mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
docs: added example configs for oidc for specific services (portainer, proxmox) (#2831)
Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
This commit is contained in:
parent
380e6fccb6
commit
b6cffaaf50
|
@ -2,7 +2,9 @@
|
|||
layout: default
|
||||
title: Community-Tested OIDC Integrations
|
||||
parent: Community
|
||||
nav_order: 4
|
||||
nav_order: 5
|
||||
has_children: true
|
||||
has_toc: false
|
||||
---
|
||||
|
||||
# OIDC Integrations
|
||||
|
|
44
docs/community/oidc-integrations/portainer.md
Normal file
44
docs/community/oidc-integrations/portainer.md
Normal file
|
@ -0,0 +1,44 @@
|
|||
---
|
||||
layout: default
|
||||
title: Portainer
|
||||
parent: Community-Tested OIDC Integrations
|
||||
grand_parent: Community
|
||||
nav_order: 1
|
||||
---
|
||||
|
||||
# OIDC Integrations: Portainer
|
||||
|
||||
{{ page.path }}
|
||||
|
||||
**Note** these setting have been tested with authelia `v4.33.2` and Portainer-CE `2.11.0`
|
||||
|
||||
## Authelia config
|
||||
|
||||
The specific client config for portainer.
|
||||
|
||||
```yaml
|
||||
identity_providers:
|
||||
oidc:
|
||||
clients:
|
||||
- id: portainer_client_id
|
||||
description: Some description you want to shown on the Authelia consent page
|
||||
secret: some secret string which should also be entered in the portainer config
|
||||
public: false
|
||||
authorization_policy: two_factor
|
||||
audience: []
|
||||
scopes:
|
||||
- openid
|
||||
redirect_uris:
|
||||
- https://portainer.example.com
|
||||
userinfo_signing_algorithm: none
|
||||
```
|
||||
|
||||
## Portainer config
|
||||
|
||||
To setup Authelia as SSO provider in portainer go to **Settings > Authentication** and select **Authentication method** OAuth and **Provider** Custom and make sure automatic user provision is turned so users get automatically created.
|
||||
|
||||
**Note** make sure that Redirect URL matches exacty the redirect_uris in authelia config. Also us `preferred_username` as the User identifier which makes sure the portianer user and authelia user have the same username.
|
||||
|
||||
<p align="center">
|
||||
<a href="../../images/portainer.gif" target="_blank"><img src="../../images/portainer.gif" width="736"></a>
|
||||
</p>
|
42
docs/community/oidc-integrations/proxmox.md
Normal file
42
docs/community/oidc-integrations/proxmox.md
Normal file
|
@ -0,0 +1,42 @@
|
|||
---
|
||||
layout: default
|
||||
title: Proxmox
|
||||
parent: Community-Tested OIDC Integrations
|
||||
grand_parent: Community
|
||||
nav_order: 2
|
||||
---
|
||||
|
||||
# OIDC Integrations: Proxmox
|
||||
|
||||
{{ page.path }}
|
||||
|
||||
## Authelia config
|
||||
|
||||
**Note** these setting have been tested with authelia `v4.33.2` and Proxmox `7.1-10`
|
||||
|
||||
The specific client config for proxmox.
|
||||
|
||||
```yaml
|
||||
identity_providers:
|
||||
oidc:
|
||||
clients:
|
||||
- id: some id you want to use on the client
|
||||
description: Some description you want to shown on the Authelia consent page
|
||||
secret: some secret string which should also be entered in the proxmox config
|
||||
public: false
|
||||
authorization_policy: two_factor
|
||||
audience: []
|
||||
scopes:
|
||||
- openid
|
||||
redirect_uris:
|
||||
- https://proxmox.example.com
|
||||
userinfo_signing_algorithm: none
|
||||
```
|
||||
|
||||
## Proxmox config
|
||||
|
||||
Under Datacenter go to **Persmission > Realms** and add the an OpenID Connect Server
|
||||
|
||||
<p align="center">
|
||||
<a href="../../images/portainer.gif" target="_blank"><img src="../../images/proxmox.gif" width="736"></a>
|
||||
</p>
|
BIN
docs/images/portainer.gif
Normal file
BIN
docs/images/portainer.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 82 KiB |
BIN
docs/images/proxmox.gif
Normal file
BIN
docs/images/proxmox.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 96 KiB |
Loading…
Reference in New Issue
Block a user