boldbad.blogg.se

Calibre web location of calibre database
Calibre web location of calibre database






calibre web location of calibre database

End the name without a slash, otherwise a call to /calibre-web would go to nowhere. Įnter the folder you want to have Calibre-Web in ( /calibre-web instead of ^ might also works). (The local is comming on it's own) with UNDERSCORE and excact Name:Īdd the ip address and port of your Calibre-Web instance: e.g. ProxyPass ProxyPassReverse ProxyPassReverseCookiePath / /calibre-web/ RequestHeader set X-SCRIPT-NAME /calibre-web SSLCertificateKeyFile "C:\Apache24\conf\ssl\test.key" SSLCertificateFile "C:\Apache24\conf\ssl\test.crt" SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

calibre web location of calibre database

Nginx configuration for a local server listening on port 8080, mapping Calibre-Web to /calibre: Traefik 2.6.0 Example with Kobo Sync Fix Enabled.Traefik >= 2.4.1 with Authelia forward auth.If you pass a username that isn't present in the database, nothing will happen - the user must exist beforehand in order to login. In the admin configuration, check the box marked Allow Reverse Proxy Authentication, and then fill in the text box that appears with the name of the header that will contain the username. If using this feature, it's important that only the proxy is exposed to users, because if the Calibre-Web instance is at all directly exposed to traffic, then a malicious user will be able to log in as any user that exists via simply setting a header. If your reverse proxy has some kind of authentication mechanism, you can configure Calibre-Web to log users in based on headers received from the proxy. Reverse proxy configuration examples for apache, nginx and IIS (on Windows) to use Calibre-Web: Login via Header from Upstream Authentication Source








Calibre web location of calibre database