diff --git a/README.md b/README.md index 572818327..2f6217f5f 100644 --- a/README.md +++ b/README.md @@ -148,6 +148,8 @@ Click on **Continue** and you'll get your secret in QRCode and Base32 formats. Y [Google Authenticator] to store them and get the generated tokens with the app. +**Note:** If you're testing with **npm**, you will not have access to the fake webmail. You can use the filesystem notifier (option available [config.template.yml]) that will create a file containing the validation URL instead of sending an email. Please only use it for testing. + ### Second factor with U2F security keys @@ -163,6 +165,8 @@ Click on **Continue** and you'll be asking to touch the token of your device to register. Upon successful registration, you can authenticate using your U2F device by simply touching the token. Easy, right?! +**Note:** If you're testing with **npm**, you will not have access to the fake webmail. You can use the filesystem notifier (option available [config.template.yml]) that will create a file containing the validation URL instead of sending an email. Please only use it for testing. + ### Password reset @@ -173,6 +177,8 @@ email address. For the sake of the example, the email is delivered in a fake web for you and accessible at [http://localhost:8085](http://localhost:8085). Paste the link in your browser and you should be able to reset the password. +**Note:** If you're testing with **npm**, you will not have access to the fake webmail. You can use the filesystem notifier (option available [config.template.yml]) that will create a file containing the validation URL instead of sending an email. Please only use it for testing. + ### Access Control