diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2021-06-18 11:38:01 +1000 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2021-06-18 11:38:01 +1000 | 
| commit | ef3c2faeb5a8d4ae30fa55fdaed5718e32f11364 (patch) | |
| tree | 982cb547306d93dd54b85eec5552e00f3dbdf751 /cmd/authelia | |
| parent | 438555886ee8cca96191e15bbfb6850361339cd5 (diff) | |
fix(authorization): configuration reports 2fa disabled with 2fa oidc clients (#2089)
This resolves an issue where if you have zero two_factor ACL rules but enabled two_factor OIDC clients, 2FA is reported as disabled.
Diffstat (limited to 'cmd/authelia')
| -rw-r--r-- | cmd/authelia/main.go | 2 | 
1 files changed, 1 insertions, 1 deletions
diff --git a/cmd/authelia/main.go b/cmd/authelia/main.go index 8095c74d8..d51b5e990 100644 --- a/cmd/authelia/main.go +++ b/cmd/authelia/main.go @@ -121,7 +121,7 @@ func startServer() {  	}  	clock := utils.RealClock{} -	authorizer := authorization.NewAuthorizer(config.AccessControl) +	authorizer := authorization.NewAuthorizer(config)  	sessionProvider := session.NewProvider(config.Session, autheliaCertPool)  	regulator := regulation.NewRegulator(config.Regulation, storageProvider, clock)  	oidcProvider, err := oidc.NewOpenIDConnectProvider(config.IdentityProviders.OIDC)  | 
