cryptpad
- Category: Apps
- Status: 3
- Image: cryptpad/cryptpad
- Healthcheck: Yes
- Backups: Yes
- Email: No
- Tests: No
- SSO: Yes
Basic usage
- Set up Docker Swarm and
abra - Deploy
coop-cloud/traefik abra app new cryptpad --secrets(optionally with--passif you'd like to save secrets inpass)abra app config YOURAPPDOMAIN- be sure to change$DOMAINto something that resolves to your Docker swarm boxabra app deploy YOURAPPDOMAIN- Open the configured domain in your browser to finish set-up
At this point, anyone with this domain can register new users with this cryptpad instance.
After you have registered a first user, here is how you can make this user into an admin. After logging in as your user, go to: https://cryptpad.cctest.autonomic.zone/profile/
Click "Copy Public Key". This will copy your public key into your clipboard.
Then run abra app config YOURAPPDOMAIN and set the value of CRYPTPAD_ADMIN_KEYS
to include your public key. The example in .env.sample shows the required format.
Then redeploy with abra app deploy YOURAPPDOMAIN --force.
Now when you login as your user, and visit https://cryptpad.cctest.autonomic.zone/admin/, you should be able to access the admin interface for this cryptpad instance.
SSO
To enable SSO, run abra app config YOURAPPDOMAIN and set SSO_ENABLED=true. On the next deploy, the CryptPad SSO plugin will be installed automatically.
You also need to configure the remaining SSO environment variables for your OIDC provider:
SSO_PROVIDER_NAME— display name shown on the login button (e.g.Keycloak,Authentik)SSO_OIDC_URL— OIDC discovery URL for your providerSSO_CLIENT_ID— OAuth2 client IDSSO_JWT_ALG— JWT signing algorithm (e.g.RS256)
The client secret is stored as a Docker secret. Insert it with:
abra app secret insert YOURAPPDOMAIN sso_client_s v1 YOUR_CLIENT_SECRET
Then deploy (or redeploy) to apply: abra app deploy YOURAPPDOMAIN --force.