2020-02-29 00:43:59 +00:00
|
|
|
---
|
|
|
|
layout: default
|
|
|
|
title: Miscellaneous
|
|
|
|
parent: Configuration
|
2020-05-15 23:41:42 +00:00
|
|
|
nav_order: 3
|
2020-02-29 00:43:59 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Miscellaneous
|
|
|
|
|
|
|
|
Here are the main customizable options in Authelia.
|
|
|
|
|
|
|
|
## Host & Port
|
2020-03-03 07:18:25 +00:00
|
|
|
|
2020-02-29 00:43:59 +00:00
|
|
|
`optional: true`
|
|
|
|
|
2020-03-09 22:37:46 +00:00
|
|
|
Defines the address and port to listen on.
|
2020-02-29 00:43:59 +00:00
|
|
|
|
2020-04-11 04:46:07 +00:00
|
|
|
```yaml
|
|
|
|
host: 0.0.0.0
|
|
|
|
port: 9091
|
|
|
|
```
|
2020-02-29 00:43:59 +00:00
|
|
|
|
2020-03-03 07:18:25 +00:00
|
|
|
## TLS
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Authelia can use TLS. Provide the certificate and the key with the
|
|
|
|
following configuration options:
|
|
|
|
|
2020-04-11 04:46:07 +00:00
|
|
|
```yaml
|
2020-06-17 06:25:35 +00:00
|
|
|
tls_key: /config/ssl/key.pem
|
|
|
|
tls_cert: /config/ssl/cert.pem
|
2020-04-11 04:46:07 +00:00
|
|
|
```
|
2020-03-03 07:18:25 +00:00
|
|
|
|
2020-03-09 19:57:53 +00:00
|
|
|
## Log
|
|
|
|
|
|
|
|
### Log level
|
2020-02-29 00:43:59 +00:00
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Defines the level of logs used by Authelia. This level can be set to
|
2020-11-12 23:14:45 +00:00
|
|
|
`trace`, `debug` or `info`. When setting log_level to `trace`, you will
|
|
|
|
generate a large amount of log entries and expose the `/debug/vars` and
|
|
|
|
`/debug/pprof/` endpoints which should not be enabled in production.
|
2020-02-29 00:43:59 +00:00
|
|
|
|
2020-04-11 04:46:07 +00:00
|
|
|
```yaml
|
|
|
|
log_level: debug
|
|
|
|
```
|
2020-03-09 19:57:53 +00:00
|
|
|
|
|
|
|
### Log file path
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Logs can be stored in a file when file path is provided. Otherwise logs
|
2020-11-12 23:14:45 +00:00
|
|
|
are written to standard output. When setting the log_level to `debug` or
|
|
|
|
`trace` this will generate large amount of log entries.
|
|
|
|
Administrators will need to ensure that they rotate and/or truncate the
|
|
|
|
logs over time to prevent significant long-term disk usage.
|
2020-03-09 19:57:53 +00:00
|
|
|
|
2020-04-11 04:46:07 +00:00
|
|
|
```yaml
|
2020-06-17 06:25:35 +00:00
|
|
|
log_file_path: /config/authelia.log
|
2020-04-11 04:46:07 +00:00
|
|
|
```
|
2020-02-29 00:43:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
## JWT Secret
|
|
|
|
|
|
|
|
`optional: false`
|
|
|
|
|
|
|
|
Defines the secret used to craft JWT tokens leveraged by the identity
|
2020-04-23 01:11:32 +00:00
|
|
|
verification process. This can also be defined using a [secret](./secrets.md).
|
2020-02-29 00:43:59 +00:00
|
|
|
|
2020-04-11 04:46:07 +00:00
|
|
|
```yaml
|
|
|
|
jwt_secret: v3ry_important_s3cr3t
|
|
|
|
```
|
2020-02-29 00:43:59 +00:00
|
|
|
|
|
|
|
## Default redirection URL
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
The default redirection URL is the URL where users are redirected when Authelia
|
|
|
|
cannot detect the target URL where the user was heading.
|
|
|
|
|
|
|
|
In a normal authentication workflow, a user tries to access a website and she
|
|
|
|
gets redirected to the sign-in portal in order to authenticate. Since the user
|
|
|
|
initially targeted a website, the portal knows where the user was heading and
|
|
|
|
can redirect her after the authentication process.
|
|
|
|
However, when a user visits the sign in portal directly, the portal considers
|
|
|
|
the targeted website is the portal. In that case and if the default redirection URL
|
|
|
|
is configured, the user is redirected to that URL. If not defined, the user is not
|
2020-03-03 07:18:25 +00:00
|
|
|
redirected after authentication.
|