dataset/seed/dovecot/templates/dovecot-oauth2.conf.ext

93 lines
2.9 KiB
Text
Raw Normal View History

2022-03-08 19:42:28 +01:00
# GNUNUX from : /usr/share/doc/dovecot/example-config/dovecot-oauth2.conf.ext
### OAuth2 password database configuration
## url for verifying token validity. Token is appended to the URL
# tokeninfo_url = http://endpoint/oauth/tokeninfo?access_token=
#>GNUNUX
2023-06-23 08:12:05 +02:00
tokeninfo_url = https://{{ general.oauth2_client.oauth2_client_server_domainname }}/oauth2/userinfo/?access_token=
2022-03-08 19:42:28 +01:00
#<GNUNUX
## introspection endpoint, used to gather extra fields and other information.
# introspection_url = http://endpoint/oauth/me
## How introspection is made, valid values are
## auth = GET request with Bearer authentication
## get = GET request with token appended to URL
## post = POST request with token=bearer_token as content
## local = perform local validation only
# introspection_mode = auth
## Force introspection even if tokeninfo contains wanted fields
## Set this to yes if you are using active_attribute
# force_introspection = no
#>GNUNUX
2023-06-23 08:12:05 +02:00
introspection_url = https://{{ general.oauth2_client.oauth2_client_server_domainname }}/oauth2/introspect/
2022-03-08 19:42:28 +01:00
introspection_mode = post
force_introspection = no
#<GNUNUX
## Validation key dictionary (e.g. fs:posix:prefix=/etc/dovecot/keys/)
## Lookup key is /shared/<azp:default>/<alg>/<kid:default>
# local_validation_key_dict =
## A single wanted scope of validity (optional)
# scope = something
#>GNUNUX
#scope = openid,profile,email
#<GNUNUX
## username attribute in response (default: email)
# username_attribute = email
#>GNUNUX
username_attribute = email
#<GNUNUX
## username normalization format (default: %Lu)
# username_format = %Lu
## Attribute name for checking whether account is disabled (optional)
# active_attribute =
## Expected value in active_attribute (empty = require present, but anything goes)
# active_value =
## Expected issuer(s) for the token (space separated list)
# issuers =
## URL to RFC 7628 OpenID Provider Configuration Information schema
# openid_configuration_url =
#>GNUNUX
2023-06-23 08:12:05 +02:00
openid_configuration_url = https://{{ general.oauth2_client.oauth2_client_server_domainname }}/.well-known/openid-configuration
2022-03-08 19:42:28 +01:00
#<GNUNUX
## Extra fields to set in passdb response (in passdb static style)
# pass_attrs =
## Timeout in milliseconds
# timeout_msecs = 0
## Enable debug logging
# debug = no
## Max parallel connections (how many simultaneous connections to open)
# max_parallel_connections = 10
## Max pipelined requests (how many requests to send per connection, requires server-side support)
# max_pipelined_requests = 1
## HTTP request raw log directory
# rawlog_dir = /tmp/oauth2
#>GNUNUX
2023-06-23 08:12:05 +02:00
client_id = {{ general.oauth2_client.oauth2_client_id }}
client_secret = {{ general.oauth2_client.oauth2_client_secret }}
2022-03-08 19:42:28 +01:00
#<GNUNUX
## TLS settings
# tls_ca_cert_file = /path/to/ca-certificates.txt
# tls_ca_cert_dir = /path/to/certs/
# tls_cert_file = /path/to/client/cert
# tls_key_file = /path/to/client/key
# tls_cipher_suite = HIGH:!SSLv2
# tls_allow_invalid_cert = FALSE