Admin

In some jurisdictions, imprints are not mandatory. If you leave this field blank, the footer will show no link to the imprint.
  • Open – New users can register on enabled authentication backends (Password, FediAuth).
  • Invite Only – Users on active authentication backends can still log in, but new users can only join with invitation.
  • Closed – Users on active authentication backends can still log in.
Name Active Admin Mod Controls

Authentication Backends

Configure how users can authenticate to your instance. You can enable multiple authentication methods.

Registrations: Open – New users can register on enabled authentication backends (Password, FediAuth). (Change this setting in the Settings tab)

Username/Password

Enable username/password authentication. When enabled, users can register new accounts and log in with credentials stored in the database.

FediAuth

Allow users to authenticate using their existing Fediverse accounts (Mastodon, Pleroma, Pixelfed, etc.). Users receive a verification PIN via direct message to their Fediverse account. Default Fediverse server URL (users can specify their own) Number of digits in the verification PIN How long the PIN remains valid

LDAP

Connect to an LDAP server to authenticate users with their existing directory credentials.

Registration Page Settings

Configure how this backend appears on the registration page. Users cannot self-register with LDAP, but you can show instructions on how to get an account.
SVG preferred, PNG/JPG/WebP also supported. Max 250KB.
Markdown allowed. Explain how users can get an account.

LDAP

Use your community account

Technical Settings

Hostname or IP address of your LDAP server Select standard LDAP/LDAPS or specify a custom port The sub-root you want to search for users inside your LDAP directory tree (e.g., ou=users,dc=example,dc=com) Service account for LDAP queries (optional for anonymous bind) Password for the bind DN service account LDAP filter to find users. {username} will be replaced with login name LDAP attribute containing the email address

Instance following

Use this to replicate the items of other instances onto your instance. You can request replication of other servers by using Follow Instance. Under Following instance, you can answer requests from other instances to follow your instance.

Follower Instance0
Following Instance0
Choose a location for this instance. Items that are absurdly far away from this location will neither be processed nor displayed by this instance.
Detect your current position with button, choose a city from dropdown or click on the map.

Startpage

About
Featured
Local
All
Clicking a box chooses between active (green) and deactivated (yellow) tab view. Drag and Drop moves boxes to set position of tabs.

Units

Set allowed currencies for item creation via a comma-separated list. No input results in a free-text field.

Blocking

Use this to block users or entire instances from communicating with your instance. It is wise to whenever possible only block single users instance-wide. A valid reason for blocking a whole instance might be jurisdiction-wise incompatibilities with another instance.

Use this to upload a CSV-File containing many domains to block. Several blocklists are provided to the public in this format. The first column in the blocklist must contain the domain.

Blocked Instances
Blocked Users