mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
docs: fix ntp inconsistency (#3686)
This commit is contained in:
parent
f115f77df8
commit
55e03e2e32
|
@ -14,11 +14,12 @@ aliases:
|
|||
- /docs/configuration/ntp.html
|
||||
---
|
||||
|
||||
Authelia has the ability to check the system time against an NTP server. Currently this only occurs at startup. This
|
||||
section configures and tunes the settings for this check which is primarily used to ensure
|
||||
Authelia has the ability to check the system time against an NTP server, which at the present time is checked only
|
||||
during startup. This section configures and tunes the settings for this check which is primarily used to ensure
|
||||
[TOTP](../second-factor/time-based-one-time-password.md) can be accurately validated.
|
||||
|
||||
In the instance of inability to contact the NTP server Authelia will just log an error and will continue to run.
|
||||
In the instance of inability to contact the NTP server or an issue with the synchronization Authelia will fail to start
|
||||
unless configured otherwise.
|
||||
|
||||
## Configuration
|
||||
|
||||
|
|
|
@ -166,7 +166,7 @@ func doStartupChecks(config *schema.Configuration, providers *middlewares.Provid
|
|||
if !config.NTP.DisableStartupCheck && !providers.Authorizer.IsSecondFactorEnabled() {
|
||||
logger.Debug("The NTP startup check was skipped due to there being no configured 2FA access control rules")
|
||||
} else if err = doStartupCheck(logger, "ntp", providers.NTP, config.NTP.DisableStartupCheck); err != nil {
|
||||
logger.Errorf("Failure running the user provider startup check: %+v", err)
|
||||
logger.Errorf("Failure running the ntp provider startup check: %+v", err)
|
||||
|
||||
if !config.NTP.DisableFailure {
|
||||
failures = append(failures, "ntp")
|
||||
|
|
Loading…
Reference in New Issue
Block a user