mirror of
https://gitee.com/dromara/MaxKey.git
synced 2025-12-08 01:48:33 +08:00
change description
This commit is contained in:
parent
84a7dba908
commit
6ad888c491
@ -30,8 +30,8 @@
|
||||
| 1 | 动态验证码 |
|
||||
| 2 | 双因素认证 |
|
||||
| 3 | Google Authenticator |
|
||||
| 4 | 微信 |
|
||||
| 5 | 新浪微博 |
|
||||
| 4 | 微信/QQ |
|
||||
| 5 | 微博 |
|
||||
| 6 | 钉钉 |
|
||||
| 7 | Google |
|
||||
| 8 | Facebook |
|
||||
|
||||
@ -21,68 +21,3 @@ config.login.remeberme.validity=
|
||||
config.login.default.uri=appList
|
||||
|
||||
config.ipaddress.whitelist=false
|
||||
############################################################################
|
||||
# Kerberos Login configuration
|
||||
############################################################################
|
||||
#short name of user domain must be in upper case,eg:CONNSEC
|
||||
config.support.kerberos.default.userdomain=CONNSEC
|
||||
#short name of user domain must be in upper case,eg:CONNSEC.COM
|
||||
config.support.kerberos.default.fulluserdomain=CONNSEC.COM
|
||||
#last 8Bit crypto for Kerberos web Authentication
|
||||
config.support.kerberos.default.crypto=846KZSzYq56M6d5o
|
||||
#Kerberos Authentication server RUL
|
||||
config.support.kerberos.default.redirecturi=http://sso.maxkey.org/kerberos/authn/
|
||||
############################################################################
|
||||
# CAS Login configuration
|
||||
############################################################################
|
||||
|
||||
config.support.cas.login.url=http://sso.maxkey.org/cas/login
|
||||
#
|
||||
config.support.cas.login.service=http://sso.maxkey.org/maxkey/cas
|
||||
#
|
||||
config.support.cas.login.validation.url=http://sso.maxkey.org/cas
|
||||
|
||||
############################################################################
|
||||
# HTTPHEADER Login configuration
|
||||
############################################################################
|
||||
|
||||
config.support.httpheader.enable=false
|
||||
|
||||
config.support.httpheader.headername=header-user
|
||||
|
||||
# iv-user is for IBM Security Access Manager
|
||||
#config.httpheader.headername=iv-user
|
||||
|
||||
############################################################################
|
||||
# BASIC Login support configuration
|
||||
############################################################################
|
||||
|
||||
config.support.basic.enable=false
|
||||
|
||||
#############################################################################
|
||||
# WsFederation Login support configuration
|
||||
#identifier: the identifer for the ADFS server
|
||||
#url: the login url for ADFS
|
||||
#principal: the name of the attribute/assertion returned by ADFS that contains the principal's username.
|
||||
#relyingParty: the identifier of the CAS Server as it has been configured in ADFS.
|
||||
#tolerance: (optional) the amount of drift to allow when validating the timestamp on the token. Default: 10000 (ms)
|
||||
#attributeMutator: (optional) a class (defined by you) that can modify the attributes/assertions returned by the ADFS server
|
||||
#signingCertificate: ADFS's signing certificate used to validate the token/assertions issued by ADFS.
|
||||
############################################################################
|
||||
|
||||
config.support.wsfederation.identifier=http://adfs.connsec.com/adfs/services/trust
|
||||
config.support.wsfederation.url=https://adfs.connsec.com/adfs/ls/
|
||||
config.support.wsfederation.principal=upn
|
||||
config.support.wsfederation.relyingParty=urn:federation:connsec
|
||||
config.support.wsfederation.signingCertificate=adfs-signing.crt
|
||||
config.support.wsfederation.tolerance=10000
|
||||
config.support.wsfederation.upn.suffix=connsec.com
|
||||
config.support.wsfederation.logoutUrl=https://adfs.connsec.com/adfs/ls/?wa=wsignout1.0
|
||||
#############################################################################
|
||||
|
||||
#############################################################################
|
||||
config.oidc.metadata.issuer=http://${config.server.name}/maxkey
|
||||
config.oidc.metadata.authorizationEndpoint=http://${config.server.name}/maxkey/oauth/v20/authorize
|
||||
config.oidc.metadata.tokenEndpoint=http://${config.server.name}/maxkey/oauth/v20/token
|
||||
config.oidc.metadata.userinfoEndpoint=http://${config.server.name}/maxkey/api/connect/userinfo
|
||||
#############################################################################
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user