# Based on start-wekan.sh #--------------------------------------------- # The Node Environnement NODE_ENV=production # The path to NODEJS __YNH_NODE_LOAD_PATH__ #--------------------------------------------- # Debug OIDC OAuth2 etc. #DEBUG=true #--------------------------------------------- # URL of the mongodb MONGO_URL='mongodb://127.0.0.1:27017/__DB_NAME__' #--------------------------------------------- # ROOT_URL EXAMPLES FOR WEBSERVERS: https://github.com/wekan/wekan/wiki/Settings # Production: https://example.com/wekan # Local: http://localhost:2000 # ipaddress=$(ifdata -pa eth0) ROOT_URL='https://__DOMAIN____PATH__' #--------------------------------------------- # Working email IS NOT REQUIRED to use Wekan. # https://github.com/wekan/wekan/wiki/Adding-users # https://github.com/wekan/wekan/wiki/Troubleshooting-Mail # https://github.com/wekan/wekan-mongodb/blob/master/docker-compose.yml MAIL_URL='smtp://__MAIN_DOMAIN__:25/' MAIL_FROM='Wekan Support ' # Currently MAIL_SERVICE is not in use. #MAIL_SERVICE=Outlook365 #MAIL_SERVICE_USER=firstname.lastname@hotmail.com #MAIL_SERVICE_PASSWORD=SecretPassword #--------------------------------------------- #KADIRA_OPTIONS_ENDPOINT=http://127.0.0.1:11011 #--------------------------------------------- # This is local port where Wekan Node.js runs, same as below on Caddyfile settings. PORT=__PORT__ #--------------------------------------------- # ==== NUMBER OF SEARCH RESULTS PER PAGE BY DEFAULT ==== #RESULTS_PER_PAGE=20 #--------------------------------------------- # Wekan Board works when WITH_API=true. # If you disable Wekan API with false, Board does not work. WITH_API='true' #--------------------------------------------------------------- # ==== PASSWORD BRUTE FORCE PROTECTION ==== # https://atmospherejs.com/lucasantoniassi/accounts-lockout # Defaults below. Uncomment to change. wekan/server/accounts-lockout.js #ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURES_BEFORE=3 #ACCOUNTS_LOCKOUT_KNOWN_USERS_PERIOD=60 #ACCOUNTS_LOCKOUT_KNOWN_USERS_FAILURE_WINDOW=15 #ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURES_BERORE=3 #ACCOUNTS_LOCKOUT_UNKNOWN_USERS_LOCKOUT_PERIOD=60 #ACCOUNTS_LOCKOUT_UNKNOWN_USERS_FAILURE_WINDOW=15 #--------------------------------------------------------------- # ==== ACCOUNT OPTIONS ==== # https://docs.meteor.com/api/accounts-multi.html#AccountsCommon-config # Defaults below. Uncomment to change. wekan/server/accounts-common.js # - ACCOUNTS_COMMON_LOGIN_EXPIRATION_IN_DAYS=90 #--------------------------------------------------------------- # ==== RICH TEXT EDITOR IN CARD COMMENTS ==== # https://github.com/wekan/wekan/pull/2560 RICHER_CARD_COMMENT_EDITOR=true #--------------------------------------------------------------- # ==== CARD OPENED, SEND WEBHOOK MESSAGE ==== CARD_OPENED_WEBHOOK_ENABLED=false #--------------------------------------------------------------- # ==== Allow to shrink attached/pasted image ==== # https://github.com/wekan/wekan/pull/2544 #MAX_IMAGE_PIXEL=1024 #IMAGE_COMPRESS_RATIO=80 #--------------------------------------------------------------- # ==== NOTIFICATION TRAY AFTER READ DAYS BEFORE REMOVE ===== # Number of days after a notification is read before we remove it. # Default: 2 #- NOTIFICATION_TRAY_AFTER_READ_DAYS_BEFORE_REMOVE=2 #--------------------------------------------------------------- # ==== BIGEVENTS DUE ETC NOTIFICATIONS ===== # https://github.com/wekan/wekan/pull/2541 # Introduced a system env var BIGEVENTS_PATTERN default as "NONE", # so any activityType matches the pattern, system will send out # notifications to all board members no matter they are watching # or tracking the board or not. Owner of the wekan server can # disable the feature by setting this variable to "NONE" or # change the pattern to any valid regex. i.e. '|' delimited # activityType names. # a) Example #BIGEVENTS_PATTERN=due # b) All #BIGEVENTS_PATTERN=received|start|due|end # c) Disabled BIGEVENTS_PATTERN=NONE #--------------------------------------------------------------- # ==== EMAIL DUE DATE NOTIFICATION ===== # https://github.com/wekan/wekan/pull/2536 # System timelines will be showing any user modification for # dueat startat endat receivedat, also notification to # the watchers and if any card is due, about due or past due. # # Notify due days, default is None. #NOTIFY_DUE_DAYS_BEFORE_AND_AFTER=2,0 # it will notify user 2 days before due day and on the due day # # Notify due at hour of day. Default every morning at 8am. Can be 0-23. # If env variable has parsing error, use default. Notification sent to watchers. #NOTIFY_DUE_AT_HOUR_OF_DAY=8 #----------------------------------------------------------------- # ==== EMAIL NOTIFICATION TIMEOUT, ms ===== # Defaut: 30000 ms = 30s #EMAIL_NOTIFICATION_TIMEOUT=30000 #----------------------------------------------------------------- # CORS: Set Access-Control-Allow-Origin header. Example: * #CORS=* # To enable the Set Access-Control-Allow-Headers header. "Authorization,Content-Type" is required for cross-origin use of the API. #CORS_ALLOW_HEADERS=Authorization,Content-Type # To enable the Set Access-Control-Expose-Headers header. This is not needed for typical CORS situations. Example: * #CORS_EXPOSE_HEADERS=* #--------------------------------------------- # Optional: Integration with Matomo https://matomo.org that is installed to your server # The address of the server where Matomo is hosted: # MATOMO_ADDRESS=https://example.com/matomo #MATOMO_ADDRESS= # The value of the site ID given in Matomo server for Wekan # Example: MATOMO_SITE_ID=123456789 #MATOMO_SITE_ID='' # The option do not track which enables users to not be tracked by matomo" # Example: MATOMO_DO_NOT_TRACK=false #MATOMO_DO_NOT_TRACK=true # The option that allows matomo to retrieve the username: # Example: MATOMO_WITH_USERNAME=true #MATOMO_WITH_USERNAME='false' #--------------------------------------------- # Enable browser policy and allow one trusted URL that can have iframe that has Wekan embedded inside. # Setting this to false is not recommended, it also disables all other browser policy protections # and allows all iframing etc. See wekan/server/policy.js # Default value: true BROWSER_POLICY_ENABLED=true # When browser policy is enabled, HTML code at this Trusted URL can have iframe that embeds Wekan inside. # Example: TRUSTED_URL=http://example.com TRUSTED_URL='' # What to send to Outgoing Webhook, or leave out. Example, that includes all that are default: cardId,listId,oldListId,boardId,comment,user,card,commentId . # Example: WEBHOOKS_ATTRIBUTES=cardId,listId,oldListId,boardId,comment,user,card,commentId WEBHOOKS_ATTRIBUTES='' #--------------------------------------------- # OAUTH2 ORACLE on premise identity manager OIM #ORACLE_OIM_ENABLED=true #--------------------------------------------- # ==== OAUTH2 AZURE ==== # https://github.com/wekan/wekan/wiki/Azure # 1) Register the application with Azure. Make sure you capture # the application ID as well as generate a secret key. # 2) Configure the environment variables. This differs slightly # by installation type, but make sure you have the following: #OAUTH2_ENABLED=true # # Optional OAuth2 CA Cert, see https://github.com/wekan/wekan/issues/3299 #OAUTH2_CA_CERT=ABCD1234 # # Use OAuth2 ADFS additional changes. Also needs OAUTH2_ENABLED=true setting. #OAUTH2_ADFS_ENABLED=false # # OAuth2 docs: https://github.com/wekan/wekan/wiki/OAuth2 # OAuth2 login style: popup or redirect. #OAUTH2_LOGIN_STYLE=redirect # # Application GUID captured during app registration: #OAUTH2_CLIENT_ID=xxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx # # Secret key generated during app registration: #OAUTH2_SECRET=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx #OAUTH2_SERVER_URL=https://login.microsoftonline.com/ #OAUTH2_AUTH_ENDPOINT=/oauth2/v2.0/authorize #OAUTH2_USERINFO_ENDPOINT=https://graph.microsoft.com/oidc/userinfo #OAUTH2_TOKEN_ENDPOINT=/oauth2/v2.0/token # # The claim name you want to map to the unique ID field: #OAUTH2_ID_MAP=email # # The claim name you want to map to the username field: #OAUTH2_USERNAME_MAP=email # # The claim name you want to map to the full name field: #OAUTH2_FULLNAME_MAP=name # # The claim name you want to map to the email field: #OAUTH2_EMAIL_MAP=email #----------------------------------------------------------------- # ==== OAUTH2 KEYCLOAK ==== # https://github.com/wekan/wekan/wiki/Keycloak <== MAPPING INFO, REQUIRED #OAUTH2_ENABLED=true # OAuth2 login style: popup or redirect. #OAUTH2_LOGIN_STYLE=redirect #OAUTH2_CLIENT_ID= #OAUTH2_SERVER_URL=/auth #OAUTH2_AUTH_ENDPOINT=/realms//protocol/openid-connect/auth #OAUTH2_USERINFO_ENDPOINT=/realms//protocol/openid-connect/userinfo #OAUTH2_TOKEN_ENDPOINT=/realms//protocol/openid-connect/token #OAUTH2_SECRET= #----------------------------------------------------------------- # ==== OAUTH2 DOORKEEPER ==== # OAuth2 docs: https://github.com/wekan/wekan/wiki/OAuth2 # https://github.com/wekan/wekan/issues/1874 # https://github.com/wekan/wekan/wiki/OAuth2 # Enable the OAuth2 connection #OAUTH2_ENABLED=true # # OAuth2 login style: popup or redirect. #OAUTH2_LOGIN_STYLE=redirect # # OAuth2 Client ID. #OAUTH2_CLIENT_ID=abcde12345 # # OAuth2 Secret. #OAUTH2_SECRET=54321abcde # # OAuth2 Server URL. #OAUTH2_SERVER_URL=https://chat.example.com # # OAuth2 Authorization Endpoint. #OAUTH2_AUTH_ENDPOINT=/oauth/authorize # # OAuth2 Userinfo Endpoint. #OAUTH2_USERINFO_ENDPOINT=/oauth/userinfo # # OAuth2 Token Endpoint. #OAUTH2_TOKEN_ENDPOINT=/oauth/token # # OAUTH2 ID Token Whitelist Fields. #OAUTH2_ID_TOKEN_WHITELIST_FIELDS=[] # # OAUTH2 Request Permissions. #OAUTH2_REQUEST_PERMISSIONS='openid profile email' # # OAuth2 ID Mapping #OAUTH2_ID_MAP= # # OAuth2 Username Mapping #OAUTH2_USERNAME_MAP= # # OAuth2 Fullname Mapping #OAUTH2_FULLNAME_MAP= # # OAuth2 Email Mapping #OAUTH2_EMAIL_MAP= #--------------------------------------------- # LDAP_ENABLE : Enable or not the connection by the LDAP # example : LDAP_ENABLE=true #LDAP_ENABLE=false LDAP_ENABLE=true # LDAP_PORT : The port of the LDAP server # example : LDAP_PORT=389 #LDAP_PORT=389 LDAP_PORT=389 # LDAP_HOST : The host server for the LDAP server # example : LDAP_HOST=localhost #LDAP_HOST= LDAP_HOST=localhost # #----------------------------------------------------------------- # ==== LDAP AD Simple Auth ==== # # Set to true, if you want to connect with Active Directory by Simple Authentication. # When using AD Simple Auth, LDAP_BASEDN is not needed. # # Example: #LDAP_AD_SIMPLE_AUTH=true # # === LDAP User Authentication === # # a) Option to login to the LDAP server with the user's own username and password, instead of # an administrator key. Default: false (use administrator key). # # b) When using AD Simple Auth, set to true, when login user is used for binding, # and LDAP_BASEDN is not needed. # # Example: #LDAP_USER_AUTHENTICATION=true # # Which field is used to find the user for the user authentication. Default: uid. #LDAP_USER_AUTHENTICATION_FIELD=uid # # === LDAP Default Domain === # # a) In case AD SimpleAuth is configured, the default domain is appended to the given # loginname for creating the correct username for the bind request to AD. # # b) The default domain of the ldap it is used to create email if the field is not map # correctly with the LDAP_SYNC_USER_DATA_FIELDMAP # # Example : #LDAP_DEFAULT_DOMAIN=mydomain.com # #----------------------------------------------------------------- # ==== LDAP BASEDN Auth ==== # # LDAP_BASEDN : The base DN for the LDAP Tree # example : LDAP_BASEDN=ou=user,dc=example,dc=org #LDAP_BASEDN= LDAP_BASEDN=dc=yunohost,dc=org #--------------------------------------------- # LDAP_LOGIN_FALLBACK : Fallback on the default authentication method # example : LDAP_LOGIN_FALLBACK=true #LDAP_LOGIN_FALLBACK=false LDAP_LOGIN_FALLBACK=true # LDAP_RECONNECT : Reconnect to the server if the connection is lost # example : LDAP_RECONNECT=false #LDAP_RECONNECT=true LDAP_RECONNECT=true # LDAP_TIMEOUT : Overall timeout, in milliseconds # example : LDAP_TIMEOUT=12345 #LDAP_TIMEOUT=10000 LDAP_TIMEOUT=10000 # LDAP_IDLE_TIMEOUT : Specifies the timeout for idle LDAP connections in milliseconds # example : LDAP_IDLE_TIMEOUT=12345 #LDAP_IDLE_TIMEOUT=10000 LDAP_IDLE_TIMEOUT=10000 # LDAP_CONNECT_TIMEOUT : Connection timeout, in milliseconds # example : LDAP_CONNECT_TIMEOUT=12345 #LDAP_CONNECT_TIMEOUT=10000 LDAP_CONNECT_TIMEOUT=10000 # LDAP_AUTHENTIFICATION : If the LDAP needs a user account to search # example : LDAP_AUTHENTIFICATION=true #LDAP_AUTHENTIFICATION=false LDAP_AUTHENTIFICATION=false # LDAP_AUTHENTIFICATION_USERDN : The search user DN # example : LDAP_AUTHENTIFICATION_USERDN=cn=admin,dc=example,dc=org #---------------------------------------------------------------------------- # The search user DN - You need quotes when you have spaces in parameters # 2 examples: #LDAP_AUTHENTIFICATION_USERDN="CN=ldap admin,CN=users,DC=domainmatter,DC=lan" #LDAP_AUTHENTIFICATION_USERDN="CN=wekan_adm,OU=serviceaccounts,OU=admin,OU=prod,DC=mydomain,DC=com" #--------------------------------------------------------------------------- # LDAP_AUTHENTIFICATION_PASSWORD : The password for the search user # example : AUTHENTIFICATION_PASSWORD=admin #LDAP_AUTHENTIFICATION_PASSWORD= # # LDAP_LOG_ENABLED : Enable logs for the module # example : LDAP_LOG_ENABLED=true #LDAP_LOG_ENABLED=false LDAP_LOG_ENABLED=true # LDAP_BACKGROUND_SYNC : If the sync of the users should be done in the background # example : LDAP_BACKGROUND_SYNC=true #LDAP_BACKGROUND_SYNC=false LDAP_BACKGROUND_SYNC=true # LDAP_BACKGROUND_SYNC_INTERVAL : At which interval does the background task sync in milliseconds # At which interval does the background task sync in milliseconds. # Leave this unset, so it uses default, and does not crash. # https://github.com/wekan/wekan/issues/2354#issuecomment-515305722 LDAP_BACKGROUND_SYNC_INTERVAL='' # # LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED : # example : LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=true #LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=false LDAP_BACKGROUND_SYNC_KEEP_EXISTANT_USERS_UPDATED=true # LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS : # example : LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=true #LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=false LDAP_BACKGROUND_SYNC_IMPORT_NEW_USERS=true # LDAP_ENCRYPTION : If using LDAPS # example : LDAP_ENCRYPTION=ssl #LDAP_ENCRYPTION=false # # LDAP_CA_CERT : The certification for the LDAPS server. Certificate needs to be included in this docker-compose.yml file. # example : LDAP_CA_CERT=-----BEGIN CERTIFICATE-----MIIE+zCCA+OgAwIBAgIkAhwR/6TVLmdRY6hHxvUFWc0+Enmu/Hu6cj+G2FIdAgIC...-----END CERTIFICATE----- #LDAP_CA_CERT= # # LDAP_REJECT_UNAUTHORIZED : Reject Unauthorized Certificate # example : LDAP_REJECT_UNAUTHORIZED=true #LDAP_REJECT_UNAUTHORIZED=false # # LDAP_USER_SEARCH_FILTER : Optional extra LDAP filters. Don't forget the outmost enclosing parentheses if needed # example : LDAP_USER_SEARCH_FILTER= #LDAP_USER_SEARCH_FILTER= LDAP_USER_SEARCH_FILTER="(objectclass=posixAccount)" # LDAP_USER_SEARCH_SCOPE : base (search only in the provided DN), one (search only in the provided DN and one level deep), or sub (search the whole subtree) # example : LDAP_USER_SEARCH_SCOPE=one #LDAP_USER_SEARCH_SCOPE= LDAP_USER_SEARCH_SCOPE=sub # LDAP_USER_SEARCH_FIELD : Which field is used to find the user # example : LDAP_USER_SEARCH_FIELD=uid #LDAP_USER_SEARCH_FIELD= LDAP_USER_SEARCH_FIELD=uid,mail # LDAP_SEARCH_PAGE_SIZE : Used for pagination (0=unlimited) # example : LDAP_SEARCH_PAGE_SIZE=12345 #LDAP_SEARCH_PAGE_SIZE=0 LDAP_SEARCH_PAGE_SIZE=0 # LDAP_SEARCH_SIZE_LIMIT : The limit number of entries (0=unlimited) # example : LDAP_SEARCH_SIZE_LIMIT=12345 #LDAP_SEARCH_SIZE_LIMIT=0 LDAP_SEARCH_SIZE_LIMIT=0 # LDAP_GROUP_FILTER_ENABLE : Enable group filtering # example : LDAP_GROUP_FILTER_ENABLE=true #LDAP_GROUP_FILTER_ENABLE=false LDAP_GROUP_FILTER_ENABLE=true # LDAP_GROUP_FILTER_OBJECTCLASS : The object class for filtering # example : LDAP_GROUP_FILTER_OBJECTCLASS=group #LDAP_GROUP_FILTER_OBJECTCLASS= LDAP_GROUP_FILTER_OBJECTCLASS=posixGroup # LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE : # example : #LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE= LDAP_GROUP_FILTER_GROUP_ID_ATTRIBUTE=cn # LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE : # example : #LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE= LDAP_GROUP_FILTER_GROUP_MEMBER_ATTRIBUTE=memberUid # LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT : # example : #LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT= LDAP_GROUP_FILTER_GROUP_MEMBER_FORMAT=uid # LDAP_GROUP_FILTER_GROUP_NAME : # example : LDAP_GROUP_FILTER_GROUP_NAME=wekan_user #LDAP_GROUP_FILTER_GROUP_NAME= LDAP_GROUP_FILTER_GROUP_NAME=__APP__.main # LDAP_UNIQUE_IDENTIFIER_FIELD : This field is sometimes class GUID (Globally Unique Identifier) # example : LDAP_UNIQUE_IDENTIFIER_FIELD=guid #LDAP_UNIQUE_IDENTIFIER_FIELD= LDAP_UNIQUE_IDENTIFIER_FIELD=entryUUID # LDAP_UTF8_NAMES_SLUGIFY : Convert the username to utf8 # example : LDAP_UTF8_NAMES_SLUGIFY=false #LDAP_UTF8_NAMES_SLUGIFY=true LDAP_UTF8_NAMES_SLUGIFY=true # LDAP_USERNAME_FIELD : Which field contains the ldap username # example : LDAP_USERNAME_FIELD=username #LDAP_USERNAME_FIELD= LDAP_USERNAME_FIELD=uid # LDAP_FULLNAME_FIELD : Which field contains the ldap fullname # example : LDAP_FULLNAME_FIELD=fullname #LDAP_FULLNAME_FIELD= LDAP_FULLNAME_FIELD=cn # LDAP_MERGE_EXISTING_USERS : # example : LDAP_MERGE_EXISTING_USERS=true #LDAP_MERGE_EXISTING_USERS=false LDAP_MERGE_EXISTING_USERS=true # LDAP_EMAIL_MATCH_ENABLE : allow existing account matching by e-mail address when username does not match # example: LDAP_EMAIL_MATCH_ENABLE=true #LDAP_EMAIL_MATCH_ENABLE=false LDAP_EMAIL_MATCH_ENABLE=true # LDAP_EMAIL_MATCH_REQUIRE : require existing account matching by e-mail address when username does match # example: LDAP_EMAIL_MATCH_REQUIRE=true #LDAP_EMAIL_MATCH_REQUIRE=false LDAP_EMAIL_MATCH_REQUIRE=false # LDAP_EMAIL_MATCH_VERIFIED : require existing account email address to be verified for matching # example: LDAP_EMAIL_MATCH_VERIFIED=true #LDAP_EMAIL_MATCH_VERIFIED=false LDAP_EMAIL_MATCH_VERIFIED=false # LDAP_EMAIL_FIELD : which field contains the LDAP e-mail address # example: LDAP_EMAIL_FIELD=mail #LDAP_EMAIL_FIELD= LDAP_EMAIL_FIELD=mail # LDAP_SYNC_USER_DATA : # example : LDAP_SYNC_USER_DATA=true #LDAP_SYNC_USER_DATA=false LDAP_SYNC_USER_DATA=true # LDAP_SYNC_USER_DATA_FIELDMAP : # example : LDAP_SYNC_USER_DATA_FIELDMAP={"cn":"name", "mail":"email"} #LDAP_SYNC_USER_DATA_FIELDMAP= LDAP_SYNC_USER_DATA_FIELDMAP={"cn":"name"} # LDAP_SYNC_GROUP_ROLES : # example : #LDAP_SYNC_GROUP_ROLES= LDAP_SYNC_GROUP_ROLES=__APP__.admin # Enable/Disable syncing of admin status based on ldap groups: #LDAP_SYNC_ADMIN_STATUS=true LDAP_SYNC_ADMIN_STATUS=true # Comma separated list of admin group names to sync. #LDAP_SYNC_ADMIN_GROUPS=group1,group2 LDAP_SYNC_ADMIN_GROUPS=__APP__.admin #--------------------------------------------------------------------- # Login to LDAP automatically with HTTP header. # In below example for siteminder, at right side of = is header name. #HEADER_LOGIN_ID=HEADERUID #HEADER_LOGIN_FIRSTNAME=HEADERFIRSTNAME #HEADER_LOGIN_LASTNAME=HEADERLASTNAME #HEADER_LOGIN_EMAIL=HEADEREMAILADDRESS #--------------------------------------------------------------------- # LOGOUT_WITH_TIMER : Enables or not the option logout with timer # example : LOGOUT_WITH_TIMER=true #LOGOUT_WITH_TIMER= # LOGOUT_IN : The number of days # example : LOGOUT_IN=1 #LOGOUT_IN= #LOGOUT_ON_HOURS= # LOGOUT_ON_MINUTES : The number of minutes # example : LOGOUT_ON_MINUTES=55 #LOGOUT_ON_MINUTES= #--------------------------------------------------------------------- # PASSWORD_LOGIN_ENABLED : Enable or not the password login form. #PASSWORD_LOGIN_ENABLED=true #--------------------------------------------------------------------- #CAS_ENABLED=true #CAS_BASE_URL=https://cas.example.com/cas #CAS_LOGIN_URL=https://cas.example.com/login #CAS_VALIDATE_URL=https://cas.example.com/cas/p3/serviceValidate #--------------------------------------------------------------------- #SAML_ENABLED=true #SAML_PROVIDER= #SAML_ENTRYPOINT= #SAML_ISSUER= #SAML_CERT= #SAML_IDPSLO_REDIRECTURL= #SAML_PRIVATE_KEYFILE= #SAML_PUBLIC_CERTFILE= #SAML_IDENTIFIER_FORMAT= #SAML_LOCAL_PROFILE_MATCH_ATTRIBUTE= #SAML_ATTRIBUTES= #--------------------------------------------------------------------- # Wait spinner to use #WAIT_SPINNER=Bounce #---------------------------------------------------------------------