prosody-mod-auth-matrix-user-verification

Matrix user verification auth for Prosody (by matrix-org)

Prosody-mod-auth-matrix-user-verification Alternatives

Similar projects and alternatives to prosody-mod-auth-matrix-user-verification

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better prosody-mod-auth-matrix-user-verification alternative or higher similarity.

prosody-mod-auth-matrix-user-verification reviews and mentions

Posts with mentions or reviews of prosody-mod-auth-matrix-user-verification. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-26.
  • black screen after deploy jitsi docker [HELP]
    1 project | /r/jitsi | 25 May 2022
    # shellcheck disable=SC2034 # Security # # Set these to strong passwords to avoid intruders from impersonating a service account # The service(s) won't start unless these are specified # Running ./gen-passwords.sh will update .env with strong passwords # You may skip the Jigasi and Jibri passwords if you are not using those # DO NOT reuse passwords # # XMPP password for Jicofo client connections JICOFO_AUTH_PASSWORD=4649c532b90811ca4625f6b35569ef28 # XMPP password for JVB client connections JVB_AUTH_PASSWORD=546a242e036677d2a4abbe8950b5713d # XMPP password for Jigasi MUC client connections JIGASI_XMPP_PASSWORD=411b401885b74a89bd2df5ae07587267 # XMPP recorder password for Jibri client connections JIBRI_RECORDER_PASSWORD=c05cb90478902293101782c934ed4e5c # XMPP password for Jibri client connections JIBRI_XMPP_PASSWORD=1bad9e65e0a5797da545c133db49ca0d # # Basic configuration options # # Directory where all configuration will be stored CONFIG=~/.jitsi-meet-cfg # Exposed HTTP port HTTP_PORT=8072 # Exposed HTTPS port HTTPS_PORT=8449 # System time zone TZ=America/La_Paz # Public URL for the web service (required) PUBLIC_URL=https://salavirtual.drguery.com # IP address of the Docker host # See the "Running behind NAT or on a LAN environment" section in the Handbook: # https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-docker#running-behind-nat-or-on-a-lan-environment DOCKER_HOST_ADDRESS=192.168.2.5 # Control whether the lobby feature should be enabled or not ENABLE_LOBBY=1 # Control whether the A/V moderation should be enabled or not #ENABLE_AV_MODERATION=1 # Show a prejoin page before entering a conference ENABLE_PREJOIN_PAGE=1 # Enable the welcome page ENABLE_WELCOME_PAGE=1 # Enable the close page #ENABLE_CLOSE_PAGE=0 # Disable measuring of audio levels #DISABLE_AUDIO_LEVELS=0 # Enable noisy mic detection ENABLE_NOISY_MIC_DETECTION=1 # Enable breakout rooms #ENABLE_BREAKOUT_ROOMS=1 # # Let's Encrypt configuration # # Enable Let's Encrypt certificate generation #ENABLE_LETSENCRYPT=1 # Domain for which to generate the certificate #LETSENCRYPT_DOMAIN=meet.example.com # E-Mail for receiving important account notifications (mandatory) #[email protected] # Use the staging server (for avoiding rate limits while testing) #LETSENCRYPT_USE_STAGING=1 # # Etherpad integration (for document sharing) # # Set etherpad-lite URL in docker local network (uncomment to enable) #ETHERPAD_URL_BASE=http://etherpad.meet.jitsi:9001 # Set etherpad-lite public URL, including /p/ pad path fragment (uncomment to enable) #ETHERPAD_PUBLIC_URL=https://etherpad.my.domain/p/ # Name your etherpad instance! ETHERPAD_TITLE=Video Chat # The default text of a pad ETHERPAD_DEFAULT_PAD_TEXT="Welcome to Web Chat!\n\n" # Name of the skin for etherpad ETHERPAD_SKIN_NAME=colibris # Skin variants for etherpad ETHERPAD_SKIN_VARIANTS="super-light-toolbar super-light-editor light-background full-width-editor" # # Basic Jigasi configuration options (needed for SIP gateway support) # # SIP URI for incoming / outgoing calls #[email protected] # Password for the specified SIP account as a clear text #JIGASI_SIP_PASSWORD=passw0rd # SIP server (use the SIP account domain if in doubt) #JIGASI_SIP_SERVER=sip2sip.info # SIP server port #JIGASI_SIP_PORT=5060 # SIP server transport #JIGASI_SIP_TRANSPORT=UDP # # Authentication configuration (see handbook for details) # # Enable authentication #ENABLE_AUTH=1 # Enable guest access #ENABLE_GUESTS=1 # Select authentication type: internal, jwt, ldap or matrix #AUTH_TYPE=internal # JWT authentication # # Application identifier #JWT_APP_ID=my_jitsi_app_id # Application secret known only to your token generator #JWT_APP_SECRET=my_jitsi_app_secret # (Optional) Set asap_accepted_issuers as a comma separated list #JWT_ACCEPTED_ISSUERS=my_web_client,my_app_client # (Optional) Set asap_accepted_audiences as a comma separated list #JWT_ACCEPTED_AUDIENCES=my_server1,my_server2 # LDAP authentication (for more information see the Cyrus SASL saslauthd.conf man page) # # LDAP url for connection #LDAP_URL=ldaps://ldap.domain.com/ # LDAP base DN. Can be empty #LDAP_BASE=DC=example,DC=domain,DC=com # LDAP user DN. Do not specify this parameter for the anonymous bind #LDAP_BINDDN=CN=binduser,OU=users,DC=example,DC=domain,DC=com # LDAP user password. Do not specify this parameter for the anonymous bind #LDAP_BINDPW=LdapUserPassw0rd # LDAP filter. Tokens example: # %1-9 - if the input key is [email protected], then %1 is com, %2 is domain and %3 is mail # %s - %s is replaced by the complete service string # %r - %r is replaced by the complete realm string #LDAP_FILTER=(sAMAccountName=%u) # LDAP authentication method #LDAP_AUTH_METHOD=bind # LDAP version #LDAP_VERSION=3 # LDAP TLS using #LDAP_USE_TLS=1 # List of SSL/TLS ciphers to allow #LDAP_TLS_CIPHERS=SECURE256:SECURE128:!AES-128-CBC:!ARCFOUR-128:!CAMELLIA-128-CBC:!3DES-CBC:!CAMELLIA-128-CBC # Require and verify server certificate #LDAP_TLS_CHECK_PEER=1 # Path to CA cert file. Used when server certificate verify is enabled #LDAP_TLS_CACERT_FILE=/etc/ssl/certs/ca-certificates.crt # Path to CA certs directory. Used when server certificate verify is enabled #LDAP_TLS_CACERT_DIR=/etc/ssl/certs # Wether to use starttls, implies LDAPv3 and requires ldap:// instead of ldaps:// # LDAP_START_TLS=1 # Matrix authentication (for more information see the documention of the "Prosody Auth Matrix User Verification" at https://github.com/matrix-org/prosody-mod-auth-matrix-user-verification) # # Base URL to the matrix user verification service (without ending slash) #MATRIX_UVS_URL=https://uvs.example.com:3000 # (optional) The issuer of the auth token to be passed through. Must match what is being set as `iss` in the JWT. Defaut value is "issuer". #MATRIX_UVS_ISSUER=issuer # (optional) user verification service auth token, if authentication enabled #MATRIX_UVS_AUTH_TOKEN=changeme # (optional) Make Matrix room moderators owners of the Prosody room. #MATRIX_UVS_SYNC_POWER_LEVELS=1 # # Advanced configuration options (you generally don't need to change these) # # Internal XMPP domain XMPP_DOMAIN=meet.jitsi # Internal XMPP server XMPP_SERVER=xmpp.meet.jitsi # Internal XMPP server c2s port #XMPP_PORT=5222 # Internal XMPP server URL XMPP_BOSH_URL_BASE=http://xmpp.meet.jitsi:5280 # Internal XMPP domain for authenticated services XMPP_AUTH_DOMAIN=auth.meet.jitsi # XMPP domain for the MUC XMPP_MUC_DOMAIN=muc.meet.jitsi # XMPP domain for the internal MUC used for jibri, jigasi and jvb pools XMPP_INTERNAL_MUC_DOMAIN=internal-muc.meet.jitsi # XMPP domain for unauthenticated users XMPP_GUEST_DOMAIN=guest.meet.jitsi # Custom Prosody modules for XMPP_DOMAIN (comma separated) XMPP_MODULES= # Custom Prosody modules for MUC component (comma separated) XMPP_MUC_MODULES= # Custom Prosody modules for internal MUC component (comma separated) XMPP_INTERNAL_MUC_MODULES= # MUC for the JVB pool JVB_BREWERY_MUC=jvbbrewery # XMPP user for JVB client connections JVB_AUTH_USER=jvb # STUN servers used to discover the server's public IP JVB_STUN_SERVERS=meet-jit-si-turnrelay.jitsi.net:443 # Media port for the Jitsi Videobridge JVB_PORT=10000 # XMPP user for Jicofo client connections. # NOTE: this option doesn't currently work due to a bug JICOFO_AUTH_USER=focus # Base URL of Jicofo's reservation REST API #JICOFO_RESERVATION_REST_BASE_URL=http://reservation.example.com # Enable Jicofo's health check REST API (http://:8888/about/health) #JICOFO_ENABLE_HEALTH_CHECKS=true # XMPP user for Jigasi MUC client connections JIGASI_XMPP_USER=jigasi # MUC name for the Jigasi pool JIGASI_BREWERY_MUC=jigasibrewery # Minimum port for media used by Jigasi JIGASI_PORT_MIN=20000 # Maximum port for media used by Jigasi JIGASI_PORT_MAX=20050 # Enable SDES srtp #JIGASI_ENABLE_SDES_SRTP=1 # Keepalive method #JIGASI_SIP_KEEP_ALIVE_METHOD=OPTIONS # Health-check extension #JIGASI_HEALTH_CHECK_SIP_URI=keepalive # Health-check interval #JIGASI_HEALTH_CHECK_INTERVAL=300000 # # Enable Jigasi transcription #ENABLE_TRANSCRIPTIONS=1 # Jigasi will record audio when transcriber is on [default: false] #JIGASI_TRANSCRIBER_RECORD_AUDIO=true # Jigasi will send transcribed text to the chat when transcriber is on [default: false] #JIGASI_TRANSCRIBER_SEND_TXT=true # Jigasi will post an url to the chat with transcription file [default: false] #JIGASI_TRANSCRIBER_ADVERTISE_URL=true # Credentials for connect to Cloud Google API from Jigasi # Please read https://cloud.google.com/text-to-speech/docs/quickstart-protocol # section "Before you begin" paragraph 1 to 5 # Copy the values from the json to the related env vars #GC_PROJECT_ID= #GC_PRIVATE_KEY_ID= #GC_PRIVATE_KEY= #GC_CLIENT_EMAIL= #GC_CLIENT_ID= #GC_CLIENT_CERT_URL= # Enable recording #ENABLE_RECORDING=1 # XMPP domain for the jibri recorder XMPP_RECORDER_DOMAIN=recorder.meet.jitsi # XMPP recorder user for Jibri client connections JIBRI_RECORDER_USER=recorder # Directory for recordings inside Jibri container JIBRI_RECORDING_DIR=/config/recordings # The finalizing script. Will run after recording is complete #JIBRI_FINALIZE_RECORDING_SCRIPT_PATH=/config/finalize.sh # XMPP user for Jibri client connections JIBRI_XMPP_USER=jibri # MUC name for the Jibri pool JIBRI_BREWERY_MUC=jibribrewery # MUC connection timeout JIBRI_PENDING_TIMEOUT=90 # When jibri gets a request to start a service for a room, the room # jid will look like: [email protected]_domain # We'll build the url for the call by transforming that into: # https://xmpp_domain/subdomain/roomName # So if there are any prefixes in the jid (like jitsi meet, which # has its participants join a muc at conference.xmpp_domain) then # list that prefix here so it can be stripped out to generate # the call url correctly JIBRI_STRIP_DOMAIN_JID=muc # Directory for logs inside Jibri container JIBRI_LOGS_DIR=/config/logs # Configure an external TURN server # TURN_CREDENTIALS=secret # TURN_HOST=turnserver.example.com # TURN_PORT=443 # TURNS_HOST=turnserver.example.com # TURNS_PORT=443 # Disable HTTPS: handle TLS connections outside of this setup #DISABLE_HTTPS=1 # Enable FLoC # Opt-In to Federated Learning of Cohorts tracking #ENABLE_FLOC=0 # Redirect HTTP traffic to HTTPS # Necessary for Let's Encrypt, relies on standard HTTPS port (443) #ENABLE_HTTP_REDIRECT=1 # Send a `strict-transport-security` header to force browsers to use # a secure and trusted connection. Recommended for production use. # Defaults to 1 (send the header). # ENABLE_HSTS=1 # Enable IPv6 # Provides means to disable IPv6 in environments that don't support it (get with the times, people!) #ENABLE_IPV6=1 # Container restart policy # Defaults to unless-stopped RESTART_POLICY=unless-stopped # Authenticate using external service or just focus external auth window if there is one already. # TOKEN_AUTH_URL=https://auth.meet.example.com/{room} # Sentry Error Tracking # Sentry Data Source Name (Endpoint for Sentry project) # Example: https://public:private@host:port/1 #JVB_SENTRY_DSN= #JICOFO_SENTRY_DSN= #JIGASI_SENTRY_DSN= # Optional environment info to filter events #SENTRY_ENVIRONMENT=production # Optional release info to filter events #SENTRY_RELEASE=1.0.0 # Optional properties for shutdown api #COLIBRI_REST_ENABLED=true #SHUTDOWN_REST_ENABLED=true # Configure toolbar buttons. Add the buttons name separated with comma(no spaces between comma) #TOOLBAR_BUTTONS= # Hide the buttons at pre-join screen. Add the buttons name separated with comma #HIDE_PREMEETING_BUTTONS= ```
  • Self hosted Jitsi with JWT token support
    2 projects | /r/matrixdotorg | 26 Jun 2021
    I am trying to setup Jitsi authenticating with matrix using this code. The first requirement for this to work is to run Matrix user verification service.

Stats

Basic prosody-mod-auth-matrix-user-verification repo stats
2
23
2.7
5 months ago

matrix-org/prosody-mod-auth-matrix-user-verification is an open source project licensed under Apache License 2.0 which is an OSI approved license.

The primary programming language of prosody-mod-auth-matrix-user-verification is Lua.


Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com