Last 24.05 update
This commit is contained in:
@@ -1,2 +1,13 @@
|
||||
- Follow [This](https://www.authelia.com/configuration/identity-providers/openid-connect/provider/) guide for generating keys
|
||||
- Store the keys in the /keys directory
|
||||
# Authelia
|
||||
|
||||
1. Edit environment variables.
|
||||
1. For HMAC_SECRET, JWT_SECRET, ADMIN_PASSWORD, SESSION_SECRET, STORAGE_ENCRYPTION_KEY, LLDAP_KEY_SEED use an random alphanumeric string of at least 64 characters
|
||||
2. For CLIENT_SECRET, CLIEND_ID: [Generate client identifier](https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#how-do-i-generate-a-client-identifier-or-client-secret)
|
||||
1. Use single quotes for the client secret
|
||||
|
||||
2. Generate PAM file using and save it to the /config/keys directory: [Generating keypair](https://www.authelia.com/reference/guides/generating-secure-values/#generating-an-rsa-keypair)
|
||||
1. Save the random password
|
||||
|
||||
3. Configure LLDAP
|
||||
1. Create a user in LLDAP with the group: lldap_password_manager
|
||||
2. Create groups: forgejo
|
||||
|
Reference in New Issue
Block a user