Skip to content

Advanced

This page covers configuration that is not necessary for a regular operator but allows fine-tuning of server behaviour.

advanced

This section holds configuration that will change the general behavior of the server.

KeyTypeDescriptionRequired
Default
invitationobjectInvitation token settings. See advanced.invitation.YES
jwtobjectYES
keys-generation-strategystringYES
autoincrement
user-merging-strategystringDeprecated — replaced by auth.user-merging-enabled.YES
by-mail
validation-codeobjectSee advanced.validation-code.YES

advanced.hash

KeyTypeDescriptionRequired
Default
block-sizeintYES
8
cost-parameterintYES
16384
key-lengthintNumber of bytes generated as output of the hashing algorithm.YES
32
parallelization-parameterintYES
1
salt-lengthintNumber of random bytes to generate and then use as a salt for the hashing algorithm.YES
256

advanced.invitation

Configuration for invitation token generation and expiration.

KeyTypeDescriptionRequired
Default
default-expirationdurationDefault validity period when no expires_at is provided at creation.YES
7d
max-expirationdurationMaximum allowed validity period. expires_at values beyond this limit are capped.YES
30d
token-lengthintNumber of random bytes for token generation (before base64url encoding).YES
32

advanced.invitation.hash

Scrypt parameters for hashing invitation tokens. Follows the same structure as advanced.hash.

KeyTypeDescriptionRequired
Default
block-sizeintScrypt block size parameter (r).YES
8
cost-parameterintScrypt CPU/memory cost parameter (N).YES
16384
key-lengthintNumber of bytes generated as output of the hashing algorithm.YES
32
parallelization-parameterintScrypt parallelization parameter (p).YES
1
salt-lengthintNumber of random bytes to generate and then use as a salt for the hashing algorithm.YES
256

advanced.jwt

KeyTypeDescriptionRequired
Default
access-algstringAlgorithm used to sign access tokens. The algorithm MUST be asymmetric and support a public key. Access tokens are signed with a dedicated key, separate from ID tokens per RFC 9068.YES
rs256
public-algstringAlgorithm used to sign ID tokens and other keys shared publicly. The algorithm MUST be asymmetric and support a public key.YES
rs256
private-algstringAlgorithm used to encrypt internal keys. The algorithm only have to support public key.YES
rs256

advanced.validation-code

KeyTypeDescriptionRequired
Default
expirationdurationDuration, after the validation code has been generated, where the server will accept it.YES
10m
lengthintNumber of digit expected in validation code generate by this authorization server.YES
6
resend-delaydurationDuration the end-user has to wait before being able to request a new validation code to be sent.YES
1m