2020-02-29 07:43:59 +07:00
|
|
|
---
|
|
|
|
layout: default
|
|
|
|
title: Miscellaneous
|
|
|
|
parent: Configuration
|
|
|
|
nav_order: 5
|
|
|
|
---
|
|
|
|
|
|
|
|
# Miscellaneous
|
|
|
|
|
|
|
|
Here are the main customizable options in Authelia.
|
|
|
|
|
|
|
|
## Host & Port
|
2020-03-03 14:18:25 +07:00
|
|
|
|
2020-02-29 07:43:59 +07:00
|
|
|
`optional: true`
|
|
|
|
|
2020-03-10 05:37:46 +07:00
|
|
|
Defines the address and port to listen on.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
host: 0.0.0.0
|
|
|
|
port: 9091
|
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-03-03 14:18:25 +07:00
|
|
|
## TLS
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Authelia can use TLS. Provide the certificate and the key with the
|
|
|
|
following configuration options:
|
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
tls_key: /var/lib/authelia/ssl/key.pem
|
|
|
|
tls_cert: /var/lib/authelia/ssl/cert.pem
|
|
|
|
```
|
2020-03-03 14:18:25 +07:00
|
|
|
|
2020-03-10 02:57:53 +07:00
|
|
|
## Log
|
|
|
|
|
|
|
|
### Log level
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Defines the level of logs used by Authelia. This level can be set to
|
2020-04-11 11:59:58 +07:00
|
|
|
`trace`, `debug` or `info`. When setting log_level to trace, you will
|
|
|
|
generate a large amount of log entries and expose the /debug/vars and
|
|
|
|
/debug/pprof/ endpoints which should not be enabled in production.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
log_level: debug
|
|
|
|
```
|
2020-03-10 02:57:53 +07:00
|
|
|
|
|
|
|
### Log file path
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
Logs can be stored in a file when file path is provided. Otherwise logs
|
|
|
|
are written to standard output.
|
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
log_file_path: /var/log/authelia.log
|
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
|
|
|
|
## JWT Secret
|
|
|
|
|
|
|
|
`optional: false`
|
|
|
|
|
|
|
|
Defines the secret used to craft JWT tokens leveraged by the identity
|
2020-04-23 08:11:32 +07:00
|
|
|
verification process. This can also be defined using a [secret](./secrets.md).
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
jwt_secret: v3ry_important_s3cr3t
|
|
|
|
```
|
2020-02-29 07:43:59 +07:00
|
|
|
|
|
|
|
## Default redirection URL
|
|
|
|
|
|
|
|
`optional: true`
|
|
|
|
|
|
|
|
The default redirection URL is the URL where users are redirected when Authelia
|
|
|
|
cannot detect the target URL where the user was heading.
|
|
|
|
|
|
|
|
In a normal authentication workflow, a user tries to access a website and she
|
|
|
|
gets redirected to the sign-in portal in order to authenticate. Since the user
|
|
|
|
initially targeted a website, the portal knows where the user was heading and
|
|
|
|
can redirect her after the authentication process.
|
|
|
|
However, when a user visits the sign in portal directly, the portal considers
|
|
|
|
the targeted website is the portal. In that case and if the default redirection URL
|
|
|
|
is configured, the user is redirected to that URL. If not defined, the user is not
|
2020-03-03 14:18:25 +07:00
|
|
|
redirected after authentication.
|