config/initializers/devise.rb
Line is too long. [81/80] Open
Open
# It can be set to an array that will enable params authentication only for the
- Exclude checks
Line is too long. [83/80] Open
Open
# algorithm), the cost increases exponentially with the number of stretches (e.g.
- Exclude checks
Line is too long. [83/80] Open
Open
# session. If you need permissions, you should implement that in a before filter.
- Exclude checks
Line is too long. [84/80] Open
Open
# Configure parameters from the request object used for authentication. Each entry
- Exclude checks
Line is too long. [85/80] Open
Open
# given strategies, for example, `config.params_authenticatable = [:database]` will
- Exclude checks
Line is too long. [83/80] Open
Open
# given strategies, for example, `config.http_authenticatable = [:database]` will
- Exclude checks
Line is too long. [82/80] Open
Open
# change the failure app, you can configure them inside the config.warden block.
- Exclude checks
Line is too long. [85/80] Open
Open
# modifying a user and when used to authenticate or find a user. Default is :email.
- Exclude checks
Line is too long. [83/80] Open
Open
# :time = Re-enables login after a certain amount of time (see :unlock_in below)
- Exclude checks
Line is too long. [81/80] Open
Open
# :clearance_sha1, :authlogic_sha512 (then you should set stretches above to 20
- Exclude checks
Line is too long. [81/80] Open
Open
# When using Devise inside an engine, let's call it `MyEngine`, and this engine
- Exclude checks
Line is too long. [150/80] Open
Open
# config.pepper = 'f075d41a860255d3efe1ca89b6a61641eef5e250d4aea895918c2416af2349e266e8b36dc7459844b25602d37d15b67505158f2a381c6dff63388a324d33ecd0'
- Exclude checks
Line is too long. [85/80] Open
Open
config.mailer_sender = 'please-change-me-at-config-initializers-devise@example.com'
- Exclude checks
Line is too long. [82/80] Open
Open
# Limiting the stretches to just one in testing will increase the performance of
- Exclude checks
Line is too long. [82/80] Open
Open
# Turn scoped views on. Before rendering "sessions/new", it will first check for
- Exclude checks
Line is too long. [154/80] Open
Open
# config.secret_key = '6d3251548868d2500c736a76ab4d7340c46df7663abdbf3eb8bd213a3e3208da5cb592ec65eef02b3ef17727c3dad11ac9facccc880c3232bc8410b0afef099a'
- Exclude checks
Line is too long. [83/80] Open
Open
# a value of 20 is already extremely slow: approx. 60 seconds for 1 calculation).
- Exclude checks
Line is too long. [85/80] Open
Open
# find_for_authentication method and considered in your model lookup. For instance,
- Exclude checks
Line is too long. [84/80] Open
Open
# When set to false, does not sign a user in automatically after their password is
- Exclude checks
Line is too long. [89/80] Open
Open
# The same considerations mentioned for authentication_keys also apply to request_keys.
- Exclude checks
Line is too long. [88/80] Open
Open
# if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
- Exclude checks
Line is too long. [84/80] Open
Open
# :database = Support basic authentication with authentication key + password
- Exclude checks
Line is too long. [86/80] Open
Open
# using other algorithms, it sets how many times you want the password to be hashed.
- Exclude checks
Line is too long. [86/80] Open
Open
# initial account confirmation) to be applied. Requires additional unconfirmed_email
- Exclude checks
Line is too long. [82/80] Open
Open
# a value less than 10 in other environments. Note that, for bcrypt (the default
- Exclude checks
Line is too long. [85/80] Open
Open
# :failed_attempts = Locks an account after a number of failed attempts to sign in.
- Exclude checks
Line is too long. [84/80] Open
Open
# unconfirmed_email column, and copied to email column on successful confirmation.
- Exclude checks
Line is too long. [86/80] Open
Open
# Allow you to use another hashing or encryption algorithm besides bcrypt (default).
- Exclude checks