forked from coop-cloud/authentik
Compare commits
24 Commits
6.5.2+2024
...
nextcloud
Author | SHA1 | Date | |
---|---|---|---|
cc3be7534e | |||
47793df102 | |||
52719f8d3a | |||
0175c0b0f4 | |||
9db9d077ca | |||
66e31d8632 | |||
f1aec8ce90 | |||
5e5da361e5 | |||
830214b1fd | |||
6d46686a24 | |||
912691844e | |||
84f8f5b165 | |||
aa107d0ad4 | |||
5e49903b3f | |||
9124dab6ab | |||
197feb32f3 | |||
df670cea2b | |||
eeef43529e | |||
6b0195e5a1 | |||
f342673d43 | |||
f6f6f90bed | |||
f1f5b96309 | |||
3cba20afd9 | |||
5c9e4e5372 |
@ -31,6 +31,7 @@ steps:
|
|||||||
SECRET_ADMIN_PASS_VERSION: v1
|
SECRET_ADMIN_PASS_VERSION: v1
|
||||||
SECRET_EMAIL_PASS_VERSION: v1
|
SECRET_EMAIL_PASS_VERSION: v1
|
||||||
DB_ENTRYPOINT_VERSION: v1
|
DB_ENTRYPOINT_VERSION: v1
|
||||||
|
PG_BACKUP_VERSION: v2
|
||||||
trigger:
|
trigger:
|
||||||
branch:
|
branch:
|
||||||
- main
|
- main
|
||||||
|
@ -1,8 +1,10 @@
|
|||||||
TYPE=authentik
|
TYPE=authentik
|
||||||
TIMEOUT=900
|
TIMEOUT=900
|
||||||
ENABLE_AUTO_UPDATE=true
|
ENABLE_AUTO_UPDATE=true
|
||||||
# POST_DEPLOY_CMDS="worker set_admin_pass|worker apply_blueprints|worker add_applications"
|
POST_DEPLOY_CMDS="worker set_admin_pass"
|
||||||
|
# Example values for post deploy cmds: "worker set_admin_pass|worker apply_blueprints|worker add_applications"
|
||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
ENABLE_BACKUPS=true
|
||||||
|
|
||||||
DOMAIN=authentik.example.com
|
DOMAIN=authentik.example.com
|
||||||
## Domain aliases
|
## Domain aliases
|
||||||
@ -16,6 +18,8 @@ AUTHENTIK_LOG_LEVEL=info
|
|||||||
|
|
||||||
## Outpost Integration
|
## Outpost Integration
|
||||||
# COMPOSE_FILE="$COMPOSE_FILE:compose.outposts.yml"
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.outposts.yml"
|
||||||
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.outposts.ldap.yml"
|
||||||
|
# SECRET_LDAP_TOKEN_VERSION=v1
|
||||||
|
|
||||||
## ADMIN
|
## ADMIN
|
||||||
AUTHENTIK_BOOTSTRAP_EMAIL=admin@example.com
|
AUTHENTIK_BOOTSTRAP_EMAIL=admin@example.com
|
||||||
|
@ -54,6 +54,14 @@ Set the nextcloud Icon using `abra app cmd -l -d <app_name> set_icons`
|
|||||||
|
|
||||||
The configuration inside Nextcloud can be found in the [nextcloud recipe](https://git.coopcloud.tech/coop-cloud/nextcloud#authentik-integration)
|
The configuration inside Nextcloud can be found in the [nextcloud recipe](https://git.coopcloud.tech/coop-cloud/nextcloud#authentik-integration)
|
||||||
|
|
||||||
|
## Add LDAP outpost
|
||||||
|
|
||||||
|
- Follow [this official guide](https://docs.goauthentik.io/docs/add-secure-apps/providers/ldap/generic_setup) and skip the LDAP Flow as we don't need it.
|
||||||
|
- Copy token under `Applications` -> `Outposts` `-> `View Deployment Info`
|
||||||
|
- Comment in envs for compose.outposts.ldap.yaml and secret version
|
||||||
|
- Insert token as secret `abra app secret insert <DOMAIN> ldap_token v1 <TOKEN>`
|
||||||
|
- Update deployment -> Outpost should be up and running
|
||||||
|
|
||||||
## Import User from CSV
|
## Import User from CSV
|
||||||
|
|
||||||
Users can be imported from a CSV file of the following format:
|
Users can be imported from a CSV file of the following format:
|
||||||
|
25
abra.sh
25
abra.sh
@ -1,22 +1,23 @@
|
|||||||
export CUSTOM_CSS_VERSION=v2
|
export CUSTOM_CSS_VERSION=v3
|
||||||
export FLOW_AUTHENTICATION_VERSION=v4
|
export FLOW_AUTHENTICATION_VERSION=v4
|
||||||
export FLOW_INVITATION_VERSION=v2
|
export FLOW_INVITATION_VERSION=v2
|
||||||
export FLOW_INVALIDATION_VERSION=v2
|
export FLOW_INVALIDATION_VERSION=v2
|
||||||
export FLOW_RECOVERY_VERSION=v1
|
export FLOW_RECOVERY_VERSION=v1
|
||||||
export FLOW_TRANSLATION_VERSION=v3
|
export FLOW_TRANSLATION_VERSION=v3
|
||||||
export SYSTEM_BRAND_VERSION=v4
|
export SYSTEM_BRAND_VERSION=v4
|
||||||
export NEXTCLOUD_CONFIG_VERSION=v1
|
export NEXTCLOUD_CONFIG_VERSION=v2
|
||||||
export WORDPRESS_CONFIG_VERSION=v2
|
export WORDPRESS_CONFIG_VERSION=v3
|
||||||
export MATRIX_CONFIG_VERSION=v1
|
export MATRIX_CONFIG_VERSION=v2
|
||||||
export WEKAN_CONFIG_VERSION=v3
|
export WEKAN_CONFIG_VERSION=v4
|
||||||
export VIKUNJA_CONFIG_VERSION=v1
|
export VIKUNJA_CONFIG_VERSION=v2
|
||||||
export OUTLINE_CONFIG_VERSION=v2
|
export OUTLINE_CONFIG_VERSION=v3
|
||||||
export KIMAI_CONFIG_VERSION=v1
|
export KIMAI_CONFIG_VERSION=v2
|
||||||
export ZAMMAD_CONFIG_VERSION=v1
|
export ZAMMAD_CONFIG_VERSION=v3
|
||||||
export RALLLY_CONFIG_VERSION=v2
|
export RALLLY_CONFIG_VERSION=v3
|
||||||
export HEDGEDOC_CONFIG_VERSION=v1
|
export HEDGEDOC_CONFIG_VERSION=v2
|
||||||
export MONITORING_CONFIG_VERSION=v2
|
export MONITORING_CONFIG_VERSION=v3
|
||||||
export DB_ENTRYPOINT_VERSION=v1
|
export DB_ENTRYPOINT_VERSION=v1
|
||||||
|
export PG_BACKUP_VERSION=v2
|
||||||
|
|
||||||
customize() {
|
customize() {
|
||||||
if [ -z "$1" ]
|
if [ -z "$1" ]
|
||||||
|
@ -3,9 +3,9 @@ services:
|
|||||||
app:
|
app:
|
||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=redirect-matrix-well-known"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect-matrix-well-known"
|
||||||
- "traefik.http.middlewares.redirect-matrix-well-known.redirectregex.regex=^https://(.*)/.well-known/matrix/(.*)"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect-matrix-well-known.redirectregex.regex=^https://(.*)/.well-known/matrix/(.*)"
|
||||||
- "traefik.http.middlewares.redirect-matrix-well-known.redirectregex.replacement=https://${MATRIX_DOMAIN}/.well-known/matrix/$$2"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect-matrix-well-known.redirectregex.replacement=https://${MATRIX_DOMAIN}/.well-known/matrix/$$2"
|
||||||
worker:
|
worker:
|
||||||
secrets:
|
secrets:
|
||||||
- matrix_id
|
- matrix_id
|
||||||
|
23
compose.outposts.ldap.yml
Normal file
23
compose.outposts.ldap.yml
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
version: "3.8"
|
||||||
|
services:
|
||||||
|
authentik_ldap:
|
||||||
|
image: ghcr.io/goauthentik/ldap:2024.10.5
|
||||||
|
# Optionally specify which networks the container should be
|
||||||
|
# might be needed to reach the core authentik server
|
||||||
|
networks:
|
||||||
|
- internal
|
||||||
|
- proxy
|
||||||
|
ports:
|
||||||
|
- 389:3389
|
||||||
|
- 636:6636
|
||||||
|
secrets:
|
||||||
|
- ldap_token
|
||||||
|
environment:
|
||||||
|
- AUTHENTIK_HOST=https://${DOMAIN}
|
||||||
|
- AUTHENTIK_INSECURE=true
|
||||||
|
- AUTHENTIK_TOKEN=file:///run/secrets/ldap_token
|
||||||
|
|
||||||
|
secrets:
|
||||||
|
ldap_token:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_ldap_token_${SECRET_LDAP_TOKEN_VERSION}
|
23
compose.yml
23
compose.yml
@ -34,7 +34,7 @@ x-env: &env
|
|||||||
version: '3.8'
|
version: '3.8'
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: ghcr.io/goauthentik/server:2024.6.5
|
image: ghcr.io/goauthentik/server:2024.10.5
|
||||||
command: server
|
command: server
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
@ -72,11 +72,11 @@ services:
|
|||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.customFrameOptionsValue=SAMEORIGIN"
|
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.customFrameOptionsValue=SAMEORIGIN"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.contentSecurityPolicy=frame-ancestors ${X_FRAME_OPTIONS_ALLOW_FROM}"
|
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.contentSecurityPolicy=frame-ancestors ${X_FRAME_OPTIONS_ALLOW_FROM}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=6.5.2+2024.6.5"
|
- "coop-cloud.${STACK_NAME}.version=6.11.0+2024.10.5"
|
||||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
|
|
||||||
worker:
|
worker:
|
||||||
image: ghcr.io/goauthentik/server:2024.6.5
|
image: ghcr.io/goauthentik/server:2024.10.5
|
||||||
command: worker
|
command: worker
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
@ -117,13 +117,16 @@ services:
|
|||||||
start_period: 5m
|
start_period: 5m
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:15.7
|
image: postgres:15.8
|
||||||
secrets:
|
secrets:
|
||||||
- db_password
|
- db_password
|
||||||
configs:
|
configs:
|
||||||
- source: db_entrypoint
|
- source: db_entrypoint
|
||||||
target: /docker-entrypoint.sh
|
target: /docker-entrypoint.sh
|
||||||
mode: 0555
|
mode: 0555
|
||||||
|
- source: pg_backup
|
||||||
|
target: /pg_backup.sh
|
||||||
|
mode: 0555
|
||||||
entrypoint:
|
entrypoint:
|
||||||
/docker-entrypoint.sh
|
/docker-entrypoint.sh
|
||||||
volumes:
|
volumes:
|
||||||
@ -142,15 +145,14 @@ services:
|
|||||||
- POSTGRES_DB=authentik
|
- POSTGRES_DB=authentik
|
||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
backupbot.backup: "true"
|
backupbot.backup: "${ENABLE_BACKUPS:-true}"
|
||||||
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat /run/secrets/db_password) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql"
|
backupbot.backup.pre-hook: "/pg_backup.sh backup"
|
||||||
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql"
|
|
||||||
backupbot.backup.volumes.database.path: "backup.sql"
|
backupbot.backup.volumes.database.path: "backup.sql"
|
||||||
backupbot.backup.volumes.redis: "false"
|
backupbot.backup.volumes.redis: "false"
|
||||||
backupbot.restore.post-hook: 'psql -U authentik -d postgres -c "DROP DATABASE authentik WITH (FORCE);" && createdb -U authentik authentik && psql -U authentik -d authentik -f /var/lib/postgresql/data/backup.sql'
|
backupbot.restore.post-hook: '/pg_backup.sh restore'
|
||||||
|
|
||||||
redis:
|
redis:
|
||||||
image: redis:7.4.0-alpine
|
image: redis:7.4.1-alpine
|
||||||
command: --save 60 1 --loglevel warning
|
command: --save 60 1 --loglevel warning
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
@ -222,3 +224,6 @@ configs:
|
|||||||
name: ${STACK_NAME}_db_entrypoint_${DB_ENTRYPOINT_VERSION}
|
name: ${STACK_NAME}_db_entrypoint_${DB_ENTRYPOINT_VERSION}
|
||||||
file: entrypoint.postgres.sh.tmpl
|
file: entrypoint.postgres.sh.tmpl
|
||||||
template_driver: golang
|
template_driver: golang
|
||||||
|
pg_backup:
|
||||||
|
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
|
||||||
|
file: pg_backup.sh
|
||||||
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "hedgedoc_id" }}
|
client_id: {{ secret "hedgedoc_id" }}
|
||||||
client_secret: {{ secret "hedgedoc_secret" }}
|
client_secret: {{ secret "hedgedoc_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -12,6 +12,7 @@ entries:
|
|||||||
audience: https://{{ env "KIMAI_DOMAIN" }}/auth/saml
|
audience: https://{{ env "KIMAI_DOMAIN" }}/auth/saml
|
||||||
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
digest_algorithm: http://www.w3.org/2001/04/xmlenc#sha256
|
digest_algorithm: http://www.w3.org/2001/04/xmlenc#sha256
|
||||||
issuer: https://{{ env "DOMAIN" }}
|
issuer: https://{{ env "DOMAIN" }}
|
||||||
name: Kimai
|
name: Kimai
|
||||||
@ -24,6 +25,7 @@ entries:
|
|||||||
- !Find [authentik_providers_saml.samlpropertymapping, [name, "authentik default SAML Mapping: Groups"]]
|
- !Find [authentik_providers_saml.samlpropertymapping, [name, "authentik default SAML Mapping: Groups"]]
|
||||||
- !Find [authentik_providers_saml.samlpropertymapping, [name, "authentik default SAML Mapping: UPN"]]
|
- !Find [authentik_providers_saml.samlpropertymapping, [name, "authentik default SAML Mapping: UPN"]]
|
||||||
session_valid_not_on_or_after: minutes=86400
|
session_valid_not_on_or_after: minutes=86400
|
||||||
|
sign_assertion: true
|
||||||
signature_algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
|
signature_algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
|
||||||
signing_kp: !Find [authentik_crypto.certificatekeypair, [name, authentik Self-signed Certificate]]
|
signing_kp: !Find [authentik_crypto.certificatekeypair, [name, authentik Self-signed Certificate]]
|
||||||
sp_binding: post
|
sp_binding: post
|
||||||
@ -45,4 +47,4 @@ entries:
|
|||||||
identifiers:
|
identifiers:
|
||||||
name: Kimai
|
name: Kimai
|
||||||
model: authentik_core.application
|
model: authentik_core.application
|
||||||
state: present
|
state: present
|
||||||
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "matrix_id" }}
|
client_id: {{ secret "matrix_id" }}
|
||||||
client_secret: {{ secret "matrix_secret" }}
|
client_secret: {{ secret "matrix_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "monitoring_id" }}
|
client_id: {{ secret "monitoring_id" }}
|
||||||
client_secret: {{ secret "monitoring_secret" }}
|
client_secret: {{ secret "monitoring_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -20,10 +20,15 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "nextcloud_id" }}
|
client_id: {{ secret "nextcloud_id" }}
|
||||||
client_secret: {{ secret "nextcloud_secret" }}
|
client_secret: {{ secret "nextcloud_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
redirect_uris:
|
||||||
|
- url: https://{{ env "NEXTCLOUD_DOMAIN" }}
|
||||||
|
matching_mode: strict
|
||||||
include_claims_in_id_token: true
|
include_claims_in_id_token: true
|
||||||
issuer_mode: per_provider
|
issuer_mode: per_provider
|
||||||
name: Nextcloud
|
name: Nextcloud
|
||||||
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "outline_id" }}
|
client_id: {{ secret "outline_id" }}
|
||||||
client_secret: {{ secret "outline_secret" }}
|
client_secret: {{ secret "outline_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
34
pg_backup.sh
Normal file
34
pg_backup.sh
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
|
||||||
|
|
||||||
|
function backup {
|
||||||
|
export PGPASSWORD=$(cat /run/secrets/db_password)
|
||||||
|
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
|
||||||
|
}
|
||||||
|
|
||||||
|
function restore {
|
||||||
|
cd /var/lib/postgresql/data/
|
||||||
|
restore_config(){
|
||||||
|
# Restore allowed connections
|
||||||
|
cat pg_hba.conf.bak > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
}
|
||||||
|
# Don't allow any other connections than local
|
||||||
|
cp pg_hba.conf pg_hba.conf.bak
|
||||||
|
echo "local all all trust" > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
trap restore_config EXIT INT TERM
|
||||||
|
|
||||||
|
# Recreate Database
|
||||||
|
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
|
||||||
|
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
|
||||||
|
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
|
||||||
|
|
||||||
|
trap - EXIT INT TERM
|
||||||
|
restore_config
|
||||||
|
}
|
||||||
|
|
||||||
|
$@
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "rallly_id" }}
|
client_id: {{ secret "rallly_id" }}
|
||||||
client_secret: {{ secret "rallly_secret" }}
|
client_secret: {{ secret "rallly_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
1
release/6.11.0+2024.10.5
Normal file
1
release/6.11.0+2024.10.5
Normal file
@ -0,0 +1 @@
|
|||||||
|
Fix Impersonate Bug
|
1
release/6.6.0+2024.8.2
Normal file
1
release/6.6.0+2024.8.2
Normal file
@ -0,0 +1 @@
|
|||||||
|
Replaced icon bbb.jpg with icon.png - configs need to be updated when upgrading!
|
@ -1,5 +1,3 @@
|
|||||||
Replaced icon bbb.jpg with icon.png - configs need to be updated when upgrading!
|
|
||||||
|
|
||||||
Two critical vulnerabilities were closed:
|
Two critical vulnerabilities were closed:
|
||||||
https://github.com/goauthentik/authentik/security/advisories/GHSA-7jxf-mmg9-9hg7
|
https://github.com/goauthentik/authentik/security/advisories/GHSA-7jxf-mmg9-9hg7
|
||||||
https://github.com/goauthentik/authentik/security/advisories/GHSA-8gfm-pr6x-pfh9
|
https://github.com/goauthentik/authentik/security/advisories/GHSA-8gfm-pr6x-pfh9
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "vikunja_id" }}
|
client_id: {{ secret "vikunja_id" }}
|
||||||
client_secret: {{ secret "vikunja_secret" }}
|
client_secret: {{ secret "vikunja_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -25,7 +25,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "wekan_id" }}
|
client_id: {{ secret "wekan_id" }}
|
||||||
client_secret: {{ secret "wekan_secret" }}
|
client_secret: {{ secret "wekan_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -8,7 +8,9 @@ entries:
|
|||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
access_code_validity: minutes=1
|
access_code_validity: minutes=1
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
client_id: {{ secret "wordpress_id" }}
|
client_id: {{ secret "wordpress_id" }}
|
||||||
client_secret: {{ secret "wordpress_secret" }}
|
client_secret: {{ secret "wordpress_secret" }}
|
||||||
client_type: confidential
|
client_type: confidential
|
||||||
|
@ -36,6 +36,7 @@ entries:
|
|||||||
audience: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
audience: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
||||||
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
digest_algorithm: http://www.w3.org/2001/04/xmlenc#sha256
|
digest_algorithm: http://www.w3.org/2001/04/xmlenc#sha256
|
||||||
issuer: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
issuer: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
||||||
name: zammad
|
name: zammad
|
||||||
@ -43,6 +44,7 @@ entries:
|
|||||||
- !KeyOf zammad_name_mapping
|
- !KeyOf zammad_name_mapping
|
||||||
- !KeyOf zammad_email_mapping
|
- !KeyOf zammad_email_mapping
|
||||||
session_valid_not_on_or_after: minutes=86400
|
session_valid_not_on_or_after: minutes=86400
|
||||||
|
sign_assertion: true
|
||||||
signature_algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
|
signature_algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
|
||||||
signing_kp: !Find [authentik_crypto.certificatekeypair, [name, authentik Self-signed Certificate]]
|
signing_kp: !Find [authentik_crypto.certificatekeypair, [name, authentik Self-signed Certificate]]
|
||||||
sp_binding: post
|
sp_binding: post
|
||||||
@ -54,7 +56,7 @@ entries:
|
|||||||
state: present
|
state: present
|
||||||
|
|
||||||
- attrs:
|
- attrs:
|
||||||
meta_launch_url: https://{{ env "ZAMMAD_DOMAIN" }}
|
meta_launch_url: ""
|
||||||
open_in_new_tab: true
|
open_in_new_tab: true
|
||||||
policy_engine_mode: any
|
policy_engine_mode: any
|
||||||
provider: !KeyOf zammad_provider
|
provider: !KeyOf zammad_provider
|
||||||
|
Reference in New Issue
Block a user