (max-width: 465px) 100vw, 465px" /><figcaption class="wp-element-caption">New per-user Two-Factor Authentication Options</figcaption></figure>
</div>


<p>Then click &#8220;Save Changes&#8221;.</p>



<h2 class="wp-block-heading">How 2FA via an Authenticator App Works</h2>



<p>When 2FA authentication via authenticator apps has been enabled on a user&#8217;s account, the next time they login, they&#8217;ll be presented with a QR Code to scan with their authenticator app:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="560" height="730" src="https://mid.as/blog/wp-content/uploads/2024/11/438-init-2fa-login.png" alt="Setting up your authenticator app upon first login" class="wp-image-5350" srcset="https://mid.as/blog/wp-content/uploads/2024/11/438-init-2fa-login.png 560w, https://mid.as/blog/wp-content/uploads/2024/11/438-init-2fa-login-230x300.png 230w" sizes="auto, (max-width: 560px) 100vw, 560px" /><figcaption class="wp-element-caption">Setting up your authenticator app upon first login</figcaption></figure>
</div>


<p>If they&#8217;re unable to scan the QR Code a &#8216;secret key&#8217; is also provided which can be manually entered into authenticator apps.</p>



<p>The user&#8217;s authenticator app will then generate a 6 digit code which they can enter into MIDAS to complete their login.</p>



<p>The QR Code / Secret Key needs only to be scanned/entered into the user&#8217;s authenticator app once upon first use. For subsequent logins, the user will simply need to enter the 6 digit code generated by their authenticator app:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="560" height="480" src="https://mid.as/blog/wp-content/uploads/2024/11/438-2fa-login.png" alt="Entering a OTP generated by your authenticator app to complete login" class="wp-image-5351" srcset="https://mid.as/blog/wp-content/uploads/2024/11/438-2fa-login.png 560w, https://mid.as/blog/wp-content/uploads/2024/11/438-2fa-login-300x257.png 300w" sizes="auto, (max-width: 560px) 100vw, 560px" /><figcaption class="wp-element-caption">Entering a OTP generated by your authenticator app to complete login</figcaption></figure>
</div>


<h2 class="wp-block-heading">Supported Authenticator Apps</h2>



<p>Popular FREE authenticator apps supported by MIDAS include:</p>



<ul class="wp-block-list">
<li>Google Authenticator (available for <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2">Android</a> and <a href="https://apps.apple.com/us/app/google-authenticator/id388497605">iOS</a>)</li>



<li>Microsoft Authenticator (available for <a href="https://play.google.com/store/apps/details?id=com.azure.authenticator">Android</a> and <a href="https://apps.apple.com/us/app/microsoft-authenticator/id983156458">iOS</a>)</li>



<li><a href="https://support.apple.com/120758">Apple Passwords App</a> (included starting with iOS 18 and macOS Sequoia)</li>



<li><a href="https://2faguard.app/">2FAGuard</a> (available for <a href="https://apps.microsoft.com/detail/9p6hr4gszjrm">Windows</a>)</li>



<li>2fast (available for <a href="https://apps.microsoft.com/detail/9p9d81glh89q">Windows</a>)</li>



<li><a href="https://authme.levminer.com/">Authme</a> (available for <a href="https://authme.levminer.com/#downloads">Linux</a>, <a href="https://authme.levminer.com/#downloads">macOS</a>, and <a href="https://apps.microsoft.com/detail/xp9m33rjsvd6jr">Windows</a>)</li>



<li><a href="https://keepassxc.org">KeePassXC</a> (available for <a href="https://keepassxc.org/download/#macos">MacOS</a>, <a href="https://keepassxc.org/download/#windows">Windows</a>, and <a href="https://keepassxc.org/download/#linux">Linux</a>)</li>



<li><a href="https://www.safe-in-cloud.com/">Password Manager SafeInCloud</a> (available for <a href="https://play.google.com/store/apps/details?id=com.safeincloud.free">Android</a>, <a href="https://apps.apple.com/us/app/password-manager-safeincloud-2/id895062927">iOS</a>, <a href="https://apps.apple.com/us/app/safeincloud-password-manager/id883070818?mt=12">macOS</a>, and <a href="https://www.microsoft.com/store/apps/9NLXL1B6J7LW">Windows</a>)</li>



<li>Protecc (available for <a href="https://apps.microsoft.com/detail/9pjx91m06tzs">Windows</a>)</li>



<li><a href="https://cpl.thalesgroup.com/access-management/authenticators/software-authentication/mobilepass-plus-push-authentication">SafeNet MobilePASS+</a> (available for <a href="https://play.google.com/store/apps/details?id=com.gemalto.mpassplus">Android</a>, <a href="https://apps.apple.com/il/app/mobilepass/id1056481326">iOS</a>, and <a href="https://apps.microsoft.com/detail/9n5h67m93dt0?hl=en-gb&amp;gl=IE">Windows</a>)</li>
</ul>



<p>However, <em>any</em> <a class="dfn" href="https://mid.as/glossary/otp">OTP</a> authenticator app which generates Timed One-Time Passwords (TOTP) derived from a shared secret value and the current time should be compatible. TOTP codes are typically six digits long and change every 30 seconds.</p>



<h2 class="wp-block-heading">Resetting 2FA</h2>



<p>If a user looses their authenticator app, an administrative user in a MIDAS system can change the user&#8217;s 2FA method, or reset their authenticator token. By resetting a user&#8217;s authenticator token, the next time the user logs in, they&#8217;ll be presented with a brand new QR Code/Secret Key to enter into their authenticator app.</p>



<h2 class="wp-block-heading">Availability</h2>



<p>2FA login authentication has been available since MIDAS v4.10 (2015). However, this implementation is limited to authentication codes sent to users via email. 2FA could also only be enabled globally (for all user accounts)</p>



<p>2FA login authentication via either email or authenticator apps is available in MIDAS v4.38 or later. These options can be enabled globally, or an a per user account basis.</p>
<p>The post <a href="https://mid.as/blog/authenticator-app-support/">Authenticator App Support</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deprecating some outdated settings</title>
		<link>https://mid.as/blog/deprecating-some-outdated-settings/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 12:58:20 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[LetsEncrypt]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[v4.37]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=5095</guid>

					<description><![CDATA[<p>In MIDAS v4.37, we&#8217;re deprecating some outdated privacy and security settings. In this post, we&#8217;ll outline what&#8217;s changing and explain the reasons behind the decision to remove these options. &#8220;SSL Access&#8221; setting has been removed In the early days of the World Wide Web, you connected to websites over &#8220;http&#8221;. &#8220;http&#8221; connections were not secure [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/deprecating-some-outdated-settings/">Deprecating some outdated settings</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In MIDAS v4.37, we&#8217;re deprecating some outdated privacy and security settings.</p>



<p>In this post, we&#8217;ll outline what&#8217;s changing and explain the reasons behind the decision to remove these options.</p>



<h2 class="wp-block-heading">&#8220;SSL Access&#8221; setting has been removed</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="410" height="160" src="https://mid.as/blog/wp-content/uploads/2024/07/ssl-access.png" alt="SSL Access setting in MIDAS" class="wp-image-5100" srcset="https://mid.as/blog/wp-content/uploads/2024/07/ssl-access.png 410w, https://mid.as/blog/wp-content/uploads/2024/07/ssl-access-300x117.png 300w" sizes="auto, (max-width: 410px) 100vw, 410px" /><figcaption class="wp-element-caption">SSL Access setting in MIDAS</figcaption></figure>
</div>


<p>In the early days of the World Wide Web, you connected to websites over &#8220;http&#8221;.</p>



<p>&#8220;http&#8221; connections were not secure and could be intercepted. So along came &#8220;https&#8221;, which allowed visitors to connect to websites over encrypted Secure Socket Layer &#8211; or SSL &#8211; connections.</p>



<p>However, adoption of &#8220;https&#8221; was initially slow by the majority of the World Wide Web. Primarily, this was due to SSL certificates being very expensive. Large financial institutions were naturally quick to jump on https. However, the price of SSL certificates put securing websites with https out of reach of the average webmaster. Especially when the cost to renew them every 1-2 years was factored in.</p>



<p>Now, as you may know, we&#8217;ve been developing our web based MIDAS room booking software for nearly 20 years now! When we first began to offer a &#8220;cloud hosted&#8221; booking system to customers (way back in 2007), SSL/https use around the web was not wide spread, and was expensive to implement.</p>



<p>Initially in 2007, we offered our cloud-hosted customers the option of being able to access their hosted MIDAS system over secure https. This was available via an <a href="https://mid.as/kb/00016/high-grade-encrypted-ssl-access">optional (paid) addon for their scheduling system</a>.</p>



<p>By June 2011, we&#8217;d recognized the importance and benefit of secure SSL connections for all our customers to their MIDAS systems. We therefore introduced <a href="https://mid.as/blog/midas-now-with-ssl-support/">better support for secure SSL connections with MIDAS v3.13</a>.</p>



<p>As part of this, we added a new &#8220;SSL Access&#8221; setting to v3.13. This allowed administrators to control whether insecure http and/or secure https connections would be permitted to their MIDAS system.</p>



<p>In August 2012, we then took the further decision to include an SSL Certificate to enable secure connections for all our existing and future cloud hosted customers. At the same time, we enforced https connections to all hosted MIDAS system.</p>



<p>Consequently, the &#8220;SSL Access&#8221; option first introduced in MIDAS v3.13 became redundant for our cloud-hosted customers. Since 2015 and MIDAS v4.09, this option has no longer been available in cloud-hosted editions of our booking system.</p>



<p>In the following years, gradually the cost of SSL certificates reduced. Then in 2016, along came a game-changing service called &#8220;<a href="https://letsencrypt.org/">Let&#8217;s Encrypt</a>&#8220;. Let&#8217;s Encrypt offered FREE SSL certificates for all. This finally allowed every webmaster the ability to &#8220;secure&#8221; visitor connections to their websites at zero cost.</p>



<p>In May 2018 we <a href="https://mid.as/blog/certificate-authority-migration/">migrated all our cloud-hosted customer&#8217;s SSL certificates</a> from expensive GlobalSign certificates to ones issued for free by Let&#8217;s Encrypt instead.</p>



<p>Now, in 2024, SSL/https certificates are the norm &#8211; in fact, all modern web browsers now alert you if you attempt to visit an insecure website via http.</p>



<p>So whilst we removed the &#8220;SSL Access&#8221; settings in cloud-hosted MIDAS systems back in 2015, we&#8217;re now also removing these settings for self-hosted customers starting with MIDAS v4.37.</p>



<h2 class="wp-block-heading">&#8220;Allowed IP Range&#8221; setting has been removed (self hosted editions only)</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="410" height="230" src="https://mid.as/blog/wp-content/uploads/2024/07/allowed-ip-range.png" alt="Allowed IP Range setting in MIDAS" class="wp-image-5101" srcset="https://mid.as/blog/wp-content/uploads/2024/07/allowed-ip-range.png 410w, https://mid.as/blog/wp-content/uploads/2024/07/allowed-ip-range-300x168.png 300w" sizes="auto, (max-width: 410px) 100vw, 410px" /><figcaption class="wp-element-caption">Allowed IP Range setting in MIDAS</figcaption></figure>
</div>


<p>The &#8220;Allowed IP Range&#8221; setting is one of the earliest security settings we provided in our room booking system. In fact, it was <a href="https://mid.as/changelog/1.35">first introduced in v1.35</a> back in August 2007.</p>



<p>The setting allows an administrator to restrict access to their MIDAS system to an IP address or range.</p>



<p>This can be useful if a MIDAS system is hosted on a public-facing web server, which potentially could be accessed by anyone worldwide. The &#8220;Allowed IP Range&#8221; setting can be used to restrict access to users in your own country, organization, or to just you!</p>



<p>However, one of the limitations of this setting is that it only supports ipv4 address, and not ipv6 addresses.</p>



<p>Also, in the years since this setting was first introduced, other security and firewall products are available which provide greater control over access to websites, apps, and servers.</p>



<p>Therefore, starting with MIDAS v4.37, we have removed the &#8220;Allowed IP Range&#8221; setting in self-hosted editions.</p>



<p>If you&#8217;re a self-hosted customer and wish to restrict access to your MIDAS system by IP address you should consider other options to achieve this.</p>



<p>For instance, on Apache servers, you can easily allow/deny access by ip address/range in your httpd.conf or .htaccess files. For more information, please see <a href="https://httpd.apache.org/docs/2.4/howto/access.html">Apache&#8217;s guidance on access control</a>.</p>



<h2 class="wp-block-heading">&#8220;Do Not Track (dnt)&#8221; has been superseded by &#8220;Global Privacy Control&#8221; </h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="410" height="100" src="https://mid.as/blog/wp-content/uploads/2024/07/do-not-track.png" alt="Honor user's Do Not Track preference setting in MIDAS" class="wp-image-5102" srcset="https://mid.as/blog/wp-content/uploads/2024/07/do-not-track.png 410w, https://mid.as/blog/wp-content/uploads/2024/07/do-not-track-300x73.png 300w" sizes="auto, (max-width: 410px) 100vw, 410px" /><figcaption class="wp-element-caption">Honor user&#8217;s Do Not Track preference setting in MIDAS</figcaption></figure>
</div>


<p>&#8220;Do Not Track&#8221; &#8211; or &#8216;dnt&#8217; for short &#8211; was an official HTTP header first proposed in 2009. It was intended to allow user to opt-out of tracking by websites.</p>



<p>By 2011, all major web browsers had implemented support for the proposed &#8220;Do Not Track&#8221; features.</p>



<p>In 2017, with the release of MIDAS v4.16, we included an &#8220;Honor user&#8217;s Do Not Track preference&#8221; setting.</p>



<p>If enabled (and if an end-user had also enabled the &#8220;Do Not Track&#8221; feature in their browser), MIDAS would not log the user&#8217;s IP address in the <a href="https://mid.as/help/activity-tracker">Recent Activity Log</a>.</p>



<p>However, globally, recognition and support of the &#8220;Do Not Track&#8221; HTTP header by websites was poor. So much so that in January 2019, the &#8220;Do No Track&#8221; HTTP header was officially deprecated. A month later, Apple removed DNT support from their <a href="https://mid.as/blog/tag/safari/">Safari</a> browser.</p>



<p>Whilst some other browsers still continue to offer a &#8220;Do Not Track&#8221; setting, it has since been supersede by a new &#8220;<a href="https://globalprivacycontrol.org/">Global Privacy Control</a>&#8221; &#8211; or GPC &#8211; header.</p>



<p>At time of writing, Global Privacy Control is still classed as an &#8220;experimental&#8221; and &#8220;non standard&#8221; technology, and it&#8217;s behaviour may change in the future.</p>



<p>But for MIDAS v4.37, we&#8217;ll support both DNT and GPC features. The &#8220;Honor user&#8217;s Do Not Track preference&#8221; setting will be renamed to &#8220;Honor user&#8217;s privacy preferences&#8221; to reflect this.</p>



<p>It&#8217;s likely that in a future update we&#8217;ll fully drop support the deprecated &#8220;DNT&#8221; header. At time of writing though, as some browsers still support it, we&#8217;ll continue to support it too.</p>



<p></p>
<p>The post <a href="https://mid.as/blog/deprecating-some-outdated-settings/">Deprecating some outdated settings</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Improved Device Detection</title>
		<link>https://mid.as/blog/improved-device-detection/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 12:46:00 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[notifications]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[v4.36]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=5059</guid>

					<description><![CDATA[<p>Whenever your user account is logged into from a new or unfamiliar device, MIDAS can automatically alert you by email. This additional security feature helps keep your account secure by alerting you to suspicious logins. An unfamiliar login notification includes details of the browser, operating system, IP address, and &#8211; with our optional Geolocation addon [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/improved-device-detection/">Improved Device Detection</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-post-featured-image"><img loading="lazy" decoding="async" width="960" height="350" src="https://mid.as/blog/wp-content/uploads/2024/04/device-detection.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Device Detection" style="object-fit:cover;" srcset="https://mid.as/blog/wp-content/uploads/2024/04/device-detection.jpg 960w, https://mid.as/blog/wp-content/uploads/2024/04/device-detection-300x109.jpg 300w, https://mid.as/blog/wp-content/uploads/2024/04/device-detection-768x280.jpg 768w" sizes="auto, (max-width: 960px) 100vw, 960px" /></figure>


<p>Whenever your user account is logged into from a new or unfamiliar device, MIDAS can automatically alert you by email. This additional security feature helps keep your account secure by alerting you to suspicious logins. An <a href="https://mid.as/blog/security-enhancements-in-v4-25/">unfamiliar login notification</a> includes details of the browser, operating system, IP address, and &#8211; with our <a href="https://mid.as/geolocation">optional Geolocation addon</a> &#8211; location, of the device that&#8217;s just logged into your account.</p>



<p>Until now, MIDAS has been unable to distinguish between more recent operating system versions. For example, between Windows 10 and Windows 11, or between MacOS Ventura and Sonoma.</p>



<p>This is because MIDAS has relied on the &#8220;User Agent&#8221; (UA) string that&#8217;s presented by the browser that&#8217;s logging in.</p>



<p>Here&#8217;s an example of a browser&#8217;s &#8220;User Agent&#8221; string presented to a web server:</p>



<pre class="wp-block-preformatted">Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36</pre>



<p>There&#8217;s a lot of information there, but essentially, from this string MIDAS can derive that it&#8217;s a Windows (64 bit) device, and the browser is Google Chrome 123.</p>



<p>Here&#8217;s another example:</p>



<pre class="wp-block-preformatted">Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0</pre>



<p>From this, MIDAS can derive that it&#8217;s a macOS device, and the browser is Firefox 124.</p>



<p>But wait&#8230; can&#8217;t MIDAS also determine the exact version of the operating system from these UA strings?</p>



<h2 class="wp-block-heading">Mac OS X 10.15&#8230;. Catalina? &#8230;Big Sur? &#8230;Monterey? &#8230;Ventura?</h2>



<p>Doesn&#8217;t &#8220;Mac OS X 10.15&#8221; imply macOS Catalina? ..and doesn&#8217;t &#8220;Windows NT 10.0&#8221; imply Windows 10?</p>



<p>Well, that used to be the case, but not any more!</p>



<p>Modern browsers now &#8220;clamp&#8221; the versions of more recent macOS/Windows operating systems reported by the User Agent string. For macOS operating systems, the User Agent string will report a maximum of macOS X 10.15. For Windows operating systems, a maximum of Windows 10 will be reported. Browsers no longer natively report the specific version of the operating system they&#8217;re running on.</p>



<p>This means that a Chrome browser running on either Windows 10 or Windows 11 will report &#8220;Windows NT 10.0&#8221;. Similarly, macOS Catalina (10.15), Big Sur (11), Monterey (12), Ventura (13), and Sonoma (14), will all report &#8220;Mac OS X 10.15&#8221;.</p>



<h2 class="wp-block-heading">So Windows 10 and 11 are the same then?</h2>



<p>In an effort to improve user privacy, browsers have decided to no longer reveal the specific operating system version a user is using when visiting a website, in order to make it harder for websites to &#8220;fingerprint&#8221; users.</p>



<p>&#8220;Fingerprinting&#8221; is a technique that some websites employ to uniquely identify and potentially track visitors.</p>



<p>So because of these changes to the way browsers report User Agent strings, it&#8217;s been difficult for MIDAS to provide a unfamiliar login notification containing details of exact operating system version that&#8217;s been used to login to an account.</p>



<p>But advancements in technology mean that we&#8217;ve now been able to make improvements to device detection for MIDAS v4.36.</p>



<h2 class="wp-block-heading">Utilizing New &#8220;Client Hint&#8221; technology</h2>



<p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints">Client hints</a>&nbsp;are a set of HTTP request headers that provide useful information about the client such as device type and network conditions. This then allow servers to optimize what is served for those conditions.</p>



<p>Unlike the traditional &#8220;User Agent String&#8221;, client hints provide a more efficient and privacy preserving way of getting the desired information.</p>



<p>A web server can proactively request the client hint headers they are interested in. The browser can then include the requested headers in subsequent requests.</p>



<p>If the web server upon which a MIDAS system is running proactively requests either the &#8220;sec-ch-ua-platform-version&#8221; or &#8220;ua-platform-version&#8221; client hint header, MIDAS can receive details of the user&#8217;s operating system version.</p>



<p>Unfamiliar login notifications (if enabled) can then provide much more accurate information as to the operating system of the new device which has logged into your account.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="760" height="442" src="https://mid.as/blog/wp-content/uploads/2024/04/improved-devide-detection.png" alt="Improved Device Detection in MIDAS v4.36" class="wp-image-5070" srcset="https://mid.as/blog/wp-content/uploads/2024/04/improved-devide-detection.png 760w, https://mid.as/blog/wp-content/uploads/2024/04/improved-devide-detection-300x174.png 300w" sizes="auto, (max-width: 760px) 100vw, 760px" /><figcaption class="wp-element-caption">Improved Device Detection in MIDAS v4.36</figcaption></figure>
</div>


<h2 class="wp-block-heading">Web Server Configuration</h2>



<p>Because a web server has to proactively request these new client headers in order for browsers to respond to them, servers have to be configured accordingly.</p>



<p>All of our cloud-hosted nodes have been appropriately configured. Our client servers now proactively request the necessary Client Hint headers. This in turn means that all cloud hosted users can start to take advantage of these improvements to device detection and unfamiliar login notifications.</p>



<p>For self-hosted customers, a small configuration change to the web server when your MIDAS system is running from is required.</p>



<p>Details of the configuration change you&#8217;ll need to make can be found in our KB article, <a href="https://mid.as/kb/00253/configure-server-for-client-hints">How to configure your server for Client Hints</a>.</p>
<p>The post <a href="https://mid.as/blog/improved-device-detection/">Improved Device Detection</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Proposal to drop TLS 1.2 support in 2025</title>
		<link>https://mid.as/blog/proposal-to-drop-tls-1-2-support-in-early-2025/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Mon, 05 Feb 2024 12:44:22 +0000</pubDate>
				<category><![CDATA[Tech Insight]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[TLS 1.0]]></category>
		<category><![CDATA[TLS 1.1]]></category>
		<category><![CDATA[TLS 1.2]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=4764</guid>

					<description><![CDATA[<p>Transport Layer Security &#8211; or &#8220;TLS&#8221;- is a cryptographic mechanism to facilitate secure connections and communications across the internet. For example, the https network connection between your device and secure websites or applications, like MIDAS. Several incarnations of the Transport Layer Security protocol have been developed over the years, the most recent being 1.3: Protocol [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/proposal-to-drop-tls-1-2-support-in-early-2025/">Proposal to drop TLS 1.2 support in 2025</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="512" src="https://mid.as/blog/wp-content/uploads/2024/02/tls13-1024x512.png" alt="Proposal to deprecate Transport Layer Security TLS 1.2" class="wp-image-4810" srcset="https://mid.as/blog/wp-content/uploads/2024/02/tls13-1024x512.png 1024w, https://mid.as/blog/wp-content/uploads/2024/02/tls13-300x150.png 300w, https://mid.as/blog/wp-content/uploads/2024/02/tls13-768x384.png 768w, https://mid.as/blog/wp-content/uploads/2024/02/tls13.png 1460w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p>Transport Layer Security &#8211; or &#8220;TLS&#8221;- is a cryptographic mechanism to facilitate secure connections and communications across the internet. For example, the https network connection between your device and secure websites or applications, like <a href="https://mid.as">MIDAS</a>.</p>



<p>Several incarnations of the Transport Layer Security protocol have been developed over the years, the most recent being 1.3:</p>



<figure class="wp-block-table aligncenter"><table><thead><tr><th class="has-text-align-center" data-align="center">Protocol</th><th class="has-text-align-center" data-align="center">Released</th><th class="has-text-align-center" data-align="center">Current Status</th></tr></thead><tbody><tr><td class="has-text-align-center" data-align="center">TLS 1.0</td><td class="has-text-align-center" data-align="center">1999</td><td class="has-text-align-center" data-align="center">Deprecated</td></tr><tr><td class="has-text-align-center" data-align="center">TLS 1.1</td><td class="has-text-align-center" data-align="center">2006</td><td class="has-text-align-center" data-align="center">Deprecated</td></tr><tr><td class="has-text-align-center" data-align="center">TLS 1.2</td><td class="has-text-align-center" data-align="center">2008</td><td class="has-text-align-center" data-align="center">In use since 2008</td></tr><tr><td class="has-text-align-center" data-align="center">TLS 1.3</td><td class="has-text-align-center" data-align="center">2018</td><td class="has-text-align-center" data-align="center">In use since 2018</td></tr></tbody></table><figcaption class="wp-element-caption">TLS Protocol History</figcaption></figure>



<p>TLS 1.0 and 1.1 are now considered &#8220;legacy protocols&#8221; and &#8220;weak&#8221; by today&#8217;s cryptographic standards. That&#8217;s because they&#8217;re susceptible to several vulnerabilities. Modern web browsers automatically default to preferring more secure TLS 1.2 and 1.3 connections. In fact, they may even display a warning when connecting to a website that only supports the now obsolete TLS 1.0/1.1 protocols.</p>



<p>As security and cryptographic standards have evolved over the years, we have too! We&#8217;ve previously <a href="https://mid.as/blog/disabling-tls-1-0/">dropped support for TLS 1.0 connections to our network in 2017</a>. We then subsequently <a href="https://mid.as/blog/security-enhancements-in-v4-25/">dropped support for TLS 1.1 connections in 2020</a>.</p>



<p>As part of our ongoing commitment to security, we&#8217;re now proposing to also deprecate support for TLS 1.2 connections to our client servers in early 2025. Going forward, we propose to only support TLS 1.3 (the latest Transport Layer Security protocol version) connections.</p>



<h2 class="wp-block-heading">But wait.. isn&#8217;t TLS 1.2 still considered secure?</h2>



<p>In the past few years, researchers have discovered cryptographic weakness in <em>some</em> of the ciphers and algorithms that TLS 1.2 uses.</p>



<p>While TLS 1.2 can still be used, it is no longer considered the most secure option. TLS 1.2 is only considered &#8220;safe&#8221; when weak ciphers and algorithms are removed. </p>



<p>On the other hand, TLS 1.3 supports the latest modern encryption with stronger encryption algorithms and more robust authentication mechanisms. <strong>TLS 1.3 is currently the most secure TLS version</strong>. At time of writing, TLS 1.3 currently has no known vulnerabilities, and also offers performance improvements over TLS 1.2.</p>



<h2 class="wp-block-heading">When will TLS 1.2 be deprecated?</h2>



<p>At time of writing, there has been no date announced as to when TLS 1.2 will be officially deprecated.</p>



<p>However, one day TLS 1.2 will become obsolete, just as its predecessors TLS 1.1 and TLS 1.0 have become.</p>



<p>TLS 1.3 is currently the most secure TLS version. We&#8217;re keen to aid its adoption and to ensure the most secure connections to our network and servers. This is why we&#8217;re proposing to stop supporting older TLS 1.2 connections in 2025.</p>



<h2 class="wp-block-heading">What impact would disabling TLS 1.2 support have?</h2>



<p>Most modern browsers and operating systems support TLS 1.3.</p>



<p>Therefore, the vast majority of users will be unaffected by our proposal to switch off support for TLS 1.2 in early 2025. However, if you&#8217;re using an older device or operating system, you may need to take action.</p>



<p>Here&#8217;s a list of browsers and devices that will be affected when TLS 1.2 connections are blocked:</p>



<ul class="wp-block-list">
<li><strong>Internet Explorer:</strong> No versions of Internet Explorer do not support TLS 1.3. This should not impact any of our users, as our MIDAS software has <a href="https://mid.as/blog/internet-explorer-11/">not been supported in IE since 2019</a>.</li>



<li><strong>Edge Legacy:</strong> Versions of Edge Legacy prior to April 2018 do not support TLS 1.3. Users would need to update to a newer version of Edge or a different browser.</li>



<li><strong>Safari on macOS 10.12 Sierra or earlier:</strong> These older macOS versions do not support TLS 1.3 in Safari. Users would need to upgrade their macOS or use a different browser.</li>



<li><strong>Very old versions of other browsers:</strong> Browsers that haven&#8217;t been updated in several years might not support TLS 1.3.</li>



<li><strong>Older Android devices:</strong> Devices running Android 9 (and earlier versions) do not support TLS 1.3.</li>



<li><strong>Older iOS devices:</strong> Devices running iOS 12 (and earlier versions) do not support TLS 1.3.</li>
</ul>



<p>Web browsers and devices that do support TLS 1.3:</p>



<ul class="wp-block-list">
<li><strong>Microsoft Edge</strong> (current versions): Supported since April 2018 (Edge 79+)</li>



<li><strong>Google Chrome:</strong> Supported since April 2018 (Chrome 70+)</li>



<li><strong>Mozilla Firefox:</strong> Supported since October 2017 (Firefox 63+)</li>



<li><strong>Apple Safari</strong> (on macOS 10.13 High Sierra or later): Supported since September 2018 (Safari 14+)</li>



<li><strong>Opera:</strong> Supported since April 2018 (Opera 57+)</li>



<li><strong>Android:</strong> Android 10 (or later)</li>



<li><strong>iOS:</strong> iOS 13 (or later)</li>
</ul>



<h2 class="wp-block-heading">Important Information For Hosted API users:</h2>



<p>If you&#8217;re a cloud-hosted MIDAS customer utilizing the optional <a href="//mid.as/api">MIDAS API</a> you may need to take action before TLS 1.2 connections to our network are disabled in 2025.</p>



<p>You&#8217;ll need to ensure that your applications and the underlying programming language you develop in can support (and are correctly configured for) TLS 1.2 connections.</p>



<p>For instance Java 7 (1.7) (and lower) and .NET 4.7 (and lower) languages don&#8217;t support TLS 1.1/1.2.</p>



<p>If your applications/programming languages do not support TLS 1.3 encryption, your MIDAS API calls will begin to fail in early 2025 once we disable TLS 1.2 support across our network.</p>



<p>Please refer to the vendor of your programming language if you&#8217;re unsure whether it supports TLS 1.3, or for assistance enabling such support in your development environment.</p>



<h2 class="wp-block-heading">Remind me again.. when is this all happening?</h2>



<p>Currently, we are proposing to drop support for TLS 1.2 connections to our network in <strong>2025</strong>.</p>



<p>We have not fixed a specific date in 2025 for this as yet (as we want to hear from you &#8211; see below).</p>



<p>However, anything can change over the course of a year. Should new vulnerabilities be discovered in TLS 1.2 during 2024, this may prompt us to bring our plans to deprecate 1.2 support forward.</p>



<h2 class="wp-block-heading">We Want To Hear From You!</h2>



<p>We are currently only proposing to deprecate TLS 1.2 connections to our network in 2025.</p>



<p>However, we&#8217;re open to feedback from you our users in the meantime.</p>



<p>If you feel you have a particular usage case that would require continued reliance on TLS 1.2 support, please <a href="https://mid.as/contact">reach out to us</a> to discuss.</p>
<p>The post <a href="https://mid.as/blog/proposal-to-drop-tls-1-2-support-in-early-2025/">Proposal to drop TLS 1.2 support in 2025</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Schedule regular Security Audits</title>
		<link>https://mid.as/blog/schedule-regular-security-audits/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Mon, 17 Apr 2023 19:23:39 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[scheduled tasks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[v4.33]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=4391</guid>

					<description><![CDATA[<p>You may not know, but MIDAS includes a useful built-in &#8220;Security Audit&#8221; tool. This allows you to perform a quick and on-demand security analysis of your MIDAS system. First introduced with the release of MIDAS v4.13 in 2016, the &#8220;Security Audit&#8221; tool tests a number of key metrics of your MIDAS booking system. The audit [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/schedule-regular-security-audits/">How to Schedule regular Security Audits</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You may not know, but MIDAS includes a useful built-in &#8220;Security Audit&#8221; tool.</p>



<p>This allows you to perform a quick and on-demand security analysis of your MIDAS system.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1717" height="878" src="https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit.png" alt="Perform a detailed Security Audit of your MIDAS room booking system" class="wp-image-4422" srcset="https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit.png 1717w, https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit-300x153.png 300w, https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit-1024x524.png 1024w, https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit-768x393.png 768w, https://mid.as/blog/wp-content/uploads/2023/04/midas-security-audit-1536x785.png 1536w" sizes="auto, (max-width: 1717px) 100vw, 1717px" /><figcaption class="wp-element-caption">Perform a detailed Security Audit of your MIDAS room booking system</figcaption></figure>
</div>


<p><a href="https://mid.as/blog/security-enhancements-in-v4-13/">First introduced with the release of MIDAS v4.13 in 2016</a>, the &#8220;Security Audit&#8221; tool tests a number of key metrics of your MIDAS booking system.</p>



<p>The audit checks your MySQL / MariaDB setup, MIDAS files, and recommended MIDAS security settings.</p>



<p>It provides a detailed report with appropriate advisories for hardening the security of your MIDAS system.</p>



<p>When the Security Audit was first introduced, it analyzed 15 metrics. Today, that number has increased to over 20.</p>



<p>For MIDAS v4.33, the audit now additionally also&#8230;</p>



<ul class="wp-block-list">
<li>Indicates the number of recently failed login attempts to your MIDAS system.</li>



<li>Checks whether <a href="https://mid.as/blog/geolocation-and-geofencing/">Geofenced logins</a> have been enabled.</li>
</ul>



<p>But the biggest improvement to Security Audits for MIDAS v4.33 is the ability to schedule regular automated security audits.</p>



<p>Until now, a Security Audit could only be manually initiated (via MIDAS Admin Options → Manage MIDAS → Security → Perform a Security Audit)</p>



<p>From MIDAS v4.33, you can now use <a href="https://mid.as/help/manage-scheduled-tasks">Scheduled Tasks</a> to automatically run a Security Audit and email you the results. Audits can be configured to run every 7, 14, 30, 60, or 90 days.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="650" height="180" src="https://mid.as/blog/wp-content/uploads/2023/04/scheduled-security-audit.png" alt="Schedule automated security audits of your MIDAS booking system" class="wp-image-4424" srcset="https://mid.as/blog/wp-content/uploads/2023/04/scheduled-security-audit.png 650w, https://mid.as/blog/wp-content/uploads/2023/04/scheduled-security-audit-300x83.png 300w" sizes="auto, (max-width: 650px) 100vw, 650px" /><figcaption class="wp-element-caption">Schedule automated security audits of your MIDAS booking system</figcaption></figure>
</div><p>The post <a href="https://mid.as/blog/schedule-regular-security-audits/">How to Schedule regular Security Audits</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Geolocation and Geofencing</title>
		<link>https://mid.as/blog/geolocation-and-geofencing/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Thu, 13 Apr 2023 18:53:40 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[addons]]></category>
		<category><![CDATA[geofencing]]></category>
		<category><![CDATA[geolocation]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[v4.33]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=4385</guid>

					<description><![CDATA[<p>We&#8217;re excited to announce Geolocation and Geofencing support for our MIDAS room and resource scheduling software. What is Geolocation? Geolocation is the process of determining the geographic location of a user&#8217;s device. It is used in a variety of applications, such as mapping, navigation, and weather forecasting. A device&#8217;s location can be determined using a [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/geolocation-and-geofencing/">Geolocation and Geofencing</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We&#8217;re excited to announce Geolocation and Geofencing support for our MIDAS room and resource scheduling software.</p>



<h2 class="wp-block-heading">What is Geolocation?</h2>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%">
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="512" height="512" src="https://mid.as/blog/wp-content/uploads/2023/04/geolocation-in-midas.png" alt="Geolocation support in MIDAS room booking systems" class="wp-image-4418" srcset="https://mid.as/blog/wp-content/uploads/2023/04/geolocation-in-midas.png 512w, https://mid.as/blog/wp-content/uploads/2023/04/geolocation-in-midas-300x300.png 300w, https://mid.as/blog/wp-content/uploads/2023/04/geolocation-in-midas-150x150.png 150w" sizes="auto, (max-width: 512px) 100vw, 512px" /></figure>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:66.66%">
<p>Geolocation is the process of determining the geographic location of a user&#8217;s device. It is used in a variety of applications, such as mapping, navigation, and weather forecasting. A device&#8217;s location can be determined using a variety of methods, including GPS, cell tower triangulation, and IP address location.</p>



<p>IP address geolocation is a method of determining the position in the world of an IP address. This can be done by using a variety of methods, including:</p>



<ul class="wp-block-list">
<li><strong>Reverse DNS lookup:</strong>&nbsp;This method involves looking up the IP address in a DNS database to determine the name of the domain that is associated with the IP address. The domain name can then be used to determine the geographic location of the server that hosts the domain.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Geolocation databases:</strong>&nbsp;These databases contain information about the geographic location of IP addresses. This information is typically collected from a variety of sources, such as ISPs and network operators.</li>
</ul>



<p>It is important to note that IP address geolocation is not always accurate. The accuracy of IP address geolocation depends on a variety of factors. These include the quality of the geolocation database and the method that is used to determine the geographic location of the IP address.</p>
</div>
</div>



<p></p>



<h2 class="wp-block-heading">What is Geofencing?</h2>



<p>Geofencing is an extension of geolocation. Once a device&#8217;s geographic location can be determined through geolocation, &#8220;Geofencing&#8221; can be used by a website or application to ensure that devices outside of an authorized area are denied access.</p>



<p>IP geofencing works by creating a virtual radius at a set distance around a fixed point on the globe. By comparing the latitude and longitude coordinates of a user&#8217;s device, with this fixed point, the distance between them can be calculated. This calculation will determine whether the user&#8217;s device falls within the set virtual radius.</p>



<p>Access form any device which falls outside of a set radius of the central fixed location can then be blocked.</p>



<h2 class="wp-block-heading">Geolocation applications within MIDAS</h2>



<p>Initially, there are two main areas within our booking software where geolocation information can be shown.</p>



<p>First, is the <a href="https://mid.as/help/activity-tracker">Recent Activity Log</a>. This <a href="https://mid.as/glossary/audit-log" class="dfn">audit log</a> in MIDAS records all user activity and actions taking place in your booking system. Each entry in the log is time-stamped, and shows the user account and IP address which performed the action.</p>



<p>From MIDAS v4.33, the optional <a href="https://mid.as/geolocation">Geolocation addon</a> can be configured to allow location information to be shown for IP addresses in the Recent Activity Log. This location information includes the city, region, and country that the IP address resides in.</p>



<p>The second application for geolocation in MIDAS accompanies the <a href="https://mid.as/blog/security-enhancements-in-v4-25/">unfamiliar login notifications feature</a>. </p>



<p>The unfamiliar login notifications feature alerts users when their account is signed in to from a new device or location.</p>



<p>These notifications typically include details of the user&#8217;s device / browser and their IP address.</p>



<p>Geolocation support now means that you can optionally configure these notifications to now also include the city, region, and country that the login occurred from.</p>



<h2 class="wp-block-heading">Geofencing applications within MIDAS</h2>



<p>Building on the new geolocation support, Geofencing can be used to further enhance the security of your MIDAS system.</p>



<p>It can be used to restrict account logins to certain countries. For example, if your organization only has offices within the United States and the United Kingdom, your colleagues are typically likely to only need to login to MIDAS from within either the US or the UK. You can use geofencing to block any login attempts originating from countries other than the US or the UK.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="695" height="201" src="https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-country.png" alt="Restrict MIDAS logins to certain countries" class="wp-image-4415" srcset="https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-country.png 695w, https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-country-300x87.png 300w" sizes="auto, (max-width: 695px) 100vw, 695px" /><figcaption class="wp-element-caption">Restrict MIDAS logins to certain countries</figcaption></figure>
</div>


<p>Geofencing can additionally (or alternatively) also restrict account logins to within a certain distance from your location. For example, if you run a <a href="https://mid.as/radio-station-scheduling">radio station</a> in Manchester, UK, you could restrict logins to your MIDAS system to within say a 10 mile radius of Manchester.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="695" height="174" src="https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-distance.png" alt="Restrict MIDAS logins to within a radius of a set geographic location" class="wp-image-4416" srcset="https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-distance.png 695w, https://mid.as/blog/wp-content/uploads/2023/04/geofence-login-by-distance-300x75.png 300w" sizes="auto, (max-width: 695px) 100vw, 695px" /><figcaption class="wp-element-caption">Restrict MIDAS logins to within a radius of a set geographic location</figcaption></figure>
</div>


<h2 class="wp-block-heading">How to enable Geolocation or Geofencing in MIDAS</h2>



<p>The new Geolocation and Geofencing features are available for MIDAS v4.33 (or later) via our optional Geolocation addon.</p>



<p>Existing customers with active subscriptions can obtain this addon via <a href="https://mid.as/upgrade" rel="nofollow">mid.as/upgrade</a>.</p>



<p>If you&#8217;re new to MIDAS, you can subscribe with the Geolocation addon via <a href="https://mid.as/pricing">mid.as/pricing</a>.</p>



<h2 class="wp-block-heading">Geolocation data accuracy</h2>



<p>The accuracy of IP geolocation data depends on a number of factors, including the quality and freshness of the geolocation database, the method that is used to determine the geographic location of the IP address, and the type of IP address.</p>



<p>The IP geolocation data we use in the Geolocation addon for MIDAS is never more than 30 days old.</p>



<p>In general, IP geolocation data is most accurate for large geographic areas, such as countries or states. It  can become less accurate for smaller geographic areas, such as cities or neighborhoods.</p>



<p>That&#8217;s why if you use the distance based geofence features of the Geolocation addon, you should always set a larger liberal distance than necessary, rather than a very small strict distance from your location. The Geolocation addon does include an instant IP lookup test tool, so you can check IP distances before you apply them.</p>



<p>The Geolocation addon also includes &#8220;fallback&#8221; options for both country / distance geofence enforcement. For IP addresses where a country and/or latitude and longitude coordinates cannot be determined, you can configure MIDAS to either block or allow these connections.</p>



<p>It&#8217;s also worth noting that the accuracy of IP geolocation data can be affected by the use of proxy servers and <a href="https://mid.as/glossary/vpn">VPNs</a>. Proxy servers and VPNs can mask the true IP address of a device, making it difficult to determine the device&#8217;s geographic location.</p>
<p>The post <a href="https://mid.as/blog/geolocation-and-geofencing/">Geolocation and Geofencing</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Importance Of Keeping Software Up-To-Date</title>
		<link>https://mid.as/blog/the-importance-of-keeping-software-up-to-date/</link>
					<comments>https://mid.as/blog/the-importance-of-keeping-software-up-to-date/#respond</comments>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 09:02:41 +0000</pubDate>
				<category><![CDATA[Tech Insight]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=3115</guid>

					<description><![CDATA[<p>In October 2020, it came to light that Public Health England (PHE) had &#8220;lost&#8221; nearly 16,000 COVID-19 Test Results. The issue arose by the way the health agency compiled results from the various commercial firms paid by the UK government to analyze Coronavirus swab tests of the public, to discover who has the virus. These [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/the-importance-of-keeping-software-up-to-date/">The Importance Of Keeping Software Up-To-Date</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-post-featured-image"><img loading="lazy" decoding="async" width="960" height="384" src="https://mid.as/blog/wp-content/uploads/2020/10/importance-of-software-updates.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Software Update" style="object-fit:cover;" srcset="https://mid.as/blog/wp-content/uploads/2020/10/importance-of-software-updates.jpg 960w, https://mid.as/blog/wp-content/uploads/2020/10/importance-of-software-updates-300x120.jpg 300w, https://mid.as/blog/wp-content/uploads/2020/10/importance-of-software-updates-768x307.jpg 768w" sizes="auto, (max-width: 960px) 100vw, 960px" /></figure>


<p>In October 2020, it came to light that <a href="https://www.bbc.co.uk/news/technology-54423988">Public Health England (PHE) had &#8220;lost&#8221; nearly 16,000 COVID-19 Test Results</a>.</p>



<p>The issue arose by the way the health agency compiled results from the various commercial firms paid by the UK government to analyze Coronavirus swab tests of the public, to discover who has the virus.</p>



<p>These private firms provided their data in the form of <a href="https://mid.as/glossary/csv" class="dfn">CSV</a> (Comma Separated Values) files &#8211; essentially text files.</p>



<p>PHE had set up an automatic process to pull this data together into Microsoft Excel templates so that it could then be uploaded to a central system. From there it could be made available to the NHS Test and Trace team, as well as other government agencies.</p>



<p>The problem was that PHE&#8217;s own developers picked an old Excel file format to do this &#8211; XLS.</p>



<p>Excel&#8217;s XLS file format dates back to 1987, and was superseded by XLSX in 2007.</p>



<p>In the original XLS format, each file could only handle around 65,000 rows of data. The more modern XLSX format can handle well over a million rows!</p>



<p>As a consequence of using the outdated XLS format, nearly 16,000 positive Covid-19 test results were &#8220;truncated&#8221; and not correctly recorded. </p>



<p>Whilst the 15,841 individuals who tested positive were themselves notified of their result and told to self-isolate, the people they&#8217;d been in recent contact with weren&#8217;t.  </p>



<p>It&#8217;s estimated that in the region of 40,000+ contacts were not traced by the NHS&#8217;s Test &amp; Trace team simply as a result of PHE using obsolete software. </p>



<h2 class="wp-block-heading">Why were Public Health England using 13+ year old software?</h2>



<p>There are many reasons why organizations may continue to use outdated software in their operations, including:</p>



<h3 class="wp-block-heading"><strong>Cost</strong></h3>



<p>One of the most common reasons for not updating software is the cost. For large organizations which may have thousands of workstations and devices, the cost to keep software up-to-date can be prohibitive. Good businesses will plan and budget for these large expenditures and take advantage of bulk discounts and site-wide software licenses.</p>



<h3 class="wp-block-heading"><strong>Compatibility</strong></h3>



<p>Most businesses use multiple software products from different vendors. Often compatibility between these products is required. Not all software titles used by a business are regularly updated by their developers. Some may not have been updated for several years! Often a factor preventing organizations from updating software to more recent versions is when there&#8217;s a risk that doing so would break compatibility with other software they use that&#8217;s not been updated for years.</p>



<p>This is actually one of the reasons that <a href="https://mid.as/blog/are-microsoft-holding-back-the-web/">Internet Explorer 6 and then 8 stayed around for so long</a>. These were aging browsers, but many 3rd party web applications which hadn&#8217;t been updated in years wouldn&#8217;t run in more <a href="https://mid.as/browsers">modern browsers</a>. This effectively forced Microsoft to continue providing support for their fledgling browser for years.</p>



<h3 class="wp-block-heading"><strong>Human Resources</strong></h3>



<p>Some organizations lack the in-house personnel or expertise to roll out company-wide software updates. Again, cost can be a key factor here.</p>



<p>Other organizations &#8220;outsource&#8221; their IT, and rely on a 3rd party provider to keep all their software up-to-date. Most IT providers will routinely do this. However, some take the attitude that if the customer doesn&#8217;t know &#8211; or isn&#8217;t asking &#8211; about updating software on their systems, then why do it?</p>



<h3 class="wp-block-heading"><strong>Business Interruption</strong></h3>



<p>Some organizations are concerned that a large scale roll-out of a software update company wide could cause or &#8220;down-time&#8221; or other unintended issues. This may intern affect staffs ability to do their work.</p>



<p>A &#8220;phased&#8221; upgrade approach &#8211; rather than updating every device at the same time &#8211; may be more sensible. However, this approach could result in compatibility issues if some staff are using a newer version of certain software, at the same time that other staff are still using the older version.  </p>



<hr class="wp-block-separator has-css-opacity"/>



<p>We suspect in the PHE case, the key factor inhibiting upgrading from 13+ year old software was cost. </p>



<p>When it comes to publicly-funded health services, the general public would rather their taxes be spent on front-line services that they can &#8216;see&#8217;, rather than on back-end computer systems and software.</p>



<p>As this case has highlighted though, running obsolete software can potentially put peoples lives at risk!</p>



<h2 class="wp-block-heading">Why keep your MIDAS system up-to-date?</h2>



<p>We know that some of our self-hosted customers continue to run obsolete and out-dated versions of our <a href="https://mid.as">MIDAS</a> room booking software.</p>



<p>We&#8217;ve been developing our software for close to 20 years now, and regularly release <a href="https://mid.as/changelog">software updates</a>. Yet, we&#8217;re aware that there some very old MIDAS systems still in operation.</p>



<p>We strongly encourage all customers to <a href="https://mid.as/kb/00108/tips-for-keeping-your-midas-system-secure">keep their MIDAS systems up-to-date</a>.</p>



<p>For our cloud-hosted customers, we do this for you! You&#8217;ll always be running the most recent version of our software, as we seamlessly keep your system updated.</p>



<p>For self-hosted customers, you can quickly check for updates with just a couple of clicks. Simply login to your system and go to MIDAS Admin Options → Manage MIDAS → Update.</p>



<p>You&#8217;ll need an <a href="https://mid.as/kb/00022/whats-included-in-midas-subscription">active Support Subscription</a> in order to obtain updates. If you don&#8217;t have a subscription, or your subscription has elapsed, you can quickly purchase/renew at <a href="https://mid.as/renew" rel="nofollow">mid.as/renew</a>.</p>



<p>Updating means that you&#8217;ll have access to all the very latest new and improved features. More importantly, ensuring you&#8217;re running the most recent version means you&#8217;re not missing out on any important security patches and updates to keep your MIDAS system safe &amp; secure.</p>



<p>We&#8217;d therefore like to encourage all self-hosted customers to take a few moments to check your MIDAS system is up-to-date.</p>
<p>The post <a href="https://mid.as/blog/the-importance-of-keeping-software-up-to-date/">The Importance Of Keeping Software Up-To-Date</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mid.as/blog/the-importance-of-keeping-software-up-to-date/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improved Password Hardening</title>
		<link>https://mid.as/blog/improved-password-hardening/</link>
					<comments>https://mid.as/blog/improved-password-hardening/#respond</comments>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Mon, 28 Sep 2020 11:35:12 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[v4.26]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=3094</guid>

					<description><![CDATA[<p>For MIDAS v4.26 we&#8217;re improving the password change process for users, with the introduction of a new &#8220;Disallow Known Breached Passwords&#8221; admin setting: With this setting enabled, whenever a user changes their password MIDAS checks that it doesn&#8217;t appear in any known online data breaches. Have I been Pwned? This feature utilizes the popular 3rd [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/improved-password-hardening/">Improved Password Hardening</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For MIDAS v4.26 we&#8217;re improving the <a href="https://mid.as/help/changing-your-password">password change</a> process for users, with the introduction of a new &#8220;Disallow Known Breached Passwords&#8221; admin setting:</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="474" height="235" src="https://mid.as/blog/wp-content/uploads/2020/09/disallow-breached.png" alt="Disallow Known Breached Passwords in MIDAS" class="wp-image-3095" srcset="https://mid.as/blog/wp-content/uploads/2020/09/disallow-breached.png 474w, https://mid.as/blog/wp-content/uploads/2020/09/disallow-breached-300x149.png 300w" sizes="auto, (max-width: 474px) 100vw, 474px" /><figcaption class="wp-element-caption">Disallow Known Breached Passwords</figcaption></figure>
</div>


<p>With this setting enabled, whenever a user changes their password MIDAS checks that it doesn&#8217;t appear in any known online data breaches. </p>



<h2 class="wp-block-heading">Have I been Pwned?</h2>



<p>This feature utilizes the popular 3rd party &#8220;<a href="https://haveibeenpwned.com/">Have I Been Pwned</a>&#8221; service. This is a database of more than half a billion passwords which have previously been exposed in various data breaches.</p>



<p>Don&#8217;t worry though, your actual password is <span style="text-decoration: underline;">never</span> sent to the &#8220;Have I Been Pwned&#8221; service. Here&#8217;s how it works;</p>



<ol class="wp-block-list">
<li>You enter a desired new password in MIDAS.</li>



<li>MIDAS creates a cryptographic &#8220;hash&#8221; (<a href="https://en.wikipedia.org/wiki/SHA-1">SHA-1</a>) of the password you entered. The first five characters of this hash are sent to the <a href="https://haveibeenpwned.com/">Have I Been Pwned</a> service.</li>



<li>If hashes with the same first five characters are found in the Pwned Passwords repository, the Have I Been Pwned service responds with all these hashes.</li>



<li>MIDAS sifts through the received hashes to see if there&#8217;s a complete match with the full SHA-1 hash of your new password.</li>



<li>If a match is found, your desired password has appeared in at least one public data breach. MIDAS will then display an alert and ask you to enter a different password. </li>
</ol>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="302" height="271" src="https://mid.as/blog/wp-content/uploads/2020/09/change-password.png" alt="The Change Password Dialog in MIDAS" class="wp-image-3096" srcset="https://mid.as/blog/wp-content/uploads/2020/09/change-password.png 302w, https://mid.as/blog/wp-content/uploads/2020/09/change-password-300x269.png 300w" sizes="auto, (max-width: 302px) 100vw, 302px" /><figcaption class="wp-element-caption">The Change Password dialog in MIDAS</figcaption></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="540" height="167" src="https://mid.as/blog/wp-content/uploads/2020/09/hibp-warning.png" alt="Chosen Password appears in other online data breaches" class="wp-image-3097" srcset="https://mid.as/blog/wp-content/uploads/2020/09/hibp-warning.png 540w, https://mid.as/blog/wp-content/uploads/2020/09/hibp-warning-300x93.png 300w" sizes="auto, (max-width: 540px) 100vw, 540px" /><figcaption class="wp-element-caption">The chosen password isn&#8217;t considered secure as it appears in other online data breaches</figcaption></figure>
</div>


<p>The new &#8220;Disallow Known Breached Passwords&#8221; setting in MIDAS will be enabled by default. It can readily be enabled/disabled via MIDAS Admin Options → Manage MIDAS → Security.</p>



<p>We&#8217;re passionate about security, and this latest improvement is just one of the ways we help keep your account and MIDAS system secure.</p>



<p>Interested in learning more about security in your MIDAS system? Try these links&#8230;</p>



<ul class="wp-block-list">
<li><a href="https://mid.as/blog/introducing-our-new-security-center/">Introducing our new Security Center</a></li>



<li><a href="https://mid.as/blog/the-evolution-of-password-storage-in-midas/">The evolution of Password Storage in MIDAS</a></li>



<li><a href="https://mid.as/blog/security-enhancements-in-v4-25/">Security Enhancements in v4.25</a></li>



<li><a href="https://mid.as/kb/00108/tips-for-keeping-your-midas-system-secure">Tips for keeping your MIDAS system secure</a></li>



<li><a href="https://mid.as/kb/00141/two-factor-authentication-in-midas">Two-Factor Authentication in MIDAS</a></li>
</ul>
<p>The post <a href="https://mid.as/blog/improved-password-hardening/">Improved Password Hardening</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mid.as/blog/improved-password-hardening/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Introducing our new Security Center</title>
		<link>https://mid.as/blog/introducing-our-new-security-center/</link>
					<comments>https://mid.as/blog/introducing-our-new-security-center/#respond</comments>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Thu, 16 Jul 2020 23:46:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech Insight]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=3061</guid>

					<description><![CDATA[<p>We take a transparent and pro-active approach to the security of our infrastructure and software. In fact, earlier this month we published details of how user passwords are stored within MIDAS following a data breach at one of our competitors. We also implement regular security enhancements to our software. No technology is perfect, but here [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/introducing-our-new-security-center/">Introducing our new Security Center</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-post-featured-image"><img loading="lazy" decoding="async" width="1920" height="400" src="https://mid.as/blog/wp-content/uploads/2020/07/password-storage.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Security Enhancements" style="object-fit:cover;" srcset="https://mid.as/blog/wp-content/uploads/2020/07/password-storage.jpg 1920w, https://mid.as/blog/wp-content/uploads/2020/07/password-storage-300x63.jpg 300w, https://mid.as/blog/wp-content/uploads/2020/07/password-storage-1024x213.jpg 1024w, https://mid.as/blog/wp-content/uploads/2020/07/password-storage-768x160.jpg 768w, https://mid.as/blog/wp-content/uploads/2020/07/password-storage-1536x320.jpg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>


<p>We take a transparent and pro-active approach to the security of our infrastructure and software. In fact, earlier this month we published details of <a href="https://mid.as/blog/the-evolution-of-password-storage-in-midas/">how user passwords are stored within MIDAS</a> following a <a href="https://mid.as/yarooms-alternative">data breach at one of our competitors</a>. We also implement regular <a href="https://mid.as/blog/security-enhancements-in-v4-25/">security enhancements</a> to our software.</p>



<p>No technology is perfect, but here at MIDAS we believe that working with skilled security researchers across the globe is crucial in helping identify potential weaknesses in our software and infrastructure.</p>



<p>That&#8217;s why this week, we&#8217;re pleased to launch our new dedicated Security Center at <a href="https://security.midas.network">security.midas.network</a></p>



<p>From this dedicated portal, you can &#8230;</p>



<h2 class="wp-block-heading">Report a Security Concern or Vulnerability</h2>



<p>We work alongside researchers who responsibly disclose security issues, to address such concerns and vulnerabilities in a timely manner. Our <a href="https://security.midas.network/reporting">Reporting Guidelines</a> page offers guidance for security researchers wishing to raise a concern with us.</p>



<h2 class="wp-block-heading">Contact our Security Team</h2>



<p>Our <a href="https://security.midas.network/contact">security contact</a> page provides methods of getting in direct contact with our security team to raise a security concern in our software or infrastructure.</p>



<h2 class="wp-block-heading">Read the latest Security Advisories</h2>



<p>If a serious concern within our software or infrastructure is identified, we may issue a &#8220;Security Advisory&#8221; containing advice for customers and end-users. We will publish Active Security Advisories here: <a href="https://security.midas.network/advisories">security.midas.network/advisories</a>.</p>



<h2 class="wp-block-heading">View our latest Security Audits</h2>



<p>As part of our transparent approach to security, we&#8217;ve included a &#8220;<a href="https://security.midas.network/audits">Security Audits</a>&#8221; section in our Security Center. Here you&#8217;ll find reports and results from both internal and external security audits on our software and infrastructure.</p>



<h2 class="wp-block-heading">View our Security Changelog</h2>



<p>Until now, we&#8217;ve been publishing two &#8220;change logs&#8221; (or &#8220;Release Notes&#8221;). One for significant major updates to our software, at <a href="https://mid.as/changelog">mid.as/changelog</a>. The other details interim &#8220;bug fix&#8221; updates, and may be found at <a href="https://mid.as/updates">mid.as/updates</a>.</p>



<p>Avid readers of these change logs may notice on occasion the entry &#8220;<em>Security Enhancements</em>&#8220;. These are improvements we make to the security of our software, but which we typically don&#8217;t publish details of.</p>



<p>However, more information on these &#8220;Security Enhancements&#8221; will now be published in the <a href="https://security.midas.network/changelog">Security Changelog</a> in our Security Center. The log will also include details of security updates and improvements to our network and server infrastructure too.</p>



<h2 class="wp-block-heading">View our Security &#8220;Hall of Fame&#8221;</h2>



<p>We appreciate the time and effort that security researchers contribute. So we&#8217;ve set up a &#8220;<a href="https://security.midas.network/credits">Credits</a>&#8221; page where we gratefully acknowledge and thank those who help keep MIDAS and our users safe.</p>
<p>The post <a href="https://mid.as/blog/introducing-our-new-security-center/">Introducing our new Security Center</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mid.as/blog/introducing-our-new-security-center/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 22/47 queries in 0.005 seconds using Disk

Served from: mid.as @ 2026-03-26 13:15:39 by W3 Total Cache
-->