You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/administration/permissions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
NetBox v2.9 introduced a new object-based permissions framework, which replace's Django's built-in permissions model. Object-based permissions enable an administrator to grant users or groups the ability to perform an action on arbitrary subsets of objects in NetBox, rather than all objects of a certain type. For example, it is possible to grant a user permission to view only sites within a particular region, or to modify only VLANs with a numeric ID within a certain range.
Copy file name to clipboardExpand all lines: docs/administration/replicating-netbox.md
-11Lines changed: 0 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,14 +71,3 @@ To extract the saved archive into a new installation, run the following from the
71
71
```no-highlight
72
72
tar -xf netbox_media.tar.gz
73
73
```
74
-
75
-
---
76
-
77
-
## Cache Invalidation
78
-
79
-
If you are migrating your instance of NetBox to a different machine, be sure to first invalidate the cache on the original instance by issuing the `invalidate all` management command (within the Python virtual environment):
Copy file name to clipboardExpand all lines: docs/configuration/optional-settings.md
+56Lines changed: 56 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -490,6 +490,14 @@ NetBox can be configured to support remote user authentication by inferring user
490
490
491
491
---
492
492
493
+
## REMOTE_AUTH_GROUP_SYNC_ENABLED
494
+
495
+
Default: `False`
496
+
497
+
NetBox can be configured to sync remote user groups by inferring user authentication from an HTTP header set by the HTTP reverse proxy (e.g. nginx or Apache). Set this to `True` to enable this functionality. (Local authentication will still take effect as a fallback.) (Requires `REMOTE_AUTH_ENABLED`.)
498
+
499
+
---
500
+
493
501
## REMOTE_AUTH_HEADER
494
502
495
503
Default: `'HTTP_REMOTE_USER'`
@@ -498,6 +506,54 @@ When remote user authentication is in use, this is the name of the HTTP header w
498
506
499
507
---
500
508
509
+
## REMOTE_AUTH_GROUP_HEADER
510
+
511
+
Default: `'HTTP_REMOTE_USER_GROUP'`
512
+
513
+
When remote user authentication is in use, this is the name of the HTTP header which informs NetBox of the currently authenticated user. For example, to use the request header `X-Remote-User-Groups` it needs to be set to `HTTP_X_REMOTE_USER_GROUPS`. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
514
+
515
+
---
516
+
517
+
## REMOTE_AUTH_SUPERUSER_GROUPS
518
+
519
+
Default: `[]` (Empty list)
520
+
521
+
The list of groups that promote an remote User to Superuser on Login. If group isn't present on next Login, the Role gets revoked. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
522
+
523
+
---
524
+
525
+
## REMOTE_AUTH_SUPERUSERS
526
+
527
+
Default: `[]` (Empty list)
528
+
529
+
The list of users that get promoted to Superuser on Login. If user isn't present in list on next Login, the Role gets revoked. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
530
+
531
+
---
532
+
533
+
## REMOTE_AUTH_STAFF_GROUPS
534
+
535
+
Default: `[]` (Empty list)
536
+
537
+
The list of groups that promote an remote User to Staff on Login. If group isn't present on next Login, the Role gets revoked. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
538
+
539
+
---
540
+
541
+
## REMOTE_AUTH_STAFF_USERS
542
+
543
+
Default: `[]` (Empty list)
544
+
545
+
The list of users that get promoted to Staff on Login. If user isn't present in list on next Login, the Role gets revoked. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
546
+
547
+
---
548
+
549
+
## REMOTE_AUTH_GROUP_SEPARATOR
550
+
551
+
Default: `|` (Pipe)
552
+
553
+
The Seperator upon which `REMOTE_AUTH_GROUP_HEADER` gets split into individual Groups. This needs to be coordinated with your authentication Proxy. (Requires `REMOTE_AUTH_ENABLED` and `REMOTE_AUTH_GROUP_SYNC_ENABLED` )
Copy file name to clipboardExpand all lines: docs/core-functionality/device-types.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# Device Types
2
2
3
-
{!docs/models/dcim/devicetype.md!}
4
-
{!docs/models/dcim/manufacturer.md!}
3
+
{!models/dcim/devicetype.md!}
4
+
{!models/dcim/manufacturer.md!}
5
5
6
6
---
7
7
@@ -30,11 +30,11 @@ Once component templates have been created, every new device that you create as
30
30
!!! note
31
31
Assignment of components from templates occurs only at the time of device creation. If you modify the templates of a device type, it will not affect devices which have already been created. However, you always have the option of adding, modifying, or deleting components on existing devices.
0 commit comments