75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
# `finallycoffee.services.authelia` ansible role
 | 
						|
 | 
						|
Deploys [authelia](https://www.authelia.com), an open-source full-featured
 | 
						|
authentication server with OIDC beta support.
 | 
						|
 | 
						|
## Configuration
 | 
						|
 | 
						|
Most configurations options are exposed to be overrideable by setting
 | 
						|
`authelia_config_{flat_config_key}`, which means `totp.digits: 8`
 | 
						|
would become `authelia_config_totp_digits: 8`.
 | 
						|
 | 
						|
If configuration is not exposed in [`defaults/main.yml`](defaults/main.yml),
 | 
						|
it can be overridden in `authelia_extra_config`, which is merged recursively
 | 
						|
to the default config. Entire blocks can currently not be easily overridden,
 | 
						|
it's best to rely on the `authelia_extra_config` here.
 | 
						|
 | 
						|
Below are some configuration hints towards enabling 2nd factor
 | 
						|
providers like TOTP, WebAuthN etc.
 | 
						|
 | 
						|
### TOTP
 | 
						|
 | 
						|
See [the authelia docs on TOTP](https://www.authelia.com/docs/configuration/one-time-password.html#algorithm)
 | 
						|
before adjusting some of the fine-grained configuration, as many
 | 
						|
TOTP clients do not properly support all by-spec supported values.
 | 
						|
 | 
						|
```yaml
 | 
						|
authelia_config_totp_disable: false
 | 
						|
authelia_config_totp_issuer: "your.authelia.domain"
 | 
						|
# Best to stick to authelias guide here
 | 
						|
authelia_config_totp_algorithm: [...]
 | 
						|
authelia_config_totp_digits: [...]
 | 
						|
authelia_config_totp_period: [...]
 | 
						|
```
 | 
						|
 | 
						|
### WebAuthN
 | 
						|
 | 
						|
```yaml
 | 
						|
authelia_config_webauthn_disable: false
 | 
						|
authelia_config_webauthn_timeout: 30s
 | 
						|
# Force user to touch the security key's confirmation button
 | 
						|
authelia_config_webauthn_user_verification: required
 | 
						|
```
 | 
						|
 | 
						|
For more information about possible WebAuthN configuration, see
 | 
						|
[the authelia docs on WebAuthN](https://www.authelia.com/docs/configuration/webauthn.html).
 | 
						|
 | 
						|
### Database & Redis
 | 
						|
 | 
						|
While Authelia can use a sqlite DB with in memory store by setting
 | 
						|
`authelia_sqlite_storage_file_path`, it is recommended to use a proper
 | 
						|
database and a redis instance:
 | 
						|
```yaml
 | 
						|
authelia_database_type: postgres
 | 
						|
authelia_database_host: /var/run/postgres/
 | 
						|
authelia_database_user: authelia
 | 
						|
authelia_database_pass: authelia
 | 
						|
 | 
						|
# Redis
 | 
						|
authelia_redis_host: /var/run/redis/
 | 
						|
authelia_redis_pass: very_long_static_secret
 | 
						|
 | 
						|
```
 | 
						|
 | 
						|
### Notifications
 | 
						|
 | 
						|
For a test setup, notifications can be written into a config file, this behaviour
 | 
						|
is enabled by setting `authelia_config_notifier_filesystem_filename`. For real-world
 | 
						|
use, an SMTP server is strongly recommended, its config is as follows:
 | 
						|
```
 | 
						|
authelia_smtp_host: mail.domain.com
 | 
						|
authelia_smtp_port: 587 # for StartTLS
 | 
						|
authelia_smtp_user: authelia@domain.com
 | 
						|
authelia_smtp_pass: authelia_user_pass
 | 
						|
```
 |