############################################################### # Authelia configuration # ############################################################### host: 0.0.0.0 port: 9091 log_level: debug # This secret can also be set using the env variables AUTHELIA_JWT_SECRET_FILE jwt_secret: a_very_important_secret default_redirection_url: https://public.example.com totp: issuer: authelia.com #duo_api: # hostname: api-123456789.example.com # integration_key: ABCDEF # # This secret can also be set using the env variables AUTHELIA_DUO_API_SECRET_KEY_FILE # secret_key: 1234567890abcdefghifjkl authentication_backend: file: path: /etc/authelia/users_database.yml access_control: default_policy: deny rules: # Rules applied to everyone - domain: public.example.com policy: bypass - domain: traefik.example.com policy: one_factor - domain: secure.example.com policy: two_factor session: name: authelia_session # This secret can also be set using the env variables AUTHELIA_SESSION_SECRET_FILE secret: unsecure_session_secret expiration: 3600 # 1 hour inactivity: 300 # 5 minutes domain: example.com # Should match whatever your root protected domain is redis: host: redis port: 6379 # This secret can also be set using the env variables AUTHELIA_SESSION_REDIS_PASSWORD_FILE # password: authelia regulation: max_retries: 3 find_time: 120 ban_time: 300 storage: local: path: /var/lib/authelia/db.sqlite3 notifier: smtp: username: test # This secret can also be set using the env variables AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE password: password host: mail.example.com port: 25 sender: admin@example.com