docs: fix ntp inconsistency (#3686)

pull/3687/head
James Elliott 2022-07-11 23:29:10 +10:00 committed by GitHub
parent f115f77df8
commit 55e03e2e32
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 5 additions and 4 deletions

View File

@ -14,11 +14,12 @@ aliases:
- /docs/configuration/ntp.html
---
Authelia has the ability to check the system time against an NTP server. Currently this only occurs at startup. This
section configures and tunes the settings for this check which is primarily used to ensure
Authelia has the ability to check the system time against an NTP server, which at the present time is checked only
during startup. This section configures and tunes the settings for this check which is primarily used to ensure
[TOTP](../second-factor/time-based-one-time-password.md) can be accurately validated.
In the instance of inability to contact the NTP server Authelia will just log an error and will continue to run.
In the instance of inability to contact the NTP server or an issue with the synchronization Authelia will fail to start
unless configured otherwise.
## Configuration

View File

@ -166,7 +166,7 @@ func doStartupChecks(config *schema.Configuration, providers *middlewares.Provid
if !config.NTP.DisableStartupCheck && !providers.Authorizer.IsSecondFactorEnabled() {
logger.Debug("The NTP startup check was skipped due to there being no configured 2FA access control rules")
} else if err = doStartupCheck(logger, "ntp", providers.NTP, config.NTP.DisableStartupCheck); err != nil {
logger.Errorf("Failure running the user provider startup check: %+v", err)
logger.Errorf("Failure running the ntp provider startup check: %+v", err)
if !config.NTP.DisableFailure {
failures = append(failures, "ntp")