diff --git a/config.template.yml b/config.template.yml index c1efb2d4e..4d15f6096 100644 --- a/config.template.yml +++ b/config.template.yml @@ -205,11 +205,11 @@ session: # The secret to encrypt the session cookie. secret: unsecure_session_secret - # The time in ms before the cookie expires and session is reset. - expiration: 3600000 # 1 hour + # The time in seconds before the cookie expires and session is reset. + expiration: 3600 # 1 hour - # The inactivity time in ms before the session is reset. - inactivity: 300000 # 5 minutes + # The inactivity time in seconds before the session is reset. + inactivity: 300 # 5 minutes # The domain to protect. # Note: the authenticator must also be in that domain. If empty, the cookie diff --git a/example/kube/authelia/configs/configuration.yml b/example/kube/authelia/configs/configuration.yml index 7635cc1ed..e137309e9 100644 --- a/example/kube/authelia/configs/configuration.yml +++ b/example/kube/authelia/configs/configuration.yml @@ -75,8 +75,8 @@ access_control: session: secret: unsecure_password - expiration: 3600000 # 1 hour - inactivity: 300000 # 5 minutes + expiration: 3600 # 1 hour + inactivity: 300 # 5 minutes domain: example.com redis: host: redis-service diff --git a/internal/suites/BypassAll/configuration.yml b/internal/suites/BypassAll/configuration.yml index e5e8af4c2..4fd638e3e 100644 --- a/internal/suites/BypassAll/configuration.yml +++ b/internal/suites/BypassAll/configuration.yml @@ -15,8 +15,8 @@ authentication_backend: session: secret: unsecure_session_secret domain: example.com - expiration: 3600000 # 1 hour - inactivity: 300000 # 5 minutes + expiration: 3600 # 1 hour + inactivity: 300 # 5 minutes storage: local: diff --git a/internal/suites/DuoPush/configuration.yml b/internal/suites/DuoPush/configuration.yml index 19762b4a4..18debd100 100644 --- a/internal/suites/DuoPush/configuration.yml +++ b/internal/suites/DuoPush/configuration.yml @@ -15,8 +15,8 @@ authentication_backend: session: secret: unsecure_session_secret domain: example.com - expiration: 3600000 # 1 hour - inactivity: 300000 # 5 minutes + expiration: 3600 # 1 hour + inactivity: 300 # 5 minutes # Configuration of the storage backend used to store data and secrets. i.e. totp data storage: diff --git a/internal/suites/HighAvailability/configuration.yml b/internal/suites/HighAvailability/configuration.yml index e26e7e34b..a50195c0f 100644 --- a/internal/suites/HighAvailability/configuration.yml +++ b/internal/suites/HighAvailability/configuration.yml @@ -185,10 +185,10 @@ session: secret: unsecure_session_secret # The time in ms before the cookie expires and session is reset. - expiration: 3600000 # 1 hour + expiration: 3600 # 1 hour # The inactivity time in ms before the session is reset. - inactivity: 300000 # 5 minutes + inactivity: 300 # 5 minutes # The domain to protect. # Note: the authenticator must also be in that domain. If empty, the cookie diff --git a/internal/suites/NetworkACL/configuration.yml b/internal/suites/NetworkACL/configuration.yml index 197e6e5fd..35e67a513 100644 --- a/internal/suites/NetworkACL/configuration.yml +++ b/internal/suites/NetworkACL/configuration.yml @@ -15,8 +15,8 @@ authentication_backend: session: secret: unsecure_session_secret domain: example.com - expiration: 3600000 # 1 hour - inactivity: 300000 # 5 minutes + expiration: 3600 # 1 hour + inactivity: 300 # 5 minutes # Configuration of the storage backend used to store data and secrets. i.e. totp data storage: diff --git a/internal/suites/Traefik/configuration.yml b/internal/suites/Traefik/configuration.yml index 135267b9b..fa6930ea5 100644 --- a/internal/suites/Traefik/configuration.yml +++ b/internal/suites/Traefik/configuration.yml @@ -15,8 +15,8 @@ authentication_backend: session: secret: unsecure_session_secret domain: example.com - expiration: 3600000 # 1 hour - inactivity: 300000 # 5 minutes + expiration: 3600 # 1 hour + inactivity: 300 # 5 minutes storage: local: