mirror of
https://github.com/ansible/awx.git
synced 2026-02-12 15:14:45 -03:30
Comment out some settings tougher to implement
Specifically ldap and radius
This commit is contained in:
@@ -724,41 +724,41 @@ TOWER_SETTINGS_MANIFEST = {
|
||||
"default": AUTH_TOKEN_PER_USER,
|
||||
"category": "authentication",
|
||||
},
|
||||
"AUTH_BASIC_ENABLED": {
|
||||
"name": "Enable HTTP Basic Auth",
|
||||
"description": "Enable HTTP Basic Auth for the API Browser",
|
||||
"default": AUTH_BASIC_ENABLED,
|
||||
"type": "bool",
|
||||
"category": "authentication",
|
||||
},
|
||||
"AUTH_LDAP_SERVER_URI": {
|
||||
"name": "LDAP Server URI",
|
||||
"description": "URI Location of the LDAP Server",
|
||||
"default": AUTH_LDAP_SERVER_URI,
|
||||
"type": "string",
|
||||
"category": "authentication",
|
||||
},
|
||||
"RADIUS_SERVER": {
|
||||
"name": "Radius Server Host",
|
||||
"description": "Host to communicate with for Radius Authentication",
|
||||
"default": RADIUS_SERVER,
|
||||
"type": "string",
|
||||
"category": "authentication",
|
||||
},
|
||||
"RADIUS_PORT": {
|
||||
"name": "Radius Server Port",
|
||||
"description": "Port on the Radius host for Radius Authentication",
|
||||
"default": RADIUS_PORT,
|
||||
"type": "string",
|
||||
"category": "authentication",
|
||||
},
|
||||
"RADIUS_SECRET": {
|
||||
"name": "Radius Server Secret",
|
||||
"description": "Secret used when negotiating with the Radius server",
|
||||
"default": RADIUS_SECRET,
|
||||
"type": "string",
|
||||
"category": "authentication",
|
||||
},
|
||||
# "AUTH_BASIC_ENABLED": {
|
||||
# "name": "Enable HTTP Basic Auth",
|
||||
# "description": "Enable HTTP Basic Auth for the API Browser",
|
||||
# "default": AUTH_BASIC_ENABLED,
|
||||
# "type": "bool",
|
||||
# "category": "authentication",
|
||||
# },
|
||||
# "AUTH_LDAP_SERVER_URI": {
|
||||
# "name": "LDAP Server URI",
|
||||
# "description": "URI Location of the LDAP Server",
|
||||
# "default": AUTH_LDAP_SERVER_URI,
|
||||
# "type": "string",
|
||||
# "category": "authentication",
|
||||
# },
|
||||
# "RADIUS_SERVER": {
|
||||
# "name": "Radius Server Host",
|
||||
# "description": "Host to communicate with for Radius Authentication",
|
||||
# "default": RADIUS_SERVER,
|
||||
# "type": "string",
|
||||
# "category": "authentication",
|
||||
# },
|
||||
# "RADIUS_PORT": {
|
||||
# "name": "Radius Server Port",
|
||||
# "description": "Port on the Radius host for Radius Authentication",
|
||||
# "default": RADIUS_PORT,
|
||||
# "type": "string",
|
||||
# "category": "authentication",
|
||||
# },
|
||||
# "RADIUS_SECRET": {
|
||||
# "name": "Radius Server Secret",
|
||||
# "description": "Secret used when negotiating with the Radius server",
|
||||
# "default": RADIUS_SECRET,
|
||||
# "type": "string",
|
||||
# "category": "authentication",
|
||||
# },
|
||||
"AWX_PROOT_ENABLED": {
|
||||
"name": "Enable PRoot for Job Execution",
|
||||
"description": "Isolates an Ansible job from protected parts of the Tower system to prevent exposing sensitive information",
|
||||
|
||||
Reference in New Issue
Block a user