2020-02-29 07:43:59 +07:00
|
|
|
---
|
|
|
|
layout: default
|
|
|
|
title: Access Control
|
|
|
|
parent: Configuration
|
2020-05-16 06:41:42 +07:00
|
|
|
nav_order: 1
|
2020-02-29 07:43:59 +07:00
|
|
|
---
|
|
|
|
|
|
|
|
# Access Control
|
|
|
|
{: .no_toc }
|
|
|
|
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
## Configuration
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
default_policy: deny
|
|
|
|
networks:
|
|
|
|
- name: internal
|
|
|
|
networks:
|
|
|
|
- 10.0.0.0/8
|
|
|
|
- 172.16.0.0/12
|
|
|
|
- 192.168.0.0/18
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
rules:
|
|
|
|
- domain: public.example.com
|
2022-03-14 19:30:47 +07:00
|
|
|
policy: one_factor
|
2021-06-22 13:00:45 +07:00
|
|
|
networks:
|
|
|
|
- internal
|
|
|
|
- 1.1.1.1
|
|
|
|
subject:
|
2022-03-06 06:15:55 +07:00
|
|
|
- ["user:adam"]
|
|
|
|
- ["user:fred"]
|
2021-06-22 13:00:45 +07:00
|
|
|
- ["group:admins"]
|
|
|
|
methods:
|
|
|
|
- GET
|
|
|
|
- HEAD
|
|
|
|
resources:
|
|
|
|
- "^/api.*"
|
|
|
|
```
|
|
|
|
|
|
|
|
## Options
|
|
|
|
|
|
|
|
### default_policy
|
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: deny
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The default [policy](#policies) defines the policy applied if no [rules](#rules) section apply to the information known
|
|
|
|
about the request. It is recommended that this is configured to [deny](#deny) for security reasons. Sites which you do
|
|
|
|
not wish to secure at all with Authelia should not be configured in your reverse proxy to perform authentication with
|
|
|
|
Authelia at all for performance reasons.
|
2021-03-05 11:18:31 +07:00
|
|
|
|
|
|
|
See [Policies](#policies) for more information.
|
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### networks (global)
|
|
|
|
<div markdown="1">
|
|
|
|
type: list
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
The main/global networks section contains a list of networks with a name label that can be reused in the
|
|
|
|
[rules](#networks) section instead of redefining the same networks over and over again. This additionally makes
|
|
|
|
complicated network related configuration a lot cleaner and easier to read.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This section has two options, `name` and `networks`. Where the `networks` section is a list of IP addresses in CIDR
|
|
|
|
notation and where `name` is a friendly name to label the collection of networks for reuse in the [networks](#networks)
|
|
|
|
section of the [rules](#rules) section below.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This configuration option *does nothing* by itself, it's only useful if you use these aliases in the [rules](#networks)
|
|
|
|
section below.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### rules
|
|
|
|
<div markdown="1">
|
|
|
|
type: list
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
The rules have many configuration options. A rule matches when all criteria of the rule match the request excluding the
|
|
|
|
`policy` which is the [policy](#policies) applied to the request.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
A rule defines two primary things:
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
* the policy applied when all criteria match.
|
|
|
|
|
|
|
|
* the matching criteria of the request presented to the reverse proxy
|
|
|
|
|
|
|
|
The criteria is broken into several parts:
|
|
|
|
|
|
|
|
* [domain](#domain): domain or list of domains targeted by the request.
|
|
|
|
* [resources](#resources): pattern or list of patterns that the path should match.
|
|
|
|
* [subject](#subject): the user or group of users to define the policy for.
|
|
|
|
* [networks](#networks): the network addresses, ranges (CIDR notation) or groups from where the request originates.
|
|
|
|
* [methods](#methods): the http methods used in the request.
|
|
|
|
|
|
|
|
A rule is matched when all criteria of the rule match. Rules are evaluated in sequential order, and the first rule that
|
|
|
|
is a match for a given request is the rule applied; subsequent rules have *no effect*. This is particularly
|
|
|
|
**important** for bypass rules. Bypass rules should generally appear near the top of the rules list. However you need to
|
|
|
|
carefully evaluate your rule list **in order** to see which rule matches a particular scenario. A comprehensive
|
|
|
|
understanding of how rules apply is also recommended.
|
|
|
|
|
|
|
|
#### policy
|
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The specific [policy](#policies) to apply to the selected rule. This is not criteria for a match, this is the action to
|
|
|
|
take when a match is made.
|
|
|
|
|
|
|
|
#### domain
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
This criteria matches the domain name and has two methods of configuration, either as a single string or as a list of
|
|
|
|
strings. When it's a list of strings the rule matches when **any** of the domains in the list match the request domain.
|
|
|
|
|
|
|
|
Rules may start with a few different wildcards:
|
|
|
|
|
|
|
|
* The standard wildcard is `*.`, which when in front of a domain means that any subdomain is effectively a match. For
|
|
|
|
example `*.example.com` would match `abc.example.com` and `secure.example.com`. When using a wildcard like this the
|
|
|
|
string **must** be quoted like `"*.example.com"`.
|
|
|
|
|
|
|
|
* The user wildcard is `{user}.`, which when in front of a domain dynamically matches the username of the user. For
|
|
|
|
example `{user}.example.com` would match `fred.example.com` if the user logged in was named `fred`. ***Note:** we're
|
|
|
|
considering refactoring this to just be regex which would likely allow many additional possibilities.*
|
|
|
|
|
|
|
|
* The group wildcard is `{group}.`, which when in front of a domain dynamically matches if the logged in user has the
|
|
|
|
group in that location. For example `{group}.example.com` would match `admins.example.com` if the user logged in was
|
|
|
|
in the following groups `admins,users,people` because `admins` is in the list.
|
|
|
|
|
|
|
|
Domains in this section must be the domain configured in the [session](./session/index.md#domain) configuration or
|
|
|
|
subdomains of that domain. This is because a website can only write cookies for a domain it is part of. It is
|
|
|
|
theoretically possible for us to do this with multiple domains however we would have to be security conscious in our
|
|
|
|
implementation, and it is not currently a priority.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
*Single domain of `*.example.com` matched. All rules in this list are effectively the same rule just expressed in
|
|
|
|
different ways.*
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: "*.example.com"
|
|
|
|
policy: bypass
|
|
|
|
- domain:
|
|
|
|
- "*.example.com"
|
|
|
|
policy: bypass
|
|
|
|
```
|
2020-12-16 07:00:58 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
*Multiple domains matched. These rules would match either `apple.example.com` or `orange.example.com`. All rules in this
|
|
|
|
list are effectively the same rule just expressed in different ways.*
|
2020-12-16 07:00:58 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: ["apple.example.com", "banana.example.com"]
|
|
|
|
policy: bypass
|
|
|
|
- domain:
|
|
|
|
- apple.example.com
|
|
|
|
- banana.example.com
|
|
|
|
policy: bypass
|
|
|
|
```
|
|
|
|
|
|
|
|
### subject
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(list(string))
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
***Note:** this rule criteria **may not** be used for the `bypass` policy the minimum required authentication level to
|
|
|
|
identify the subject is `one_factor`. We have taken an opinionated stance on preventing this configuration as it could
|
|
|
|
result in problematic security scenarios with badly thought out configurations and cannot see a likely configuration
|
|
|
|
scenario that would require users to do this. If you have a scenario in mind please open an
|
|
|
|
[issue](https://github.com/authelia/authelia/issues/new) on GitHub.*
|
|
|
|
|
|
|
|
This criteria matches identifying characteristics about the subject. Currently this is either user or groups the user
|
|
|
|
belongs to. This allows you to effectively control exactly what each user is authorized to access or to specifically
|
|
|
|
require two-factor authentication to specific users. Subjects are prefixed with either `user:` or `group:` to identify
|
|
|
|
which part of the identity to check.
|
|
|
|
|
|
|
|
The format of this rule is unique in as much as it is a list of lists. The logic behind this format is to allow for both
|
|
|
|
`OR` and `AND` logic. The first level of the list defines the `OR` logic, and the second level defines the `AND` logic.
|
|
|
|
Additionally each level of these lists does not have to be explicitly defined.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
*Matches when the user has the username `john`, **or** the user is in the groups `admin` **and** `app-name`, **or** the
|
|
|
|
user is in the group `super-admin`. All rules in this list are effectively the same rule just expressed in different
|
|
|
|
ways.*
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: example.com
|
|
|
|
policy: two_factor
|
|
|
|
subject:
|
|
|
|
- "user:john"
|
|
|
|
- ["group:admin", "group:app-name"]
|
|
|
|
- "group:super-admin"
|
|
|
|
- domain: example.com
|
|
|
|
policy: two_factor
|
|
|
|
subject:
|
|
|
|
- ["user:john"]
|
|
|
|
- ["group:admin", "group:app-name"]
|
|
|
|
- ["group:super-admin"]
|
|
|
|
```
|
|
|
|
|
|
|
|
*Matches when the user is in the `super-admin` group. All rules in this list are effectively the same rule just
|
|
|
|
expressed in different ways.*
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: example.com
|
|
|
|
policy: one_factor
|
|
|
|
subject: "group:super-admin"
|
|
|
|
- domain: example.com
|
|
|
|
policy: one_factor
|
|
|
|
subject:
|
|
|
|
- "group:super-admin"
|
|
|
|
- domain: example.com
|
|
|
|
policy: one_factor
|
|
|
|
subject:
|
|
|
|
- ["group:super-admin"]
|
|
|
|
```
|
|
|
|
|
|
|
|
### methods
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
This criteria matches the HTTP request method. This is primarily useful when trying to bypass authentication for specific
|
|
|
|
request types when those requests would prevent essential or public operation of the website. An example is when you
|
|
|
|
need to do CORS preflight requests you could apply the `bypass` policy to `OPTIONS` requests.
|
|
|
|
|
|
|
|
It's important to note that Authelia cannot preserve request data when redirecting the user. For example if the user had
|
|
|
|
permission to do GET requests, their authentication level was `one_factor`, and POST requests required them to do
|
|
|
|
`two_factor` authentication, they would lose the form data. Additionally it is sometimes not possible to redirect users
|
|
|
|
who have done requests other than HEAD or GET which means the user experience may suffer. These are the reasons it's
|
|
|
|
only recommended to use this to increase security where essential and for CORS preflight.
|
|
|
|
|
|
|
|
Example:
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: example.com
|
|
|
|
policy: bypass
|
|
|
|
methods:
|
|
|
|
- OPTIONS
|
|
|
|
```
|
|
|
|
|
|
|
|
The valid request methods are: OPTIONS, HEAD, GET, POST, PUT, PATCH, DELETE, TRACE, CONNECT. Additional information
|
|
|
|
about HTTP request methods can be found on the [MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods).
|
|
|
|
|
|
|
|
### networks
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
This criteria is a list of values which can be an IP Address, network address range in CIDR notation, or an alias from
|
|
|
|
the [global](#networks-global) section. It matches against the first address in the `X-Forwarded-For` header, or if there
|
|
|
|
are none it will fall back to the IP address of the packet TCP source IP address. For this reason it's important for you
|
|
|
|
to configure the proxy server correctly in order to accurately match requests with this criteria. ***Note:** you may
|
|
|
|
combine CIDR networks with the alias rules as you please.*
|
|
|
|
|
|
|
|
The main use case for this criteria is adjust the security requirements of a resource based on the location of a user.
|
|
|
|
You can theoretically consider a specific network to be one of the factors involved in authentiation, you can deny
|
|
|
|
specific networks, etc.
|
|
|
|
|
|
|
|
For example if you have an application exposed on both the local networks and the external networks, you are able to
|
|
|
|
distinguish between those requests and apply differing policies to each. Either denying access when the user is on the
|
|
|
|
external networks and allowing specific external clients to access it as well as internal clients, or by requiring less
|
|
|
|
privileges when a user is on the local networks.
|
|
|
|
|
|
|
|
There are a large number of scenarios regarding networks and the order of the rules. This provides a lot of flexibility
|
|
|
|
for administrators to tune the security to their specific needs if desired.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
*Require [two_factor](#two_factor) for all clients other than internal clients and `112.134.145.167`. The first two
|
|
|
|
rules in this list are effectively the same rule just expressed in different ways.*
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
default_policy: two_factor
|
|
|
|
networks:
|
|
|
|
- name: internal
|
|
|
|
networks:
|
|
|
|
- 10.0.0.0/8
|
|
|
|
- 172.16.0.0/12
|
|
|
|
- 192.168.0.0/18
|
|
|
|
rules:
|
|
|
|
- domain: secure.example.com
|
|
|
|
policy: one_factor
|
|
|
|
networks:
|
|
|
|
- 10.0.0.0/8
|
|
|
|
- 172.16.0.0/12
|
|
|
|
- 192.168.0.0/18
|
|
|
|
- 112.134.145.167/32
|
|
|
|
- domain: secure.example.com
|
|
|
|
policy: one_factor
|
|
|
|
networks:
|
|
|
|
- internal
|
|
|
|
- 112.134.145.167/32
|
|
|
|
- domain: secure.example.com
|
|
|
|
policy: two_factor
|
|
|
|
```
|
|
|
|
|
|
|
|
### resources
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
This criteria matches the path and query of the request using regular expressions. The rule is expressed as a list of
|
|
|
|
strings. If any one of the regular expressions in the list matches the request it's considered a match. A useful tool
|
|
|
|
for debugging these regular expressions is called [Rego](https://regoio.herokuapp.com/).
|
|
|
|
|
|
|
|
***Note:** Prior to 4.27.0 the regular expressions only matched the path excluding the query parameters. After 4.27.0
|
|
|
|
they match the entire path including the query parameters. When upgrading you may be required to alter some of your
|
|
|
|
resource rules to get them to operate as they previously did.*
|
|
|
|
|
|
|
|
It's important when configuring resource rules that you enclose them in quotes otherwise you may run into some issues
|
|
|
|
with escaping the expressions. Failure to do so may prevent Authelia from starting. It's technically optional but will
|
|
|
|
likely save you a lot of time if you do it for all resource rules.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
*Applies the [bypass](#bypass) policy when the domain is `app.example.com` and the url is `/api`, or starts with either
|
|
|
|
`/api/` or `/api?`.*
|
2020-06-25 15:22:42 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
rules:
|
|
|
|
- domain: app.example.com
|
|
|
|
policy: bypass
|
|
|
|
resources:
|
|
|
|
- "^/api([/?].*)?$"
|
|
|
|
```
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
## Policies
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
With **Authelia** you can define a list of rules that are going to be evaluated in
|
|
|
|
sequential order when authorization is delegated to Authelia.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
The first matching rule of the list defines the policy applied to the resource, if
|
|
|
|
no rule matches the resource a customizable default policy is applied.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### deny
|
2021-03-11 06:18:39 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This is the policy applied by default, and is what we recommend as the default policy for all installs. Its effect
|
|
|
|
is literally to deny the user access to the resource. Additionally you can use this policy to conditionally deny
|
|
|
|
access in desired situations. Examples include denying access to an API that has no authentication mechanism built in.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### bypass
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This policy skips all authentication and allows anyone to use the resource. This policy is not available with a rule
|
2021-07-15 10:21:47 +07:00
|
|
|
that includes a [subject](#subject) restriction because the minimum authentication level required to obtain information
|
2021-06-22 13:00:45 +07:00
|
|
|
about the subject is [one_factor](#one_factor).
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### one_factor
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This policy requires the user at minimum complete 1FA successfully (username and password). This means if they have
|
|
|
|
performed 2FA then they will be allowed to access the resource.
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
### two_factor
|
2021-03-05 11:18:31 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
This policy requires the user to complete 2FA successfully. This is currently the highest level of authentication
|
|
|
|
policy available.
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
## Detailed example
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2021-06-22 13:00:45 +07:00
|
|
|
Here is a detailed example of an example access control section:
|
2020-02-29 07:43:59 +07:00
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
```yaml
|
|
|
|
access_control:
|
|
|
|
default_policy: deny
|
2021-01-04 17:55:23 +07:00
|
|
|
networks:
|
|
|
|
- name: internal
|
|
|
|
networks:
|
|
|
|
- 10.10.0.0/16
|
|
|
|
- 192.168.2.0/24
|
|
|
|
- name: VPN
|
|
|
|
networks: 10.9.0.0/16
|
2020-04-11 11:46:07 +07:00
|
|
|
rules:
|
|
|
|
- domain: public.example.com
|
|
|
|
policy: bypass
|
|
|
|
|
2021-03-05 11:18:31 +07:00
|
|
|
- domain: "*.example.com"
|
|
|
|
policy: bypass
|
|
|
|
methods:
|
|
|
|
- OPTIONS
|
|
|
|
|
2020-04-11 11:46:07 +07:00
|
|
|
- domain: secure.example.com
|
|
|
|
policy: one_factor
|
|
|
|
networks:
|
2021-01-04 17:55:23 +07:00
|
|
|
- internal
|
|
|
|
- VPN
|
|
|
|
- 192.168.1.0/24
|
|
|
|
- 10.0.0.1
|
2020-04-11 11:46:07 +07:00
|
|
|
|
2020-04-16 07:18:11 +07:00
|
|
|
- domain:
|
|
|
|
- secure.example.com
|
|
|
|
- private.example.com
|
2020-04-11 11:46:07 +07:00
|
|
|
policy: two_factor
|
|
|
|
|
|
|
|
- domain: singlefactor.example.com
|
|
|
|
policy: one_factor
|
|
|
|
|
|
|
|
- domain: "mx2.mail.example.com"
|
|
|
|
subject: "group:admins"
|
|
|
|
policy: deny
|
|
|
|
|
|
|
|
- domain: "*.example.com"
|
2020-04-16 07:18:11 +07:00
|
|
|
subject:
|
|
|
|
- "group:admins"
|
|
|
|
- "group:moderators"
|
2020-04-11 11:46:07 +07:00
|
|
|
policy: two_factor
|
|
|
|
|
|
|
|
- domain: dev.example.com
|
|
|
|
resources:
|
|
|
|
- "^/groups/dev/.*$"
|
|
|
|
subject: "group:dev"
|
|
|
|
policy: two_factor
|
|
|
|
|
|
|
|
- domain: dev.example.com
|
|
|
|
resources:
|
|
|
|
- "^/users/john/.*$"
|
2020-06-25 15:22:42 +07:00
|
|
|
subject:
|
|
|
|
- ["group:dev", "user:john"]
|
2020-11-13 06:30:23 +07:00
|
|
|
- "group:admins"
|
2020-04-11 11:46:07 +07:00
|
|
|
policy: two_factor
|
2021-03-05 11:18:31 +07:00
|
|
|
|
|
|
|
- domain: "{user}.example.com"
|
|
|
|
policy: bypass
|
2020-04-16 07:18:11 +07:00
|
|
|
```
|