diff --git a/docs/content/en/configuration/miscellaneous/ntp.md b/docs/content/en/configuration/miscellaneous/ntp.md index e5d32a55d..6de640f5c 100644 --- a/docs/content/en/configuration/miscellaneous/ntp.md +++ b/docs/content/en/configuration/miscellaneous/ntp.md @@ -14,11 +14,12 @@ aliases: - /docs/configuration/ntp.html --- -Authelia has the ability to check the system time against an NTP server. Currently this only occurs at startup. This -section configures and tunes the settings for this check which is primarily used to ensure +Authelia has the ability to check the system time against an NTP server, which at the present time is checked only +during startup. This section configures and tunes the settings for this check which is primarily used to ensure [TOTP](../second-factor/time-based-one-time-password.md) can be accurately validated. -In the instance of inability to contact the NTP server Authelia will just log an error and will continue to run. +In the instance of inability to contact the NTP server or an issue with the synchronization Authelia will fail to start +unless configured otherwise. ## Configuration diff --git a/internal/commands/root.go b/internal/commands/root.go index 071c03422..783fc120f 100644 --- a/internal/commands/root.go +++ b/internal/commands/root.go @@ -166,7 +166,7 @@ func doStartupChecks(config *schema.Configuration, providers *middlewares.Provid if !config.NTP.DisableStartupCheck && !providers.Authorizer.IsSecondFactorEnabled() { logger.Debug("The NTP startup check was skipped due to there being no configured 2FA access control rules") } else if err = doStartupCheck(logger, "ntp", providers.NTP, config.NTP.DisableStartupCheck); err != nil { - logger.Errorf("Failure running the user provider startup check: %+v", err) + logger.Errorf("Failure running the ntp provider startup check: %+v", err) if !config.NTP.DisableFailure { failures = append(failures, "ntp")