Some minor doc updates
This commit is contained in:
@@ -5,7 +5,7 @@ title: Local Doors
|
||||
## Local Doors
|
||||
ENiGMA½ has many ways to add doors to your system. In addition to the [many built in door server modules](door-servers.md), local doors are of course also supported using the ! The `abracadabra` module!
|
||||
|
||||
:information_source: See also [Let’s add a DOS door to Enigma½ BBS](https://medium.com/retro-future/lets-add-a-dos-game-to-enigma-1-2-41f257deaa3c) by Robbie Whiting for a great writeup on adding doors!
|
||||
> :information_source: See also [Let’s add a DOS door to Enigma½ BBS](https://medium.com/retro-future/lets-add-a-dos-game-to-enigma-1-2-41f257deaa3c) by Robbie Whiting for a great writeup on adding doors!
|
||||
|
||||
## The abracadabra Module
|
||||
The `abracadabra` module provides a generic and flexible solution for many door types. Through this module you can execute native processes & scripts directly, and perform I/O through standard I/O (stdio) or a temporary TCP server.
|
||||
|
||||
@@ -5,7 +5,7 @@ title: 2FA/OTP Config
|
||||
## The 2FA/OTP Config Module
|
||||
The `user_2fa_otp_config` module provides opt-in, configuration, and viewing of Two-Factor Authentication via One-Time-Password (2FA/OTP) settings. In order to allow users access to 2FA/OTP, the system must be properly configured. See [Security](../configuration/security.md) for more information.
|
||||
|
||||
:information_source: By default, the 2FA/OTP configuration menu may only be accessed by users connected securely (ACS `SC`). It is highly recommended to leave this default as accessing these settings over a plain-text connection could expose private secrets!
|
||||
> :information_source: By default, the 2FA/OTP configuration menu may only be accessed by users connected securely (ACS `SC`). It is highly recommended to leave this default as accessing these settings over a plain-text connection could expose private secrets!
|
||||
|
||||
## Configuration
|
||||
|
||||
|
||||
@@ -16,7 +16,7 @@ The system allows any user with the proper security to access the WFC / system o
|
||||
3. User ID of 1 (root/admin)
|
||||
4. The user belongs to the `wfc` group.
|
||||
|
||||
> :information_source: Due to the above, the WFC screen is **disabled** by default as at a minimum, you'll need to add your user to the `wfc` group.
|
||||
> :information_source: Due to the above, the WFC screen is **disabled** by default as at a minimum, you'll need to add your user to the `wfc` group. See also [Security](../configuration/security.md) for more information on keeping your system secure!
|
||||
|
||||
To change the ACS required, specify a alternative `acs` in the `config` block. For example:
|
||||
```hjson
|
||||
@@ -28,7 +28,7 @@ mainMenuWaitingForCaller: {
|
||||
}
|
||||
```
|
||||
|
||||
> :notebook: ENiGMA½ will enforce ACS of at least `SC` (secure connection)
|
||||
> :lock: ENiGMA½ will enforce ACS of at least `SC` (secure connection)
|
||||
|
||||
## Theming
|
||||
The following MCI codes are available:
|
||||
|
||||
@@ -19,5 +19,5 @@ The following `itemFormat` object is provided to MCI 1 (ie: `%VM1`):
|
||||
* `isSecure`: Is the client securely connected?
|
||||
* `serverName`: Name of connected server such as "Telnet" or "SSH".
|
||||
|
||||
:information_source: These properties are available via the `client_connections.js` `getActiveConnectionList()` API.
|
||||
> :information_source: These properties are available via the `client_connections.js` `getActiveConnectionList()` API.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user