forked from coop-cloud/authentik
Compare commits
12 Commits
password_b
...
6.3.1+2024
Author | SHA1 | Date | |
---|---|---|---|
a5929044c2 | |||
5a89a6156f | |||
7e1caeee6a | |||
43b305c965 | |||
3bc925d3fa | |||
f322f6a09e | |||
24ff7ee444 | |||
38911193db | |||
3b9bea3681 | |||
e8016868fe | |||
a00c7deb2c | |||
c1f0358f29 |
13
.env.sample
13
.env.sample
@ -1,7 +1,7 @@
|
|||||||
TYPE=authentik
|
TYPE=authentik
|
||||||
TIMEOUT=900
|
TIMEOUT=900
|
||||||
ENABLE_AUTO_UPDATE=true
|
ENABLE_AUTO_UPDATE=true
|
||||||
# POST_DEPLOY_CMDS="worker worker apply_blueprints|worker add_applications"
|
# POST_DEPLOY_CMDS="worker set_admin_pass|worker apply_blueprints|worker add_applications"
|
||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
DOMAIN=authentik.example.com
|
DOMAIN=authentik.example.com
|
||||||
@ -17,6 +17,9 @@ AUTHENTIK_LOG_LEVEL=info
|
|||||||
## Outpost Integration
|
## Outpost Integration
|
||||||
# COMPOSE_FILE="$COMPOSE_FILE:compose.outposts.yml"
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.outposts.yml"
|
||||||
|
|
||||||
|
## ADMIN
|
||||||
|
AUTHENTIK_BOOTSTRAP_EMAIL=admin@example.com
|
||||||
|
|
||||||
## EMAIL
|
## EMAIL
|
||||||
AUTHENTIK_EMAIL__HOST=smtp
|
AUTHENTIK_EMAIL__HOST=smtp
|
||||||
AUTHENTIK_EMAIL__PORT=587
|
AUTHENTIK_EMAIL__PORT=587
|
||||||
@ -93,13 +96,17 @@ AUTHENTIK_COLOR_BACKGROUND_LIGHT=#1c1e21
|
|||||||
# KIMAI_DOMAIN=kimai.example.com
|
# KIMAI_DOMAIN=kimai.example.com
|
||||||
# SECRET_KIMAI_ID_VERSION=v1
|
# SECRET_KIMAI_ID_VERSION=v1
|
||||||
# SECRET_KIMAI_SECRET_VERSION=v1
|
# SECRET_KIMAI_SECRET_VERSION=v1
|
||||||
# APP_ICONS="$APP_ICONS kimai:~/.abra/recipes/authentik/icons/kimai.png"
|
# APP_ICONS="$APP_ICONS kimai:~/.abra/recipes/authentik/icons/kimai_logo.png"
|
||||||
|
|
||||||
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.zammad.yml"
|
||||||
|
# ZAMMAD_DOMAIN=zammad.example.com
|
||||||
|
# APP_ICONS="$APP_ICONS zammad:~/.abra/recipes/authentik/icons/zammad.svg"
|
||||||
|
|
||||||
# COMPOSE_FILE="$COMPOSE_FILE:compose.monitoring.yml"
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.monitoring.yml"
|
||||||
# MONITORING_DOMAIN=monitoring.example.com
|
# MONITORING_DOMAIN=monitoring.example.com
|
||||||
# SECRET_MONITORING_ID_VERSION=v1
|
# SECRET_MONITORING_ID_VERSION=v1
|
||||||
# SECRET_MONITORING_SECRET_VERSION=v1
|
# SECRET_MONITORING_SECRET_VERSION=v1
|
||||||
# APP_ICONS="$APP_ICONS monitoring:~/.abra/recipes/authentik/icons/monitoring.png"
|
# APP_ICONS="$APP_ICONS monitoring:~/.abra/recipes/authentik/icons/monitoring.svg"
|
||||||
|
|
||||||
# COMPOSE_FILE="$COMPOSE_FILE:compose.rallly.yml"
|
# COMPOSE_FILE="$COMPOSE_FILE:compose.rallly.yml"
|
||||||
# RALLLY_DOMAIN=rallly.example.com
|
# RALLLY_DOMAIN=rallly.example.com
|
||||||
|
@ -35,6 +35,7 @@ abra app secret generate -a <app_name>
|
|||||||
abra app undeploy <app_name>
|
abra app undeploy <app_name>
|
||||||
abra app deploy <app_name>
|
abra app deploy <app_name>
|
||||||
abra app cmd <app_name> db rotate_db_pass
|
abra app cmd <app_name> db rotate_db_pass
|
||||||
|
abra app cmd <app_name> app set_admin_pass
|
||||||
```
|
```
|
||||||
|
|
||||||
## Add SSO for Nextcloud
|
## Add SSO for Nextcloud
|
||||||
|
34
abra.sh
34
abra.sh
@ -12,9 +12,10 @@ export WEKAN_CONFIG_VERSION=v3
|
|||||||
export VIKUNJA_CONFIG_VERSION=v1
|
export VIKUNJA_CONFIG_VERSION=v1
|
||||||
export OUTLINE_CONFIG_VERSION=v2
|
export OUTLINE_CONFIG_VERSION=v2
|
||||||
export KIMAI_CONFIG_VERSION=v1
|
export KIMAI_CONFIG_VERSION=v1
|
||||||
|
export ZAMMAD_CONFIG_VERSION=v1
|
||||||
export RALLLY_CONFIG_VERSION=v2
|
export RALLLY_CONFIG_VERSION=v2
|
||||||
export HEDGEDOC_CONFIG_VERSION=v1
|
export HEDGEDOC_CONFIG_VERSION=v1
|
||||||
export MONITORING_CONFIG_VERSION=v1
|
export MONITORING_CONFIG_VERSION=v2
|
||||||
export DB_ENTRYPOINT_VERSION=v1
|
export DB_ENTRYPOINT_VERSION=v1
|
||||||
|
|
||||||
customize() {
|
customize() {
|
||||||
@ -73,7 +74,30 @@ with open('/tmp/$1', newline='') as file:
|
|||||||
}
|
}
|
||||||
|
|
||||||
set_admin_pass() {
|
set_admin_pass() {
|
||||||
echo "The set_admin_pass function is depricated"
|
password=$(cat /run/secrets/admin_pass)
|
||||||
|
token=$(cat /run/secrets/admin_token)
|
||||||
|
/manage.py shell -c """
|
||||||
|
akadmin = User.objects.get(username='akadmin')
|
||||||
|
akadmin.set_password('$password')
|
||||||
|
akadmin.save()
|
||||||
|
print('Changed akadmin password')
|
||||||
|
|
||||||
|
from authentik.core.models import TokenIntents
|
||||||
|
key='$token'
|
||||||
|
if (token:= Token.objects.filter(identifier='authentik-bootstrap-token').first()):
|
||||||
|
token.key=key
|
||||||
|
token.save()
|
||||||
|
print('Changed authentik-bootstrap-token')
|
||||||
|
else:
|
||||||
|
Token.objects.create(
|
||||||
|
identifier='authentik-bootstrap-token',
|
||||||
|
user=akadmin,
|
||||||
|
intent=TokenIntents.INTENT_API,
|
||||||
|
expiring=False,
|
||||||
|
key=key,
|
||||||
|
)
|
||||||
|
print('Created authentik-bootstrap-token')
|
||||||
|
""" 2>&1 | quieten
|
||||||
}
|
}
|
||||||
|
|
||||||
rotate_db_pass() {
|
rotate_db_pass() {
|
||||||
@ -219,3 +243,9 @@ cert = saml.signing_kp
|
|||||||
print(''.join(cert.certificate_data.splitlines()[1:-1]))
|
print(''.join(cert.certificate_data.splitlines()[1:-1]))
|
||||||
""" 2>&1 | quieten
|
""" 2>&1 | quieten
|
||||||
}
|
}
|
||||||
|
|
||||||
|
get_user_uid() {
|
||||||
|
/manage.py shell -c """
|
||||||
|
print(User.objects.filter(username='$1').first().uid)
|
||||||
|
""" 2>&1 | quieten
|
||||||
|
}
|
||||||
|
@ -40,7 +40,19 @@ vikunja:
|
|||||||
- vikunja.svg
|
- vikunja.svg
|
||||||
secrets:
|
secrets:
|
||||||
vikunja_id: vikunja
|
vikunja_id: vikunja
|
||||||
monitoring:
|
kimai:
|
||||||
|
uncomment:
|
||||||
|
- compose.kimai.yml
|
||||||
|
- KIMAI_DOMAIN
|
||||||
|
- SECRET_KIMAI_ID_VERSION
|
||||||
|
- SECRET_KIMAI_SECRET_VERSION
|
||||||
|
- kimai_logo.png
|
||||||
|
zammad:
|
||||||
|
uncomment:
|
||||||
|
- compose.zammad.yml
|
||||||
|
- ZAMMAD_DOMAIN
|
||||||
|
- zammad.svg
|
||||||
|
monitoring-ng:
|
||||||
uncomment:
|
uncomment:
|
||||||
- compose.monitoring.yml
|
- compose.monitoring.yml
|
||||||
- MONITORING_DOMAIN
|
- MONITORING_DOMAIN
|
||||||
|
24
compose.yml
24
compose.yml
@ -8,8 +8,6 @@ x-env: &env
|
|||||||
- AUTHENTIK_REDIS__HOST=redis
|
- AUTHENTIK_REDIS__HOST=redis
|
||||||
- AUTHENTIK_ERROR_REPORTING__ENABLED
|
- AUTHENTIK_ERROR_REPORTING__ENABLED
|
||||||
- AUTHENTIK_SECRET_KEY=file:///run/secrets/secret_key
|
- AUTHENTIK_SECRET_KEY=file:///run/secrets/secret_key
|
||||||
- AUTHENTIK_BOOTSTRAP_PASSWORD=file:///run/secrets/admin_pass
|
|
||||||
- AUTHENTIK_BOOTSTRAP_TOKEN=file:///run/secrets/admin_token
|
|
||||||
- AUTHENTIK_EMAIL__HOST
|
- AUTHENTIK_EMAIL__HOST
|
||||||
- AUTHENTIK_EMAIL__PORT
|
- AUTHENTIK_EMAIL__PORT
|
||||||
- AUTHENTIK_EMAIL__USERNAME
|
- AUTHENTIK_EMAIL__USERNAME
|
||||||
@ -23,6 +21,7 @@ x-env: &env
|
|||||||
- AUTHENTIK_COLOR_BACKGROUND_LIGHT
|
- AUTHENTIK_COLOR_BACKGROUND_LIGHT
|
||||||
- AUTHENTIK_FOOTER_LINKS
|
- AUTHENTIK_FOOTER_LINKS
|
||||||
- AUTHENTIK_IMPERSONATION
|
- AUTHENTIK_IMPERSONATION
|
||||||
|
- AUTHENTIK_BOOTSTRAP_EMAIL
|
||||||
- WELCOME_MESSAGE
|
- WELCOME_MESSAGE
|
||||||
- DEFAULT_LANGUAGE
|
- DEFAULT_LANGUAGE
|
||||||
- EMAIL_SUBJECT
|
- EMAIL_SUBJECT
|
||||||
@ -34,7 +33,7 @@ x-env: &env
|
|||||||
version: '3.8'
|
version: '3.8'
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: ghcr.io/goauthentik/server:2024.4.2
|
image: ghcr.io/goauthentik/server:2024.6.1
|
||||||
command: server
|
command: server
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
@ -53,16 +52,13 @@ services:
|
|||||||
- internal
|
- internal
|
||||||
- proxy
|
- proxy
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: "bash -c 'printf \"GET / HTTP/1.1\n\n\" > /dev/tcp/127.0.0.1/9000; exit $$?;'"
|
test: "ak healthcheck"
|
||||||
interval: 30s
|
interval: 30s
|
||||||
timeout: 10s
|
timeout: 30s
|
||||||
retries: 10
|
retries: 10
|
||||||
start_period: 5m
|
start_period: 5m
|
||||||
environment: *env
|
environment: *env
|
||||||
deploy:
|
deploy:
|
||||||
update_config:
|
|
||||||
failure_action: rollback
|
|
||||||
order: start-first
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.docker.network=proxy"
|
- "traefik.docker.network=proxy"
|
||||||
@ -75,11 +71,11 @@ services:
|
|||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.customFrameOptionsValue=SAMEORIGIN"
|
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.customFrameOptionsValue=SAMEORIGIN"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.contentSecurityPolicy=frame-ancestors ${X_FRAME_OPTIONS_ALLOW_FROM}"
|
- "traefik.http.middlewares.${STACK_NAME}-frameOptions.headers.contentSecurityPolicy=frame-ancestors ${X_FRAME_OPTIONS_ALLOW_FROM}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=6.1.1+2024.4.2"
|
- "coop-cloud.${STACK_NAME}.version=6.3.1+2024.6.1"
|
||||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
|
|
||||||
worker:
|
worker:
|
||||||
image: ghcr.io/goauthentik/server:2024.4.2
|
image: ghcr.io/goauthentik/server:2024.6.1
|
||||||
command: worker
|
command: worker
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
@ -112,6 +108,12 @@ services:
|
|||||||
- source: flow_invalidation
|
- source: flow_invalidation
|
||||||
target: /blueprints/6_flow_invalidation.yaml
|
target: /blueprints/6_flow_invalidation.yaml
|
||||||
environment: *env
|
environment: *env
|
||||||
|
healthcheck:
|
||||||
|
test: "ak healthcheck"
|
||||||
|
interval: 30s
|
||||||
|
timeout: 30s
|
||||||
|
retries: 10
|
||||||
|
start_period: 5m
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:15.7
|
image: postgres:15.7
|
||||||
@ -145,7 +147,7 @@ services:
|
|||||||
backupbot.backup.path: "/var/lib/postgresql/data"
|
backupbot.backup.path: "/var/lib/postgresql/data"
|
||||||
|
|
||||||
redis:
|
redis:
|
||||||
image: redis:7.2.4-alpine
|
image: redis:7.2.5-alpine
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
healthcheck:
|
healthcheck:
|
||||||
|
14
compose.zammad.yml
Normal file
14
compose.zammad.yml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
version: "3.8"
|
||||||
|
services:
|
||||||
|
worker:
|
||||||
|
environment:
|
||||||
|
- ZAMMAD_DOMAIN
|
||||||
|
configs:
|
||||||
|
- source: zammad
|
||||||
|
target: /blueprints/zammad.yaml
|
||||||
|
|
||||||
|
configs:
|
||||||
|
zammad:
|
||||||
|
name: ${STACK_NAME}_zammad_${ZAMMAD_CONFIG_VERSION}
|
||||||
|
file: zammad.yaml.tmpl
|
||||||
|
template_driver: golang
|
30
icons/zammad.svg
Normal file
30
icons/zammad.svg
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||||
|
<svg width="126px" height="108px" viewBox="0 0 42 36" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:sketch="http://www.bohemiancoding.com/sketch/ns">
|
||||||
|
<!-- Generator: Sketch 3.3.2 (12043) - http://www.bohemiancoding.com/sketch -->
|
||||||
|
<title>logo</title>
|
||||||
|
<desc>Created with Sketch.</desc>
|
||||||
|
<defs/>
|
||||||
|
<g id="Page-1" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd" sketch:type="MSPage">
|
||||||
|
<g id="logo" sketch:type="MSArtboardGroup">
|
||||||
|
<g sketch:type="MSLayerGroup" transform="translate(1.000000, 0.000000)" id="Shape">
|
||||||
|
<path d="M27.3375,12.6 L36.72,9.72 L31.1625,13.2525 L27.3375,12.6 Z" fill="#CA2317" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M33.0525,19.62 L31.1625,13.2525 L36.72,9.72 L35.055,15.435 L33.0525,19.62 Z" fill="#E84F83" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M39.465,7.9875 L38.43,9.72 L35.055,15.435 L36.72,9.72 L39.465,7.9875 Z" fill="#CA2317" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M39.8025,9.1125 L37.1925,11.79 L38.43,9.72 L39.8025,9.1125 Z" fill="#E54011" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M27.9,10.8225 L35.5725,10.0575 L30.24,11.7 L27.9,10.8225 Z" fill="#E54011" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M28.1925,15.165 L31.1625,13.2525 L33.0525,19.62 L32.0625,21.645 L28.1925,15.165 Z" fill="#CA2317" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M23.76,22.725 L22.3425,5.4 L32.0625,21.645 L23.76,22.725 Z" fill="#B7DFF2" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M19.7325,27.1575 L23.76,22.725 L32.0625,21.645 L19.7325,27.1575 Z" fill="#E54011" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M0.1575,35.865 L19.7325,27.1575 L23.76,22.725 L17.37,22.0725 L0.1575,35.865 Z" fill="#FFCE33" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M0.9,28.755 L10.9575,27.225 L14.085,24.705 L12.555,24.03 L0.9,28.755 Z" fill="#D6B12D" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M4.5225,20.5425 L14.085,24.705 L17.37,22.0725 L4.5225,20.5425 Z" fill="#FFDE85" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M21.6225,11.6775 L20.4075,11.88 L17.37,22.0725 L20.655,20.0025 L21.6225,11.6775 Z" fill="#009EC6" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M23.4,18.2475 L20.655,20.0025 L22.3425,5.4 L23.4,18.2475 Z" fill="#5EAFCE" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M13.0275,13.05 L21.6225,11.6775 L22.005,8.28 L13.0275,13.05 Z" fill="#045972" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M12.105,5.085 L19.575,9.585 L22.005,8.28 L22.0725,7.8075 L12.105,5.085 Z" fill="#5A8591" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M13.5675,0.18 L20.3625,7.335 L22.0725,7.8075 L22.3425,5.4 L13.5675,0.18 Z" fill="#009EC6" sketch:type="MSShapeGroup"/>
|
||||||
|
<path d="M17.37,22.0725 L23.4,18.2475 L23.76,22.725 L17.37,22.0725 Z" fill="#F39804" sketch:type="MSShapeGroup"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</svg>
|
After Width: | Height: | Size: 3.0 KiB |
@ -25,7 +25,7 @@ entries:
|
|||||||
conditions: []
|
conditions: []
|
||||||
id: monitoring_provider
|
id: monitoring_provider
|
||||||
identifiers:
|
identifiers:
|
||||||
pk: 9994
|
pk: 9990
|
||||||
model: authentik_providers_oauth2.oauth2provider
|
model: authentik_providers_oauth2.oauth2provider
|
||||||
state: present
|
state: present
|
||||||
|
|
||||||
|
67
zammad.yaml.tmpl
Normal file
67
zammad.yaml.tmpl
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
name: zammad
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- attrs:
|
||||||
|
expression: return request.user.name
|
||||||
|
managed: null
|
||||||
|
name: 'Zammad SAML Mapping: name'
|
||||||
|
saml_name: name
|
||||||
|
conditions: []
|
||||||
|
identifiers:
|
||||||
|
name: zammad_name_mapping
|
||||||
|
id: zammad_name_mapping
|
||||||
|
model: authentik_providers_saml.samlpropertymapping
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- attrs:
|
||||||
|
expression: return request.user.email
|
||||||
|
managed: null
|
||||||
|
name: 'Zammad SAML Mapping: email'
|
||||||
|
saml_name: email
|
||||||
|
conditions: []
|
||||||
|
identifiers:
|
||||||
|
name: zammad_email_mapping
|
||||||
|
id: zammad_email_mapping
|
||||||
|
model: authentik_providers_saml.samlpropertymapping
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- attrs:
|
||||||
|
acs_url: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/callback
|
||||||
|
assertion_valid_not_before: minutes=-5
|
||||||
|
assertion_valid_not_on_or_after: minutes=5
|
||||||
|
audience: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, default-authentication-flow]]
|
||||||
|
authorization_flow: !Find [authentik_flows.flow, [slug, default-provider-authorization-implicit-consent]]
|
||||||
|
digest_algorithm: http://www.w3.org/2001/04/xmlenc#sha256
|
||||||
|
issuer: https://{{ env "ZAMMAD_DOMAIN" }}/auth/saml/metadata
|
||||||
|
name: zammad
|
||||||
|
property_mappings:
|
||||||
|
- !KeyOf zammad_name_mapping
|
||||||
|
- !KeyOf zammad_email_mapping
|
||||||
|
session_valid_not_on_or_after: minutes=86400
|
||||||
|
signature_algorithm: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
|
||||||
|
signing_kp: !Find [authentik_crypto.certificatekeypair, [name, authentik Self-signed Certificate]]
|
||||||
|
sp_binding: post
|
||||||
|
conditions: []
|
||||||
|
id: zammad_provider
|
||||||
|
identifiers:
|
||||||
|
pk: 9989
|
||||||
|
model: authentik_providers_saml.samlprovider
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- attrs:
|
||||||
|
meta_launch_url: https://{{ env "ZAMMAD_DOMAIN" }}
|
||||||
|
open_in_new_tab: true
|
||||||
|
policy_engine_mode: any
|
||||||
|
provider: !KeyOf zammad_provider
|
||||||
|
slug: zammad
|
||||||
|
conditions: []
|
||||||
|
id: zammad_application
|
||||||
|
identifiers:
|
||||||
|
name: Zammad
|
||||||
|
model: authentik_core.application
|
||||||
|
state: present
|
Reference in New Issue
Block a user