Authenticator 
			Local
Example Usage
authenticatorType: local
authenticatorOpts:
  users:
    foouser: $2a$10$zsvMZ7nEYo4jJJxgb5FpH.izPH37LsuLBXPbuKH4MPF4sihFSG6bW
    baruser: $2a$10$srGqC9g46xaRXbueLk5kDuSuDM6h2EpC.MTRiVaij6s/jcsKQ6LHu
Options
- users - Map of users and bcrypt hashed passwords (you can hash passwords via “signmykey hash” command) (required)
LDAP
Example Usage
authenticatorType: ldap
authenticatorOpts:
  ldapAddr: localhost
  ldapPort: 3893
  ldapTLS: False
  ldapTLSVerify: False
  ldapBindUser: "cn=serviceuser,ou=svcaccts,dc=glauth,dc=com"
  ldapBindPassword: "mysecret" 
  ldapBase: "dc=glauth,dc=com"
  ldapSearch: "(cn=%s)"
Options
- ldapAddr - Address of LDAP server (required)
- ldapPort - Port of LDAP server
- ldapTLS - Enable/disable SSL/TLS connection
- ldapTLSVerify - Enable/disable verification of SSL/TLS certificate
- ldapBindUser - LDAP bind user
- ldapBindPassword - LDAP bind password
- ldapBase - LDAP search base
- ldapSearch - LDAP search string to find user
OIDC ROPC
Example Usage
authenticatorType: oidcropc
authenticatorOpts:
  oidcTokenEndpoint: "https://idp.my.corp/auth/realms/mycorp/protocol/openid-connect/token"
  oidcClientID: "signmykey"
  oidcClientSecret: "93fac2d9-bd8f-453a-9ece-e2c430f0ee04"
Options
- oidcTokenEndpoint - OpenID Connect token Endpoint (required)
- oidcClientID - OpenID Connect Client ID (required)
- oidcClientSecret - OpenID Connect Client Secret (required)