diff --git a/.mkdocs.yml b/.mkdocs.yml index 07b0332..71c1c77 100644 --- a/.mkdocs.yml +++ b/.mkdocs.yml @@ -69,6 +69,7 @@ nav: - reference/auth/ldap.md - reference/auth/dovecot_sasl.md - reference/auth/plain_separate.md + - reference/auth/netauth.md - reference/config-syntax.md - Integration with software: - third-party/dovecot.md diff --git a/docs/reference/auth/netauth.md b/docs/reference/auth/netauth.md new file mode 100644 index 0000000..84458e4 --- /dev/null +++ b/docs/reference/auth/netauth.md @@ -0,0 +1,47 @@ +# Native NetAuth + +maddy supports authentication via NetAuth using direct entity +authentication checks. Passwords are verified by the NetAuth server. + +maddy needs to know the Entity ID to use for authentication. It must +match the string the user provides for the Local Atom part of their +mail address. + +Note that storage backends conventionally use email addresses. Since +NetAuth recommends *nix compatible usernames, you will need to map the +email identifiers to NetAuth Entity IDs using auth\_map (see +documentation page for used storage backend). + +auth.netauth also can be used as a table module. This way you can +check whether the account exists. + +Note that the configuration fragment provided below is very sparse. +This is because NetAuth expects to read most of its common +configuration values from the system NetAuth config file located at +`/etc/netauth/config.toml`. + +``` +auth.netauth { + require_group "maddy-users" + debug off +} +``` + +``` +auth.netauth {} +``` + +## Configuration directives + +**Syntax:** require\_group _group_ + +OPTIONAL. + +Group that entities must posess to be able to use maddy services. +This can be used to provide email to just a subset of the entities +present in NetAuth. + +**Syntax** debug off
+debug on
+debug off
+**Default:** off