Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable security or control the cookie expiration #177

Open
1 task done
ctrlbrk42 opened this issue Jan 4, 2024 · 6 comments
Open
1 task done

Disable security or control the cookie expiration #177

ctrlbrk42 opened this issue Jan 4, 2024 · 6 comments
Labels
enhancement New feature or request

Comments

@ctrlbrk42
Copy link

Does it fit the projects scope?

  • This is relevant

Why?

I am using a reverse proxy for auth, so I prefer not having to re-login to the KB every day.

Solution?

Can you provide a docker env var to disable authentication and just set a default username? Or can you provide a mechanism to set the cookie expiration to a far away date.

Alternatives?

No response

Extra Context

No response

@ctrlbrk42 ctrlbrk42 added the enhancement New feature or request label Jan 4, 2024
@ctrlbrk42
Copy link
Author

I found TOKEN_EXPIRY and am trying that, I didn't see initially (I keep having trouble not finding the docs to your project).

docker env:
TOKEN_EXPIRY: 5184000 # 60-days

@enchant97
Copy link
Owner

There is currently no way to integrate with other auth mechanisms. TOKEN_EXPIRY is a suitable way of increasing the limit.

I keep having trouble not finding the docs to your project

Not sure how, it's linked in the project README and added as the project website in the about section. Here's a link as well: https://notemark.docs.enchantedcode.co.uk/docs/

@ctrlbrk42
Copy link
Author

ctrlbrk42 commented Jan 5, 2024 via email

@enchant97
Copy link
Owner

It only accepts the number of seconds until expiry and cannot currently be disabled.

How do you currently provide authentication through your reverse proxy?

In the future I plan to add external authentication via OAuth2, since this is what the app uses internally already.

@ctrlbrk42
Copy link
Author

For something like this, I'm just using basic auth in caddy since it doesn't have anything super sensitive.

Thanks for responding.

@wurst44
Copy link

wurst44 commented Oct 4, 2024

It would be really nice to be able to disable authentication when using proxies with Authentik or Authelia which can do forward auth or domain specific authentication already. Don't know about the user selection, it seems that we may need to be able to configure a default one?

Of course this would be a quick fix for a more general SAML or OIDC SSO implementation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants