diff --git a/template.env b/template.env index 8cdeb23..5a13322 100644 --- a/template.env +++ b/template.env @@ -2,8 +2,8 @@ # Build-time variables ## -CORE_TAG=v2.4.193 -MODULES_TAG=v2.4.193 +CORE_TAG=v2.4.194 +MODULES_TAG=v2.4.194 PHP_VER=20190902 LIBFAUP_COMMIT=3a26d0a @@ -106,14 +106,16 @@ SYNCSERVERS_1_KEY= # OIDC_DEFAULT_ORG= # Enable LDAP (using the ApacheSecureAuth component) authentication, according to https://github.com/MISP/MISP/issues/6189 -# NOTE: Once you enable LDAP authentication with the ApacheSecureAuth component, users should not be able to control the HTTP header configured in LDAP_APACHE_ENV (e.g. REMOTE_USER). -# This means you must not allow direct access to MISP. +# NOTE: Once you enable LDAP authentication with the ApacheSecureAuth component, +# users should not be able to control the HTTP header configured in LDAP_APACHE_ENV +# (e.g. REMOTE_USER), this means you must not allow direct access to MISP. +# NOTE 2: You need to escape special characters twice, e.g., "pass\word" becomes "pass\\\\word". # LDAP_ENABLE=true # LDAP_APACHE_ENV="REMOTE_USER" # LDAP_SERVER="ldap://your_domain_controller" # LDAP_STARTTLS=true # LDAP_READER_USER="CN=service_account_name,OU=Users,DC=domain,DC=net" -# LDAP_READER_PASSWORD="password" # Doubly escape necessary special characters inside the password. E.g. literal "pass\word" should be escaped as "pass\\\\word" +# LDAP_READER_PASSWORD="password" # LDAP_DN="OU=Users,DC=domain,DC=net" # LDAP_SEARCH_FILTER="" # LDAP_SEARCH_ATTRIBUTE="uid"