2015-05-26 13:18:03 +00:00
|
|
|
## OAuth2 Proxy Config File
|
|
|
|
## https://github.com/bitly/oauth2_proxy
|
2014-11-09 19:51:10 +00:00
|
|
|
|
2015-06-08 01:51:47 +00:00
|
|
|
## <addr>:<port> to listen on for HTTP/HTTPS clients
|
2014-11-09 19:51:10 +00:00
|
|
|
# http_address = "127.0.0.1:4180"
|
2015-06-08 01:51:47 +00:00
|
|
|
# https_address = ":443"
|
|
|
|
|
|
|
|
## TLS Settings
|
|
|
|
# tls_cert_file = ""
|
|
|
|
# tls_key_file = ""
|
2014-11-09 19:51:10 +00:00
|
|
|
|
|
|
|
## the OAuth Redirect URL.
|
2015-03-17 20:25:19 +00:00
|
|
|
# defaults to the "https://" + requested host header + "/oauth2/callback"
|
2014-11-09 19:51:10 +00:00
|
|
|
# redirect_url = "https://internalapp.yourcompany.com/oauth2/callback"
|
|
|
|
|
|
|
|
## the http url(s) of the upstream endpoint. If multiple, routing is based on path
|
|
|
|
# upstreams = [
|
|
|
|
# "http://127.0.0.1:8080/"
|
|
|
|
# ]
|
|
|
|
|
2015-03-19 20:37:16 +00:00
|
|
|
## Log requests to stdout
|
|
|
|
# request_logging = true
|
|
|
|
|
2014-11-09 19:51:10 +00:00
|
|
|
## pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream
|
|
|
|
# pass_basic_auth = true
|
2015-03-17 19:15:15 +00:00
|
|
|
## pass the request Host Header to upstream
|
|
|
|
## when disabled the upstream Host is used as the Host Header
|
|
|
|
# pass_host_header = true
|
2014-11-09 19:51:10 +00:00
|
|
|
|
2015-06-06 18:37:54 +00:00
|
|
|
## Email Domains to allow authentication for (this authorizes any email on this domain)
|
|
|
|
## for more granular authorization use `authenticated_emails_file`
|
|
|
|
## To authorize any email addresses use "*"
|
|
|
|
# email_domains = [
|
2014-11-09 19:51:10 +00:00
|
|
|
# "yourcompany.com"
|
|
|
|
# ]
|
|
|
|
|
2015-05-26 13:18:03 +00:00
|
|
|
## The OAuth Client ID, Secret
|
2014-11-09 19:51:10 +00:00
|
|
|
# client_id = "123456.apps.googleusercontent.com"
|
|
|
|
# client_secret = ""
|
|
|
|
|
2015-05-26 13:18:03 +00:00
|
|
|
## Pass OAuth Access token to upstream via "X-Forwarded-Access-Token"
|
|
|
|
# pass_access_token = false
|
|
|
|
|
2014-11-09 19:51:10 +00:00
|
|
|
## Authenticated Email Addresses File (one email per line)
|
|
|
|
# authenticated_emails_file = ""
|
|
|
|
|
|
|
|
## Htpasswd File (optional)
|
|
|
|
## Additionally authenticate against a htpasswd file. Entries must be created with "htpasswd -s" for SHA encryption
|
|
|
|
## enabling exposes a username/login signin form
|
|
|
|
# htpasswd_file = ""
|
|
|
|
|
2015-03-17 22:06:06 +00:00
|
|
|
## Templates
|
|
|
|
## optional directory with custom sign_in.html and error.html
|
|
|
|
# custom_templates_dir = ""
|
|
|
|
|
2014-11-09 19:51:10 +00:00
|
|
|
## Cookie Settings
|
2015-05-29 22:47:40 +00:00
|
|
|
## Key - the cookie name
|
2015-05-09 19:16:26 +00:00
|
|
|
## Secret - the seed string for secure cookies; should be 16, 24, or 32 bytes
|
2015-05-26 13:18:03 +00:00
|
|
|
## for use with an AES cipher when cookie_refresh or pass_access_token
|
2015-05-09 19:16:26 +00:00
|
|
|
## is set
|
2015-05-26 13:18:03 +00:00
|
|
|
## Domain - (optional) cookie domain to force cookies to (ie: .yourcompany.com)
|
|
|
|
## Expire - (duration) expire timeframe for cookie
|
|
|
|
## Refresh - (duration) refresh the cookie when less than this much time remains before
|
|
|
|
## expiration; should be less than cookie_expire; set to 0 to disable.
|
|
|
|
## Refresh revalidated the OAuth token to ensure it is still valid. ie: 24h
|
|
|
|
## Secure - secure cookies are only sent by the browser of a HTTPS connection (recommended)
|
|
|
|
## HttpOnly - httponly cookies are not readable by javascript (recommended)
|
2015-05-29 22:47:40 +00:00
|
|
|
# cookie_key = "_oauth2proxy"
|
2014-11-09 19:51:10 +00:00
|
|
|
# cookie_secret = ""
|
|
|
|
# cookie_domain = ""
|
|
|
|
# cookie_expire = "168h"
|
2015-05-26 13:18:03 +00:00
|
|
|
# cookie_refresh = ""
|
2015-03-18 03:13:45 +00:00
|
|
|
# cookie_secure = true
|
2015-01-19 15:52:18 +00:00
|
|
|
# cookie_httponly = true
|