authelia/internal/configuration/validator
James Elliott 2037a0ee4f
fix(commands): hash-password usage instructions (#3437)
This fixes the hash-password usage instructions and ensures it uses mostly a configuration source based config. In addition it updates our recommended argon2id parameters with the RFC recommendations.
2022-06-02 09:18:45 +10:00
..
access_control.go feat(authorization): domain regex match with named groups (#2789) 2022-04-01 22:38:49 +11:00
access_control_test.go feat(web): password reset custom url (#3111) 2022-04-04 17:46:55 +10:00
authentication.go fix(commands): hash-password usage instructions (#3437) 2022-06-02 09:18:45 +10:00
authentication_test.go feat(web): password reset custom url (#3111) 2022-04-04 17:46:55 +10:00
configuration.go feat(configuration): configurable default second factor method (#3081) 2022-04-18 09:58:24 +10:00
configuration_test.go feat(configuration): configurable default second factor method (#3081) 2022-04-18 09:58:24 +10:00
const.go feat(configuration): configurable default second factor method (#3081) 2022-04-18 09:58:24 +10:00
duo.go refactor(configuration): remove ptr for duoapi and notifier (#3200) 2022-04-16 09:34:26 +10:00
duo_test.go refactor(configuration): remove ptr for duoapi and notifier (#3200) 2022-04-16 09:34:26 +10:00
identity_providers.go feat(configuration): configurable default second factor method (#3081) 2022-04-18 09:58:24 +10:00
identity_providers_test.go fix(configuration): sector identifier not parsed correctly (#3142) 2022-04-08 17:38:38 +10:00
keys.go refactor: introduce config key gen (#3206) 2022-04-16 19:00:39 +10:00
keys_test.go refactor: introduce config key gen (#3206) 2022-04-16 19:00:39 +10:00
log.go feat(commands): add access-control check-policy command (#2871) 2022-02-28 14:15:01 +11:00
log_test.go feat(commands): add access-control check-policy command (#2871) 2022-02-28 14:15:01 +11:00
notifier.go refactor(configuration): remove ptr for duoapi and notifier (#3200) 2022-04-16 09:34:26 +10:00
notifier_test.go feat(web): password reset custom url (#3111) 2022-04-04 17:46:55 +10:00
ntp.go feat: webauthn (#2707) 2022-03-03 22:20:43 +11:00
ntp_test.go feat: webauthn (#2707) 2022-03-03 22:20:43 +11:00
password_policy.go feat(server): zxcvbn password policy server side (#3151) 2022-04-15 19:30:51 +10:00
password_policy_test.go feat(server): zxcvbn password policy server side (#3151) 2022-04-15 19:30:51 +10:00
regulation.go feat: webauthn (#2707) 2022-03-03 22:20:43 +11:00
regulation_test.go feat: webauthn (#2707) 2022-03-03 22:20:43 +11:00
server.go feat: implement mutual tls in the web server (#3065) 2022-04-05 09:57:47 +10:00
server_test.go feat: implement mutual tls in the web server (#3065) 2022-04-05 09:57:47 +10:00
session.go fix(configuration): remember me duration disabled impossible (#2997) 2022-03-13 13:51:23 +11:00
session_test.go fix(configuration): remember me duration disabled impossible (#2997) 2022-03-13 13:51:23 +11:00
storage.go feat(commands): add access-control check-policy command (#2871) 2022-02-28 14:15:01 +11:00
storage_test.go feat(commands): add access-control check-policy command (#2871) 2022-02-28 14:15:01 +11:00
theme.go feat(commands): add access-control check-policy command (#2871) 2022-02-28 14:15:01 +11:00
theme_test.go feat(web): password reset custom url (#3111) 2022-04-04 17:46:55 +10:00
totp.go feat(totp): secret customization (#2681) 2022-04-08 09:01:01 +10:00
totp_test.go feat(totp): secret customization (#2681) 2022-04-08 09:01:01 +10:00
webauthn.go feat: webauthn (#2707) 2022-03-03 22:20:43 +11:00
webauthn_test.go build(deps): utilize github.com/go-webauthn/webauthn (#2947) 2022-03-04 10:56:30 +11:00