Compare commits

...

2 Commits

Author SHA1 Message Date
e49f2c07ac UX: rename matrix to element 2025-01-20 21:19:04 +01:00
9f66d5957c fix blueprints: add redirect_uris 2025-01-20 20:32:42 +01:00
11 changed files with 33 additions and 5 deletions

View File

@ -12,6 +12,7 @@ services:
- matrix_secret
environment:
- ELEMENT_DOMAIN
- MATRIX_DOMAIN
configs:
- source: matrix
target: /blueprints/matrix.yaml

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "HEDGEDOC_DOMAIN" }}/auth/oauth2/callback
name: Hedgedoc
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]
@ -32,7 +35,7 @@ entries:
state: present
- attrs:
meta_launch_url: https://{{ env "HEDGEDOC_DOMAIN" }}
meta_launch_url: https://{{ env "HEDGEDOC_DOMAIN" }}/auth/oauth2
open_in_new_tab: true
policy_engine_mode: any
provider: !KeyOf hedgedoc_provider

View File

@ -37,7 +37,7 @@ entries:
state: present
- attrs:
meta_launch_url: https://{{ env "KIMAI_DOMAIN" }}
meta_launch_url: https://{{ env "KIMAI_DOMAIN" }}/auth/saml/login
open_in_new_tab: true
policy_engine_mode: any
provider: !KeyOf kimai_provider

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "MATRIX_DOMAIN" }}/_synapse/client/oidc/callback
name: Matrix
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]
@ -36,10 +39,10 @@ entries:
open_in_new_tab: true
policy_engine_mode: any
provider: !KeyOf matrix_provider
slug: matrix
name: Element
conditions: []
id: matrix_application
identifiers:
name: Matrix
slug: matrix
model: authentik_core.application
state: present

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "MONITORING_DOMAIN" }}/login/generic_oauth
name: Monitoring
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]

View File

@ -28,6 +28,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "NEXTCLOUD_DOMAIN" }}/apps/sociallogin/custom_oidc/authentik
name: Nextcloud
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "OUTLINE_DOMAIN" }}/auth/oidc.callback
name: Outline
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]
@ -32,7 +35,7 @@ entries:
state: present
- attrs:
meta_launch_url: https://{{ env "OUTLINE_DOMAIN" }}
meta_launch_url: https://{{ env "OUTLINE_DOMAIN" }}/auth/oidc
open_in_new_tab: true
policy_engine_mode: any
provider: !KeyOf outline_provider

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "RALLLY_DOMAIN" }}/api/auth/callback/oidc
name: Rallly
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "VIKUNJA_DOMAIN" }}/auth/openid/authentik
name: Vikunja
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]

View File

@ -33,6 +33,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "WEKAN_DOMAIN" }}/_oauth/oidc
name: Wekan
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]

View File

@ -16,6 +16,9 @@ entries:
client_type: confidential
include_claims_in_id_token: true
issuer_mode: per_provider
redirect_uris:
- matching_mode: strict
url: https://{{ env "WORDPRESS_DOMAIN" }}/openid-connect-authorize
name: Wordpress
property_mappings:
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, openid]]