Last change
on this file since 3993 was
3993,
checked in by Nicklas Nordborg, 7 years ago
|
Fixes #892: Add support for enforcing YubiKey? login depending on client
A list with client id values can now be specified in the require-yubikey configuration setting to require that YubiKey login is used.
A releated but slightly different change is that if someone is trying to login with valid YubiKey that is not connected to a user account the login is blocked. This case used to be ignored and passed back to the BASE core for internal authentication.
|
File size:
887 bytes
|
Line | |
---|
1 | # |
---|
2 | # You need to register with Yubico and get a CLIENT_ID and CLIENT_KEY |
---|
3 | # in order to use the YubiCloud validation service. |
---|
4 | # Go to |
---|
5 | # |
---|
6 | # https://upgrade.yubico.com/getapikey/ |
---|
7 | # |
---|
8 | # and follow the instructions. Fill in the client id and key in this file |
---|
9 | # and place it in the WEB-INF/classes directory of your BASE installation |
---|
10 | # |
---|
11 | |
---|
12 | client-id = |
---|
13 | client-key = |
---|
14 | |
---|
15 | ## Comma- or whitespace separated list of application ids |
---|
16 | ## that should NOT use YubiKey for login. For example, |
---|
17 | ## it is recommended that YubiKey is disabled for the |
---|
18 | ## FTP Server extension if that is installed |
---|
19 | # no-yubikey = net.sf.basedb.clients.ftp |
---|
20 | |
---|
21 | ## Comma- or whitespace separated list of applications ids |
---|
22 | ## that MUST use YubiKey for login. Users accounts that |
---|
23 | ## have not been assigned a YubiKey will not be able to |
---|
24 | ## login with the clients (not even the ROOT user!). |
---|
25 | # require-yubikey = |
---|
Note: See
TracBrowser
for help on using the repository browser.