Some minor corrections
Dieser Commit ist enthalten in:
Ursprung
74ecec967b
Commit
08fd44e994
4 geänderte Dateien mit 11 neuen und 13 gelöschten Zeilen
|
@ -1,3 +1,5 @@
|
|||
Edit a domain as (domain) administrator to add an item to the filter table.
|
||||
To add or edit an entry to your **domain wide** filter table, login to your *mailcow UI* as (domain) administrator.
|
||||
|
||||
![Black- and Whitelist configuration](images/bl_wl.png)
|
||||
|
||||
Beware that a mailbox user can login to mailcow and override a domain policy filter item.
|
||||
|
|
BIN
docs/images/bl_wl.png
Normale Datei
BIN
docs/images/bl_wl.png
Normale Datei
Binäre Datei nicht angezeigt.
Nachher Breite: | Höhe: | Größe: 12 KiB |
|
@ -1,6 +1,6 @@
|
|||
mailcow dockerized comes with a snakeoil CA "mailcow" and a server certificate in `data/assets/ssl`. Please use your own trusted certificates.
|
||||
|
||||
mailcow uses 3 domain names that should be covered by your new certificate:
|
||||
mailcow uses **at least** 3 domain names that should be covered by your new certificate:
|
||||
|
||||
- ${MAILCOW_HOSTNAME}
|
||||
- autodiscover.**example.org**
|
||||
|
@ -35,7 +35,7 @@ certbot certonly \
|
|||
```
|
||||
|
||||
**Remember to replace the example.org domain with your own domain, this command will not work if you dont.**
|
||||
|
||||
|
||||
4\. Create hard links to the full path of the new certificates. Assuming you are still in the mailcow root folder:
|
||||
``` bash
|
||||
mv data/assets/ssl/cert.{pem,pem.backup}
|
||||
|
|
16
docs/tfa.md
16
docs/tfa.md
|
@ -1,14 +1,10 @@
|
|||
So far three methods for TFA are implemented.
|
||||
So far three methods for *Two Factor Authentication* are implemented: U2F, Yubi OTP, and TOTP
|
||||
|
||||
FOr U2F to work, you need an encrypted connection to the server (HTTPS) as well as a FIDO security key.
|
||||
|
||||
Both U2F and Yubi OTP work well with the fantastic [Yubikey](https://www.yubico.com).
|
||||
|
||||
While Yubi OTP needs an active internet connection and an API ID + key, U2F will work with any FIDO U2F USB key out of the box, but can only be used when mailcow is accessed over HTTPS.
|
||||
|
||||
U2F and Yubi OTP support multiple keys per user.
|
||||
|
||||
As the third TFA method mailcow uses TOTP: time-based one-time passwords. Those psaswords can be generated with apps like "Google Authenticator" after initially scanning a QR code or entering the given secret manually.
|
||||
- For U2F to work, you need an encrypted connection to the server (HTTPS) as well as a FIDO security key.
|
||||
- Both U2F and Yubi OTP work well with the fantastic [Yubikey](https://www.yubico.com).
|
||||
- While Yubi OTP needs an active internet connection and an API ID + key, U2F will work with any FIDO U2F USB key out of the box, but can only be used when mailcow is accessed over HTTPS.
|
||||
- U2F and Yubi OTP support multiple keys per user.
|
||||
- As the third TFA method mailcow uses TOTP: time-based one-time passwords. Those psaswords can be generated with apps like "Google Authenticator" after initially scanning a QR code or entering the given secret manually.
|
||||
|
||||
As administrator you are able to temporary disable a domain administrators TFA login until they successfully logged in.
|
||||
|
||||
|
|
Laden …
In neuem Issue referenzieren