2020-02-29 07:43:59 +07:00
|
|
|
---
|
|
|
|
layout: default
|
|
|
|
title: Miscellaneous
|
|
|
|
parent: Configuration
|
2020-05-16 06:41:42 +07:00
|
|
|
nav_order: 3
|
2020-02-29 07:43:59 +07:00
|
|
|
---
|
|
|
|
|
|
|
|
# Miscellaneous
|
|
|
|
|
|
|
|
Here are the main customizable options in Authelia.
|
|
|
|
|
|
|
|
## Host & Port
|
2020-03-03 14:18:25 +07:00
|
|
|
|
2020-02-29 07:43:59 +07:00
|
|
|
`optional: true`
|
|
|
|
|
2020-03-10 05:37:46 +07:00
|
|
|
Defines the address and port to listen on.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
host: 0.0.0.0
|
|
|
|
port: 9091
|
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-12-30 02:33:57 +07:00
|
|
|
Note: If utilising an IPv6 literal address it must be enclosed by square brackets and quoted:
|
2020-12-16 07:31:39 +07:00
|
|
|
|
|
|
|
```yaml
|
|
|
|
host: "[fd00:1111:2222:3333::1]"
|
|
|
|
```
|
|
|
|
|
2020-03-03 14:18:25 +07:00
|
|
|
## TLS
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Authelia can use TLS. Provide the certificate and the key with the
|
|
|
|
following configuration options:
|
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
2020-06-17 13:25:35 +07:00
|
|
|
tls_key: /config/ssl/key.pem
|
|
|
|
tls_cert: /config/ssl/cert.pem
|
2020-04-11 11:46:07 +07:00
|
|
|
```
|
2020-03-03 14:18:25 +07:00
|
|
|
|
2021-01-04 17:28:55 +07:00
|
|
|
## Certificates Directory
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
This option defines the location of additional certificates to load into the trust chain specifically for Authelia.
|
|
|
|
This currently affects both the SMTP notifier and the LDAP authentication backend. The certificates should all be in the
|
|
|
|
PEM format and end with the extension `.pem` or `.crt`. You can either add the individual certificates public key
|
|
|
|
or the CA public key which signed them (don't add the private key).
|
|
|
|
|
|
|
|
|
2020-03-10 02:57:53 +07:00
|
|
|
## Log
|
|
|
|
|
|
|
|
### Log level
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Defines the level of logs used by Authelia. This level can be set to
|
2020-11-13 06:14:45 +07:00
|
|
|
`trace`, `debug` or `info`. When setting log_level to `trace`, you will
|
|
|
|
generate a large amount of log entries and expose the `/debug/vars` and
|
|
|
|
`/debug/pprof/` endpoints which should not be enabled in production.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
log_level: debug
|
|
|
|
```
|
2020-03-10 02:57:53 +07:00
|
|
|
|
2020-11-25 06:46:41 +07:00
|
|
|
### Log format
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Defines the format of the logs written by Authelia.
|
|
|
|
This format can be set to `json` or `text`.
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
log_format: json
|
|
|
|
```
|
|
|
|
|
|
|
|
#### JSON format
|
|
|
|
```
|
|
|
|
{"level":"info","msg":"Logging severity set to info","time":"2020-01-01T00:00:00+11:00"}
|
|
|
|
{"level":"info","msg":"Authelia is listening for non-TLS connections on 0.0.0.0:9091","time":"2020-01-01T00:00:00+11:00"}
|
|
|
|
```
|
|
|
|
#### Text format
|
|
|
|
```
|
|
|
|
time="2020-01-01T00:00:00+11:00" level=info msg="Logging severity set to info"
|
|
|
|
time="2020-01-01T00:00:00+11:00" level=info msg="Authelia is listening for non-TLS connections on 0.0.0.0:9091"
|
|
|
|
```
|
|
|
|
|
2020-03-10 02:57:53 +07:00
|
|
|
### Log file path
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Logs can be stored in a file when file path is provided. Otherwise logs
|
2020-11-13 06:14:45 +07:00
|
|
|
are written to standard output. When setting the log_level to `debug` or
|
|
|
|
`trace` this will generate large amount of log entries.
|
|
|
|
Administrators will need to ensure that they rotate and/or truncate the
|
|
|
|
logs over time to prevent significant long-term disk usage.
|
2020-03-10 02:57:53 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
2020-06-17 13:25:35 +07:00
|
|
|
log_file_path: /config/authelia.log
|
2020-04-11 11:46:07 +07:00
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
## JWT Secret
|
|
|
|
|
|
|
|
`optional: false`
|
|
|
|
|
|
|
|
Defines the secret used to craft JWT tokens leveraged by the identity
|
2020-04-23 08:11:32 +07:00
|
|
|
verification process. This can also be defined using a [secret](./secrets.md).
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
jwt_secret: v3ry_important_s3cr3t
|
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
## Default redirection URL
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
The default redirection URL is the URL where users are redirected when Authelia
|
|
|
|
cannot detect the target URL where the user was heading.
|
|
|
|
|
|
|
|
In a normal authentication workflow, a user tries to access a website and she
|
|
|
|
gets redirected to the sign-in portal in order to authenticate. Since the user
|
|
|
|
initially targeted a website, the portal knows where the user was heading and
|
|
|
|
can redirect her after the authentication process.
|
|
|
|
However, when a user visits the sign in portal directly, the portal considers
|
|
|
|
the targeted website is the portal. In that case and if the default redirection URL
|
|
|
|
is configured, the user is redirected to that URL. If not defined, the user is not
|
2020-03-03 14:18:25 +07:00
|
|
|
redirected after authentication.
|