replace nforwardauth with authelia #231
1 changed files with 3 additions and 6 deletions
|
@ -7,10 +7,7 @@ log:
|
|||
|
||||
identity_validation:
|
||||
reset_password:
|
||||
jwt_secret: "{{ lookup('viczem.keepass.keepass', 'authelia_jwt_secret', 'password') }}"
|
||||
|
||||
authelia_jwt_secret
|
||||
|
||||
jwt_secret: {{ lookup('viczem.keepass.keepass', 'authelia_jwt_secret', 'password') }}
|
||||
totp:
|
||||
issuer: totp.mgrote.net
|
||||
|
||||
|
@ -24,7 +21,7 @@ access_control:
|
|||
|
||||
session:
|
||||
name: authelia_session
|
||||
secret: unsecure_session_secret
|
||||
secret: {{ lookup('viczem.keepass.keepass', 'authelia_session_secret', 'password') }}
|
||||
expiration: 3600 # 1 hour
|
||||
inactivity: 300 # 5 minutes
|
||||
domain: mgrote.net # Should match whatever your root protected domain is
|
||||
|
@ -39,7 +36,7 @@ regulation:
|
|||
ban_time: 300
|
||||
|
||||
storage:
|
||||
encryption_key: "{{ lookup('viczem.keepass.keepass', 'authelia_storage_encryption_key', 'password') }}"
|
||||
encryption_key: {{ lookup('viczem.keepass.keepass', 'authelia_storage_encryption_key', 'password') }}
|
||||
local:
|
||||
path: /data/db.sqlite3
|
||||
|
||||
|
|
Loading…
Reference in a new issue