You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
hosts: # the hosts for which letsencrypt should request certificates
44
-
# - mydomain.tld
45
-
# - myotherdomain.tld
48
+
#- mydomain.tld
49
+
#- myotherdomain.tld
46
50
responseheaders: # response headers are added to every response (default: none)
47
-
# X-Custom-Header: "custom value"
51
+
# X-Custom-Header: "custom value"
52
+
48
53
trustedproxies: # IPs or IP ranges of trusted proxies. Used to obtain the remote ip via the X-Forwarded-For header. (configure 127.0.0.1 to trust sockets)
49
-
# - 127.0.0.1
50
-
# - 192.168.178.0/24
54
+
# - 127.0.0.1/32
51
55
# - ::1
56
+
securecookie: true # If the secure flag should be set on cookies. See https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Set-Cookie#secure
52
57
53
58
cors: # Sets cors headers only when needed and provides support for multiple allowed origins. Overrides Access-Control-* Headers in response headers.
54
59
alloworigins:
55
-
# - ".+.example.com"
56
-
# - "otherdomain.com"
60
+
#- ".+.example.com"
61
+
#- "otherdomain.com"
57
62
allowmethods:
58
-
# - "GET"
59
-
# - "POST"
63
+
#- "GET"
64
+
#- "POST"
60
65
allowheaders:
61
-
# - "Authorization"
62
-
# - "content-type"
63
-
66
+
# - "Authorization"
67
+
# - "content-type"
64
68
stream:
65
69
pingperiodseconds: 45# the interval in which websocket pings will be sent. Only change this value if you know what you are doing.
66
-
allowedorigins: # allowed origins for websocket connections (same origin is always allowed, default only same origin)
70
+
allowedorigins: # allowed origins for websocket connections (same origin is always allowed)
67
71
# - ".+.example.com"
68
72
# - "otherdomain.com"
69
-
database: # see below
73
+
oidc:
74
+
enabled: false # Enable OpenID Connect login, allowing users to authenticate via an external identity provider (e.g. Keycloak, Authelia, Google).
75
+
issuer: # The OIDC issuer URL. This is the base URL of your identity provider, used to discover endpoints. Example: "https://auth.example.com/realms/myrealm"
76
+
clientid: # The client ID registered with your identity provider for this application.
77
+
clientsecret: # The client secret for the registered client. May be omitted if using a public client with PKCE.
78
+
redirecturl: http://gotify.example.org/auth/oidc/callback # The callback URL that the identity provider redirects to after authentication. Must match exactly what is configured in your identity provider.
79
+
pkce: true # If PKCE should be used. https://oauth.net/2/pkce/
80
+
autoregister: true # If true, automatically create a new user on first OIDC login. If false, only existing users can log in via OIDC.
81
+
82
+
database: # for database see (configure database section)
70
83
dialect: sqlite3
71
84
connection: data/gotify.db
72
85
defaultuser: # on database creation, gotify creates an admin user (these values will only be used for the first start, if you want to edit the user after the first start use the WebUI)
See the [Configuration](/docs/config) page for the full config reference.
49
+
50
+
### Redirect URL
51
+
52
+
- The redirect URL must always end with `/auth/oidc/callback`.
53
+
- If Gotify is served at the root, the redirect URL is `https://gotify.example.org/auth/oidc/callback`.
54
+
- If Gotify is served on a sub-path (e.g. behind a reverse proxy at `/gotify/`), the sub-path must be included: `https://example.org/gotify/auth/oidc/callback`.
55
+
56
+
This URL must match **exactly** between the Gotify config and your identity provider's client configuration.
57
+
58
+
## Authelia
59
+
60
+
[Authelia](https://www.authelia.com/) is a self-hosted authentication and authorization server.
0 commit comments