Use images from master branch

pull/12/head
Clement Michaud 2017-01-29 17:06:16 +01:00
parent 2304089f7c
commit 84eb4f64b3
1 changed files with 4 additions and 4 deletions

View File

@ -46,7 +46,7 @@ After few seconds the services should be running and you should be able to visit
Normally, a self-signed certificate exception should appear, it has to be Normally, a self-signed certificate exception should appear, it has to be
accepted before getting to the login page: accepted before getting to the login page:
![first-factor-page](https://raw.githubusercontent.com/clems4ever/authelia/readme-update/images/first_factor.png) ![first-factor-page](https://raw.githubusercontent.com/clems4ever/authelia/master/images/first_factor.png)
### 1st factor: LDAP ### 1st factor: LDAP
An LDAP server has been deployed for you with the following credentials: **user/password**. An LDAP server has been deployed for you with the following credentials: **user/password**.
@ -54,7 +54,7 @@ An LDAP server has been deployed for you with the following credentials: **user/
Type them in the login page and validate. Then, the second factor page should Type them in the login page and validate. Then, the second factor page should
have appeared as shown below. have appeared as shown below.
![second-factor-page](https://raw.githubusercontent.com/clems4ever/authelia/readme-update/images/second_factor.png) ![second-factor-page](https://raw.githubusercontent.com/clems4ever/authelia/master/images/second_factor.png)
### 2nd factor: TOTP (Time-Base One Time Password) ### 2nd factor: TOTP (Time-Base One Time Password)
@ -67,7 +67,7 @@ your secret in QRCode and Base32 formats. You can use
[Google Authenticator](https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en) [Google Authenticator](https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en)
to store them and get the generated tokens required during authentication. to store them and get the generated tokens required during authentication.
![totp-secret](https://raw.githubusercontent.com/clems4ever/authelia/readme-update/images/totp.png) ![totp-secret](https://raw.githubusercontent.com/clems4ever/authelia/master/images/totp.png)
### 2nd factor: U2F (Universal 2-Factor) with security keys ### 2nd factor: U2F (Universal 2-Factor) with security keys
**Authelia** also offers authentication using U2F devices like [Yubikey](Yubikey) **Authelia** also offers authentication using U2F devices like [Yubikey](Yubikey)
@ -82,7 +82,7 @@ the link in your browser and you'll be asking to touch the token of your device
to register it. You can now authenticate using your U2F device by simply to register it. You can now authenticate using your U2F device by simply
touching the token. touching the token.
![u2f-validation](https://raw.githubusercontent.com/clems4ever/authelia/readme-update/images/u2f.png) ![u2f-validation](https://raw.githubusercontent.com/clems4ever/authelia/master/images/u2f.png)
### Password reset ### Password reset
With **Authelia**, you can also reset your password in no time. Click on the With **Authelia**, you can also reset your password in no time. Click on the