mirror of
https://github.com/firefly-iii/firefly-iii.git
synced 2025-09-04 11:48:05 +00:00
Update meta files.
This commit is contained in:
63
.env.example
63
.env.example
@@ -170,6 +170,7 @@ MAP_DEFAULT_LAT=51.983333
|
||||
MAP_DEFAULT_LONG=5.916667
|
||||
MAP_DEFAULT_ZOOM=6
|
||||
|
||||
# TODO update me.
|
||||
# Firefly III has two options for user authentication. "eloquent" is the default,
|
||||
# and "ldap" for LDAP servers.
|
||||
# For full instructions on these settings please visit:
|
||||
@@ -179,8 +180,6 @@ MAP_DEFAULT_ZOOM=6
|
||||
# If you enable 'ldap' AND you run Docker, the Docker image will contact packagist.org
|
||||
# This is necessary to download the required packages.
|
||||
#
|
||||
LOGIN_PROVIDER=eloquent
|
||||
|
||||
# It's also possible to change the way users are authenticated. You could use Authelia for example.
|
||||
# Authentication via the REMOTE_USER header is supported. Change the value below to "remote_user_guard".
|
||||
#
|
||||
@@ -265,6 +264,66 @@ ADLDAP_AUTH_FIELD=distinguishedname
|
||||
# You can set the following variable from a file by appending it with _FILE:
|
||||
ADLDAP_SYNC_FIELD=userprincipalname
|
||||
|
||||
|
||||
# Login provider is obsolete
|
||||
#LOGIN_PROVIDER=eloquent
|
||||
AUTHENTICATION_GUARD=ldap
|
||||
#CUSTOM_LOGOUT_URI=https://nu.nl
|
||||
|
||||
# start new LDAP settings
|
||||
LDAP_LOGGING=true
|
||||
LDAP_CONNECTION=default
|
||||
LDAP_HOST=ldap.jumpcloud.com
|
||||
LDAP_USERNAME="uid=authelia,ou=Users,o=5fdddb09ae7868233b9d26d6,dc=jumpcloud,dc=com"
|
||||
LDAP_PASSWORD=FZWhDnXVb_.ciGFVwuQC@m9CVo@vdVMx
|
||||
LDAP_PORT=389
|
||||
LDAP_BASE_DN="ou=Users,o=5fdddb09ae7868233b9d26d6,dc=jumpcloud,dc=com"
|
||||
LDAP_TIMEOUT=5
|
||||
LDAP_SSL=true
|
||||
LDAP_TLS=false
|
||||
# end new LDAP settings
|
||||
|
||||
# start custom LDAP settings
|
||||
LDAP_AUTH_FIELD=uid
|
||||
# end custom LDAP settings
|
||||
|
||||
|
||||
# LDAP connection configuration
|
||||
# OpenLDAP, FreeIPA or ActiveDirectory
|
||||
#ADLDAP_CONNECTION_SCHEME=OpenLDAP
|
||||
#ADLDAP_AUTO_CONNECT=true
|
||||
|
||||
# LDAP connection settings
|
||||
#ADLDAP_CONTROLLERS=
|
||||
#ADLDAP_PORT=389
|
||||
#ADLDAP_TIMEOUT=5
|
||||
#ADLDAP_BASEDN=""
|
||||
#ADLDAP_FOLLOW_REFFERALS=false
|
||||
#ADLDAP_USE_SSL=false
|
||||
#ADLDAP_USE_TLS=false
|
||||
#ADLDAP_SSL_CACERTDIR=
|
||||
#ADLDAP_SSL_CACERTFILE=
|
||||
#ADLDAP_SSL_CERTFILE=
|
||||
#ADLDAP_SSL_KEYFILE=
|
||||
#ADLDAP_SSL_CIPHER_SUITE=
|
||||
#ADLDAP_SSL_REQUIRE_CERT=
|
||||
#ADLDAP_ADMIN_USERNAME=
|
||||
#ADLDAP_ADMIN_PASSWORD=
|
||||
#ADLDAP_ACCOUNT_PREFIX=
|
||||
#ADLDAP_ACCOUNT_SUFFIX=
|
||||
# LDAP authentication settings.
|
||||
#ADLDAP_PASSWORD_SYNC=false
|
||||
#ADLDAP_LOGIN_FALLBACK=false
|
||||
#ADLDAP_DISCOVER_FIELD=distinguishedname
|
||||
#ADLDAP_AUTH_FIELD=distinguishedname
|
||||
|
||||
# Will allow SSO if your server provides an AUTH_USER field.
|
||||
#WINDOWS_SSO_DISCOVER=samaccountname
|
||||
#WINDOWS_SSO_KEY=AUTH_USER
|
||||
|
||||
# field to sync as local username.
|
||||
#ADLDAP_SYNC_FIELD=userprincipalname
|
||||
|
||||
# You can disable the X-Frame-Options header if it interferes with tools like
|
||||
# Organizr. This is at your own risk. Applications running in frames run the risk
|
||||
# of leaking information to their parent frame.
|
||||
|
Reference in New Issue
Block a user