replace nforwardauth with authelia #231
1 changed files with 3 additions and 6 deletions
|
@ -7,10 +7,7 @@ log:
|
||||||
|
|
||||||
identity_validation:
|
identity_validation:
|
||||||
reset_password:
|
reset_password:
|
||||||
jwt_secret: "{{ lookup('viczem.keepass.keepass', 'authelia_jwt_secret', 'password') }}"
|
jwt_secret: {{ lookup('viczem.keepass.keepass', 'authelia_jwt_secret', 'password') }}
|
||||||
|
|
||||||
authelia_jwt_secret
|
|
||||||
|
|
||||||
totp:
|
totp:
|
||||||
issuer: totp.mgrote.net
|
issuer: totp.mgrote.net
|
||||||
|
|
||||||
|
@ -24,7 +21,7 @@ access_control:
|
||||||
|
|
||||||
session:
|
session:
|
||||||
name: authelia_session
|
name: authelia_session
|
||||||
secret: unsecure_session_secret
|
secret: {{ lookup('viczem.keepass.keepass', 'authelia_session_secret', 'password') }}
|
||||||
expiration: 3600 # 1 hour
|
expiration: 3600 # 1 hour
|
||||||
inactivity: 300 # 5 minutes
|
inactivity: 300 # 5 minutes
|
||||||
domain: mgrote.net # Should match whatever your root protected domain is
|
domain: mgrote.net # Should match whatever your root protected domain is
|
||||||
|
@ -39,7 +36,7 @@ regulation:
|
||||||
ban_time: 300
|
ban_time: 300
|
||||||
|
|
||||||
storage:
|
storage:
|
||||||
encryption_key: "{{ lookup('viczem.keepass.keepass', 'authelia_storage_encryption_key', 'password') }}"
|
encryption_key: {{ lookup('viczem.keepass.keepass', 'authelia_storage_encryption_key', 'password') }}
|
||||||
local:
|
local:
|
||||||
path: /data/db.sqlite3
|
path: /data/db.sqlite3
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue