docs: include hardening in measures (#5093)
parent
0fb5ac78a7
commit
ae719a8e51
|
@ -44,4 +44,6 @@ We are currently directly looking for someone to sponsor:
|
||||||
|
|
||||||
* [Security Audit](../../policies/security.md#help-wanted)
|
* [Security Audit](../../policies/security.md#help-wanted)
|
||||||
|
|
||||||
To see a list of our sponsors pleaase see the [sponsors section](../../information/about.md#sponsors) on the about page.
|
To see a list of our sponsors please see the [sponsors section](../../information/about.md#sponsors) on the about page.
|
||||||
|
|
||||||
|
[Open Collective]: https://opencollective.com/authelia-sponsors
|
||||||
|
|
|
@ -75,6 +75,14 @@ Lastly Authelia's implementation of Argon2id is highly tunable. You can tune the
|
||||||
(time), parallelism, and memory usage. To read more about this please read how to
|
(time), parallelism, and memory usage. To read more about this please read how to
|
||||||
[configure](../../configuration/first-factor/file.md) file authentication.
|
[configure](../../configuration/first-factor/file.md) file authentication.
|
||||||
|
|
||||||
|
## Protections against return oriented programming attacks and general hardening
|
||||||
|
|
||||||
|
Authelia is built as a position independent executable which makes Return Oriented Programming (ROP) attacks
|
||||||
|
significantly more difficult to execute reliably.
|
||||||
|
|
||||||
|
In addition it is built as a static binary with full relocation read-only support making this and several other
|
||||||
|
traditional binary weaknesses significantly more difficult to exploit.
|
||||||
|
|
||||||
## User profile and group membership always kept up-to-date (LDAP authentication provider)
|
## User profile and group membership always kept up-to-date (LDAP authentication provider)
|
||||||
|
|
||||||
This measure is unrelated to the File authentication provider.
|
This measure is unrelated to the File authentication provider.
|
||||||
|
|
Loading…
Reference in New Issue