mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
cf16272a73
ACLs can now be defined by subdomain AND resource using pattern matching with regular expressions. It allows a very fine-grained access control to backend resources. [Note] For using example environmnent, user must update its /etc/hosts with new subdomains updated in README.
207 lines
5.9 KiB
Nginx Configuration File
207 lines
5.9 KiB
Nginx Configuration File
# nginx-sso - example nginx config
|
|
#
|
|
# (c) 2015 by Johannes Gilger <heipei@hackvalue.de>
|
|
#
|
|
# This is an example config for using nginx with the nginx-sso cookie system.
|
|
# For simplicity, this config sets up two fictional vhosts that you can use to
|
|
# test against both components of the nginx-sso system: ssoauth & ssologin.
|
|
# In a real deployment, these vhosts would be separate hosts.
|
|
|
|
#user nobody;
|
|
worker_processes 1;
|
|
|
|
#error_log logs/error.log;
|
|
#error_log logs/error.log notice;
|
|
#error_log logs/error.log info;
|
|
|
|
#pid logs/nginx.pid;
|
|
|
|
events {
|
|
worker_connections 1024;
|
|
}
|
|
|
|
|
|
http {
|
|
server {
|
|
listen 443 ssl;
|
|
server_name auth.test.local localhost;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
|
|
|
|
location / {
|
|
proxy_set_header X-Original-URI $request_uri;
|
|
proxy_set_header Host $http_host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
|
|
proxy_pass http://authelia/;
|
|
|
|
proxy_intercept_errors on;
|
|
|
|
if ($request_method !~ ^(POST)$){
|
|
error_page 401 = /error/401;
|
|
error_page 403 = /error/403;
|
|
error_page 404 = /error/404;
|
|
}
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl;
|
|
root /usr/share/nginx/html/home.test.local;
|
|
|
|
server_name home.test.local;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl;
|
|
root /usr/share/nginx/html/public.test.local;
|
|
|
|
server_name public.test.local;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
|
|
location /auth_verify {
|
|
internal;
|
|
proxy_set_header X-Original-URI $request_uri;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_pass http://authelia/verify;
|
|
}
|
|
|
|
location / {
|
|
auth_request /auth_verify;
|
|
|
|
auth_request_set $redirect $upstream_http_redirect;
|
|
proxy_set_header Redirect $redirect;
|
|
|
|
auth_request_set $user $upstream_http_remote_user;
|
|
proxy_set_header X-Forwarded-User $user;
|
|
|
|
auth_request_set $groups $upstream_http_remote_groups;
|
|
proxy_set_header Remote-Groups $groups;
|
|
|
|
error_page 401 =302 https://auth.test.local:8080?redirect=$redirect;
|
|
error_page 403 = https://auth.test.local:8080/error/403;
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl;
|
|
root /usr/share/nginx/html/admin.test.local;
|
|
|
|
server_name admin.test.local;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
|
|
location /auth_verify {
|
|
internal;
|
|
proxy_set_header X-Original-URI $request_uri;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_pass http://authelia/verify;
|
|
}
|
|
|
|
location / {
|
|
auth_request /auth_verify;
|
|
|
|
auth_request_set $redirect $upstream_http_redirect;
|
|
proxy_set_header Redirect $redirect;
|
|
|
|
auth_request_set $user $upstream_http_remote_user;
|
|
proxy_set_header X-Forwarded-User $user;
|
|
|
|
auth_request_set $groups $upstream_http_remote_groups;
|
|
proxy_set_header Remote-Groups $groups;
|
|
|
|
error_page 401 =302 https://auth.test.local:8080?redirect=$redirect;
|
|
error_page 403 = https://auth.test.local:8080/error/403;
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl;
|
|
root /usr/share/nginx/html/dev.test.local;
|
|
|
|
server_name dev.test.local;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
|
|
location /auth_verify {
|
|
internal;
|
|
proxy_set_header X-Original-URI $request_uri;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_pass http://authelia/verify;
|
|
}
|
|
|
|
location / {
|
|
auth_request /auth_verify;
|
|
|
|
auth_request_set $redirect $upstream_http_redirect;
|
|
proxy_set_header Redirect $redirect;
|
|
|
|
auth_request_set $user $upstream_http_remote_user;
|
|
proxy_set_header X-Forwarded-User $user;
|
|
|
|
auth_request_set $groups $upstream_http_remote_groups;
|
|
proxy_set_header Remote-Groups $groups;
|
|
|
|
error_page 401 =302 https://auth.test.local:8080?redirect=$redirect;
|
|
error_page 403 = https://auth.test.local:8080/error/403;
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl;
|
|
root /usr/share/nginx/html/mail.test.local;
|
|
|
|
server_name mx1.mail.test.local mx2.mail.test.local;
|
|
|
|
ssl on;
|
|
ssl_certificate /etc/ssl/server.crt;
|
|
ssl_certificate_key /etc/ssl/server.key;
|
|
|
|
location /auth_verify {
|
|
internal;
|
|
proxy_set_header X-Original-URI $request_uri;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header Host $http_host;
|
|
|
|
proxy_pass http://authelia/verify;
|
|
}
|
|
|
|
location / {
|
|
auth_request /auth_verify;
|
|
|
|
auth_request_set $redirect $upstream_http_redirect;
|
|
proxy_set_header Redirect $redirect;
|
|
|
|
auth_request_set $user $upstream_http_remote_user;
|
|
proxy_set_header X-Forwarded-User $user;
|
|
|
|
auth_request_set $groups $upstream_http_remote_groups;
|
|
proxy_set_header Remote-Groups $groups;
|
|
|
|
error_page 401 =302 https://auth.test.local:8080?redirect=$redirect;
|
|
error_page 403 = https://auth.test.local:8080/error/403;
|
|
}
|
|
}
|
|
}
|
|
|