summaryrefslogtreecommitdiff
path: root/roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j2
diff options
context:
space:
mode:
Diffstat (limited to 'roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j2')
-rw-r--r--roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j231
1 files changed, 31 insertions, 0 deletions
diff --git a/roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j2 b/roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j2
new file mode 100644
index 00000000..e2464f6f
--- /dev/null
+++ b/roles/nginx/auth/sso/backend/templates/nginx-sso@.service.j2
@@ -0,0 +1,31 @@
+[Unit]
+Description=Nginx SSO authentication daemon (%I)
+
+[Service]
+Restart=on-failure
+ExecStart=/usr/bin/nginx-sso --config /etc/nginx/auth/sso/%i.yml --frontend-dir /usr/share/nginx-sso/frontend
+ExecReload=/bin/kill -HUP $MAINPID
+
+# systemd hardening-options
+AmbientCapabilities=
+CapabilityBoundingSet=
+DeviceAllow=/dev/null rw
+DevicePolicy=strict
+LockPersonality=true
+MemoryDenyWriteExecute=true
+NoNewPrivileges=true
+PrivateDevices=true
+PrivateTmp=true
+PrivateUsers=true
+ProtectControlGroups=true
+ProtectHome=true
+ProtectKernelModules=true
+ProtectKernelTunables=true
+ProtectSystem=full
+RemoveIPC=true
+RestrictNamespaces=true
+RestrictRealtime=true
+SystemCallArchitectures=native
+
+[Install]
+WantedBy=multi-user.target