2019-04-10 19:27:18 +00:00
|
|
|
###############################################################
|
|
|
|
# Authelia minimal configuration #
|
|
|
|
###############################################################
|
|
|
|
|
|
|
|
port: 9091
|
|
|
|
|
2020-03-09 19:57:53 +00:00
|
|
|
log_level: debug
|
2019-04-10 19:27:18 +00:00
|
|
|
|
2019-04-24 21:52:08 +00:00
|
|
|
jwt_secret: unsecure_secret
|
|
|
|
|
2019-04-10 19:27:18 +00:00
|
|
|
authentication_backend:
|
|
|
|
file:
|
2019-11-24 20:27:59 +00:00
|
|
|
path: /var/lib/authelia/users.yml
|
2019-04-10 19:27:18 +00:00
|
|
|
|
|
|
|
session:
|
|
|
|
secret: unsecure_session_secret
|
|
|
|
domain: example.com
|
2019-12-06 08:59:32 +00:00
|
|
|
expiration: 3600 # 1 hour
|
|
|
|
inactivity: 300 # 5 minutes
|
2020-04-03 23:11:33 +00:00
|
|
|
remember_me_duration: 1y
|
2019-04-10 19:27:18 +00:00
|
|
|
|
|
|
|
storage:
|
|
|
|
local:
|
2019-12-07 16:40:42 +00:00
|
|
|
path: /var/lib/authelia/db.sqlite
|
2019-04-10 19:27:18 +00:00
|
|
|
|
|
|
|
access_control:
|
|
|
|
default_policy: bypass
|
|
|
|
rules:
|
2019-11-02 14:32:58 +00:00
|
|
|
- domain: "public.example.com"
|
|
|
|
policy: bypass
|
|
|
|
- domain: "admin.example.com"
|
|
|
|
policy: two_factor
|
|
|
|
- domain: "secure.example.com"
|
|
|
|
policy: two_factor
|
|
|
|
- domain: "singlefactor.example.com"
|
|
|
|
policy: one_factor
|
2019-04-10 19:27:18 +00:00
|
|
|
|
|
|
|
notifier:
|
|
|
|
smtp:
|
2019-11-02 14:32:58 +00:00
|
|
|
host: smtp
|
2019-04-10 19:27:18 +00:00
|
|
|
port: 1025
|
|
|
|
sender: admin@example.com
|
2019-12-30 02:03:51 +00:00
|
|
|
disable_require_tls: true
|