New features in 1.8.0#

This documentation applies to Piler enterprise edition 1.8.0

Revision #1

Publication date: Feb 6, 2024

Reworked the GUI using bootstrap 5.3 and vue.js 3#

Modernized the GUI using the latest bootstrap and vue.js. The new GUI is responsive, supports mobile devices, and finally we have dark mode as well.

Better CSS customization#

You can easily override any CSS formatting, eg. change colours, font types, etc.

To do that add the following to /etc/piler/config-site.php:

$config['CUSTOM_CSS'] = '<link rel="stylesheet" href="/assets/css/my.css">';

Then add your CSS definitions to /var/piler/www/assets/css/my.css file.

Inactivity timeouts#

The GUI automatically logs the current user out after 1 hour inactivity. Also the user's session expires and thus forces a logout after 2 hours.

These are both configurable variables, set the following in /etc/piler/config-site.php, and fix the values to your needs:

$config['$ESSION_INACTIVITY_TIMEOUT'] = 3600;
$config['SESSION_EXPIRY_TIMEOUT'] = 7200;

Cloudflare Turnstile#

Added support for Cloudflare Turnstile, a smart captcha alternative, with much better user experience. From their website:

"Turnstile delivers frustration-free, CAPTCHA-free web experiences to website visitors - with just a simple snippet of free code. Moreover, Turnstile stops abuse and confirms visitors are real without the data privacy concerns or awful user experience of CAPTCHAs."

See https://www.cloudflare.com/products/turnstile/ for more.

After registering a free account at Cloudflare, you may setup Turnstile. Then add the following variables to /etc/piler/config-site.php (be sure to use your values):

$config['CF_TURNSTILE_SITEKEY'] = '0x4AAAAAAAXXXX-XXXXXXXX';
$config['CF_TURNSTILE_SECRET'] = '0x4AAAAAAAXXXXYYYYYYYYYYYYYYYYY';

Authentication against Keycloak#

See https://mailpiler.com/keycloak-authentication/ for the details how to setup.

Authentication against OKTA oidc#

See https://mailpiler.com/okta-oidc-authentication/ for the details how to setup.

Authentication against linkedin#

Visit https://developer.linkedin.com/ and create an app.

You need a company linkedin page, a logo, and preferably a link to your privacy policy. Accept the legal agreement, then click "Create app"

On the "Products" page locate the "Sign In with LinkedIn using OpenID connect" product, then click on the "Request access" button.

Finally on the "Auth" tab locate the "Authorized redirect URLs for you app" settings, and type https://archive.example.com/callback-linkedin (be sure to use your archive's URL).

Edit /etc/piler/config-site.php, and add the following. Use your client id and secret values.

$config['ENABLE_LINKEDIN'] = 1;
$config['LINKEDIN_CLIENT_ID'] = 'xxxxxxxxxxxxx';
$config['LINKEDIN_CLIENT_SECRET'] = 'yyyyyyyyyyyyyy';
$config['LINKEDIN_REDIRECT_URI'] = 'https://archive.example.com/callback-linkedin';