website: bump prettier from 3.5.3 to 3.6.0 in /website (#15199)
* website: bump prettier from 3.5.3 to 3.6.0 in /website Bumps [prettier](https://github.com/prettier/prettier) from 3.5.3 to 3.6.0. - [Release notes](https://github.com/prettier/prettier/releases) - [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md) - [Commits](https://github.com/prettier/prettier/compare/3.5.3...3.6.0) --- updated-dependencies: - dependency-name: prettier dependency-version: 3.6.0 dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * format Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
		| @ -29,7 +29,6 @@ To support the integration of 1Password with authentik, you need to create an ap | ||||
|  | ||||
| 1. Log in to authentik as an administrator, and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -89,7 +88,6 @@ To support automated user provisioning, you need to create a group, and a SCIM p | ||||
|  | ||||
| 1. Log in to authentik as an admin, and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Providers** and click **Create** | ||||
|  | ||||
|     - **Choose a Provider type**: select **SCIM** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (e.g. `1password-scim`), and the following required configurations. | ||||
|         - Set the **URL** to `scim-bridge.company`. | ||||
|  | ||||
| @ -32,7 +32,6 @@ To support the integration of Actual Budget with authentik, you need to create a | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -97,7 +97,6 @@ Apple Business Manager requires that we create three scope mappings for our OIDC | ||||
| 1. From the authentik Admin interface, navigate to **Customization -> Property Mappings** and click **Create**. | ||||
|  | ||||
| 2. Select **Scope Mapping** and use the following values: | ||||
|  | ||||
|     - **Name**: `Apple Business Manager profile` | ||||
|     - **Scope Name**: `profile` | ||||
|     - **Description**: _[optional]_ Set to inform user | ||||
| @ -122,7 +121,6 @@ Apple Business Manager requires that we create three scope mappings for our OIDC | ||||
| 1. On the **Property Mappings** list, click **Create**. | ||||
|  | ||||
| 2. Select **Scope Mapping** and use the following values: | ||||
|  | ||||
|     - **Name**: `Apple Business Manager ssf.read` | ||||
|     - **Scope Name**: `ssf.read` | ||||
|     - **Description**: _[optional]_ Set to inform user | ||||
| @ -135,7 +133,6 @@ Apple Business Manager requires that we create three scope mappings for our OIDC | ||||
| 1. On the **Property Mappings** list, click **Create**. | ||||
|  | ||||
| 2. Select **Scope Mapping** and use the following values: | ||||
|  | ||||
|     - **Name**: `Apple Business Manager ssf.manage` | ||||
|     - **Scope Name**: `ssf.manage` | ||||
|     - **Description**: _[optional]_ Set to inform user | ||||
| @ -154,7 +151,6 @@ You can either generate a new key or import an existing one. | ||||
|  | ||||
| 1. From the Admin interface, navigate to **System -> Certificates** | ||||
| 2. Click **Generate**, select **Signing Key**, and use the following values: | ||||
|  | ||||
|     - **Common Name**: `apple-business-manager` | ||||
|  | ||||
| 3. Click **Generate** and confirm that the new key is listed in the **Certificates** overview. | ||||
| @ -165,7 +161,6 @@ Alternatively, you can use an existing key if you have one available. | ||||
|  | ||||
| 1. From the Admin interface, navigate to **System -> Certificates**. | ||||
| 2. Click **Create** and use the following values: | ||||
|  | ||||
|     - **Name**: `apple-business-manager` | ||||
|     - **Certificate**: Paste in your certificate | ||||
|     - **Private Key**: _[optional]_ Pastein your private key | ||||
| @ -184,7 +179,6 @@ You can always find your provider's generated values by navigating to **Provider | ||||
|  | ||||
| 1. From the authentik Admin interface, navigate to **Applications -> Providers** and click **Create**. | ||||
| 2. For the **Provider Type** select **OAuth2/OpenID Provider**, click **Next**, and use the following values. | ||||
|  | ||||
|     - **Name**: `Apple Business Manager` | ||||
|     - **Authorization flow**: Select a flow that suits your organization's requirements. | ||||
|     - **Protocol settings**: | ||||
| @ -214,7 +208,6 @@ While the OIDC provider handles the authentication flow, you'll need to create a | ||||
| 1. From the authentik Admin interface, navigate to **Applications -> Providers** and click **Create**. | ||||
| 2. Select **Shared Signals Framework Provider** and use the following values. | ||||
|    Any fields that can be left as their default values are omitted from the list. | ||||
|  | ||||
|     - **Name** `Apple Business Manager SSF` | ||||
|     - **Signing Key**: `[Your Signing Key]` | ||||
|     - **Event Retention**: `days=30` | ||||
| @ -244,7 +237,6 @@ The authentik user you will use to test the stream connection to Apple Business | ||||
| ### 6. Create application | ||||
|  | ||||
| 1. From the authentik Admin interface, navigate to **Applications -> Applications**, click **Create**, and use the following values: | ||||
|  | ||||
|     - **Name**: Apple Business Manager | ||||
|     - **Slug**: `abm` | ||||
|     - **Provider**: `Apple Business Manager` | ||||
| @ -260,9 +252,7 @@ The authentik user you will use to test the stream connection to Apple Business | ||||
| Before proceeding to Apple Business Manager, let's go over the values you've copied from authentik. | ||||
|  | ||||
| 1. Verify that you have all the necessary values in your text editor: | ||||
|  | ||||
|     - From the `Apple Business Manager` provider: | ||||
|  | ||||
|         - [x] `Client ID` | ||||
|         - [x] `Client Secret` | ||||
|         - [x] `OpenID Configuration URL` | ||||
| @ -271,7 +261,6 @@ Before proceeding to Apple Business Manager, let's go over the values you've cop | ||||
|         - [x] `SSF Config URL` | ||||
|  | ||||
| 2. Modify URLs to include the default HTTPS port. Apple requires the port number to be included when providing the URLs in the configuration. | ||||
|  | ||||
|     - Add port 443 to the SSF Config URL that you copied from the `Apple Business Manager SSF` provider: | ||||
|  | ||||
|         ```diff | ||||
| @ -349,7 +338,6 @@ You're now ready to configure federated authentication with authentik. | ||||
| 3. To define how you want users to sign in, choose **Custom Identity Provider** and click **Continue**. | ||||
|  | ||||
| 4. On the **Set up your Custom Identity Provider** page, use the following values: | ||||
|  | ||||
|     - **Name**: `authentik` | ||||
|     - **Client ID**: _`Your Client ID`_ | ||||
|     - **Client Secret**: _`Your Client Secret`_ | ||||
| @ -387,7 +375,6 @@ When creating test users, ensure that their role is set to Standard (or Student) | ||||
|  | ||||
| 1. From the [Apple Business Manager dashboard](https://business.apple.com/), click **Users** on the sidebar, then click **Add**. | ||||
| 2. In the **Add New User** dialog, use the following values: | ||||
|  | ||||
|     - **First Name**: `Jessie` | ||||
|     - **Last Name**: `Lorem` | ||||
|     - **Email**: `jessie@authentik.company` | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of ArgoCD with authentik, you need to create an appli | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -40,7 +40,6 @@ To support the integration of Atlassian Cloud with authentik, you need to create | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|         - Note the application slug, it will be required when filling out the **Identity provider SSO URL** later on. | ||||
|     - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
|  | ||||
| @ -40,9 +40,7 @@ To support the integration of AWS with authentik using the classic IAM method, y | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property Mappings** and click **Create**. Create two **SAML Provider Property Mapping**s with the following settings: | ||||
|  | ||||
|     - **Role Mapping:** | ||||
|  | ||||
|         - **Name**: Choose a descriptive name | ||||
|         - **SAML Attribute Name**: `https://aws.amazon.com/SAML/Attributes/Role` | ||||
|         - **Friendly Name**: Leave blank | ||||
|  | ||||
| @ -72,7 +72,6 @@ Beszel uses PocketBase as its server backend, and when you install Beszel you au | ||||
| ## User Creation | ||||
|  | ||||
| 1. Manually Creating Users: | ||||
|  | ||||
|     - Users are not created automatically when logging in with authentik. The owner must manually create each user in Beszel. | ||||
|     - To create users, go to the System Settings where you configured OpenID Connect. | ||||
|     - The URL for user creation is: `https://beszel.company>/\_/#/collections?collection=pb_users_auth`. | ||||
|  | ||||
| @ -46,10 +46,8 @@ Bitwarden requires a first and last name for every user. However, authentik, by | ||||
|  | ||||
| 1. Log in to authentik as an administrator, and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property Mappings** and click **Create**. | ||||
|  | ||||
|     - **Select type**: select **Scope Mapping**. | ||||
|     - **Configure the Scope Mapping**: Provide a descriptive name (e.g. `Bitwarden Profile Scope`), and an optional description. | ||||
|  | ||||
|         - **Scope name**: `profile` | ||||
|         - **Expression**: | ||||
|  | ||||
| @ -70,7 +68,6 @@ Bitwarden requires a first and last name for every user. However, authentik, by | ||||
|  | ||||
| 1. Log in to authentik as an administrator, and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -90,7 +87,6 @@ Bitwarden requires a first and last name for every user. However, authentik, by | ||||
|  | ||||
| 1. Log in to the [Bitwarden dashboard](https://vault.bitwarden.com/#/login) as an administrator (choose `Accessing: bitwarden.eu` for Bitwarden accounts based in the EU). If you are using a self-hosted Bitwarden, go to `https://bitwarden.company/#/login`. | ||||
| 2. In the sidebar, navigate to **Admin Console** > **Settings** > **Single sign-on**, and enter the following settings: | ||||
|  | ||||
|     - **Allow SSO authentication**: Select this option. | ||||
|     - **SSO Identifier**: enter a globally unique SSO identifier (this is not required if using self-hosted Bitwarden, or if you have claimed a domain, see the [Bitwarden Claimed Domains documentation](https://bitwarden.com/help/claimed-domains/)). | ||||
|     - **Type**: `OIDC` | ||||
| @ -116,7 +112,6 @@ To support the integration of Bitwarden with authentik, you need to create an ap | ||||
|  | ||||
| 1. Log in to authentik as an administrator, and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Take note of the **slug** as it will be required later. | ||||
|     - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -44,7 +44,6 @@ To support the integration of BookStack with authentik, you need to create an ap | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Budibase with authentik, you need to create an app | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of FileRise with authentik, you need to create an app | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -38,11 +38,9 @@ The workflow to configure authentik as a single sign-on for Fleet involves creat | ||||
| 2. For the **App name** enter `Fleet` and click **Next**. | ||||
|  | ||||
| 3. For the **Provider Type** select **SAML**, click **Next**, and use the following values. | ||||
|  | ||||
|     - **Name**: `Fleet` | ||||
|     - **Authorization flow**: Select a flow that suits your organization's requirements. | ||||
|     - **Protocol settings**: | ||||
|  | ||||
|         - **Assertion Consumer Service URL**: `https://fleet.company/api/v1/fleet/sso/callback` | ||||
|  | ||||
|             :::info Requiring an End User License Agreement | ||||
| @ -63,7 +61,6 @@ The workflow to configure authentik as a single sign-on for Fleet involves creat | ||||
|         - **Audience**: `https://fleet.company` | ||||
|         - **Advanced protocol settings**: | ||||
|           (Any fields that can be left as their default values are omitted from the list below). | ||||
|  | ||||
|             - **Signing Certificate**: Select a certificate enable **Sign assertions** and **Sign responses**. | ||||
|             - **NameID Property Mapping**: `authentik default SAML Mapping: Email` | ||||
|  | ||||
| @ -90,7 +87,6 @@ With these prerequisites in place, authentik is now configured to act as a singl | ||||
| 2. In the **Organization settings** tab, click **Single sign-on options**. | ||||
|  | ||||
| 3. Check the box next to **Enable single sign-on** and use the following values: | ||||
|  | ||||
|     - **Identity provider name**: `authentik` | ||||
|     - **Entity ID**: `authentik` | ||||
|  | ||||
| @ -98,7 +94,6 @@ With these prerequisites in place, authentik is now configured to act as a singl | ||||
|  | ||||
|         Fleet's SSO configuration form will include two fields: **Metadata URL** and **Metadata**. | ||||
|         Only one of these fields is required, but you must provide at least one of them. | ||||
|  | ||||
|         - If you copied the **Metadata URL** from authentik, paste the URL you copied earlier into the **Metadata URL** field. | ||||
|  | ||||
|         - If you downloaded the metadata file from authentik, paste the contents of the XML file into the **Metadata** field. | ||||
| @ -115,7 +110,6 @@ To verify that authentik and Fleet are correctly configured, you can test the SS | ||||
|  | ||||
| 1. From the authentik Admin interface, navigate to **Directory -> Users** and click **Create**. | ||||
| 2. Enter the following details for the test user. All other fields can be left as their default values. | ||||
|  | ||||
|     - **Name**: `Jessie Lorem` | ||||
|     - **Email**: `jessie@authentik.company` | ||||
|  | ||||
| @ -124,7 +118,6 @@ To verify that authentik and Fleet are correctly configured, you can test the SS | ||||
| 4. From the Fleet Admin interface, navigate to **Settings -> Users** and click **Add user**. | ||||
|  | ||||
| 5. Enter the following details for the test user. All other fields can be left as their default values. | ||||
|  | ||||
|     - **Full Name**: `Jessie Lorem` | ||||
|     - **Email**: `jessie@authentik.company` | ||||
|     - **Authentication**: `Single sign-on` | ||||
|  | ||||
| @ -49,29 +49,23 @@ To support the integration of Frappe with authentik, you need to create an appli | ||||
| ## Frappe configuration | ||||
|  | ||||
| 1. **Navigate to Integrations** | ||||
|  | ||||
|     - From the Frappe main menu, go to **Integrations** and then select **Social Login Key**. | ||||
|  | ||||
| 2. **Add a New Social Login Key** | ||||
|  | ||||
|     - Click the black **+ New** button in the top-right corner. | ||||
|        | ||||
|  | ||||
| 3. **Enter the Required Settings** | ||||
|  | ||||
|     - **Client Credentials** | ||||
|  | ||||
|         - **Enable Social Login**: Turn the toggle to the **on** position. | ||||
|         - **Client ID**: Enter the Client ID from the authentik wizard. | ||||
|         - **Client Secret**: Enter the Client Secret from the authentik wizard. | ||||
|  | ||||
|     - **Configuration** | ||||
|  | ||||
|         - **Sign-ups**: Set to **Allow**. | ||||
|            | ||||
|  | ||||
|     - **Identity Details** | ||||
|  | ||||
|         - **Base URL**: `https://authentik.company/` | ||||
|         - **Client URLs**: | ||||
|             - **Authorize URL**: `/application/o/authorize/` | ||||
|  | ||||
| @ -91,7 +91,6 @@ You can add users to the groups at any point. | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property Mappings** and click **Create**. Create a **Scope Mapping** with the following configurations: | ||||
|  | ||||
|     - **Name**: Choose a descriptive name (.e.g `authentik gitea OAuth Mapping: OpenID 'gitea'`) | ||||
|     - **Scope name**: `gitea` | ||||
|     - **Expression**: | ||||
| @ -116,7 +115,6 @@ You can add users to the groups at any point. | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Providers** and click on the **Edit** icon of the Gitea provider. | ||||
| 3. Under **Advanced protocol settings** > **Scopes** add the following scopes to **Selected Scopes**: | ||||
|  | ||||
|     - `authentik default OAuth Mapping: OpenID 'email'` | ||||
|     - `authentik default OAuth Mapping: OpenID 'profile'` | ||||
|     - `authentik default OAuth Mapping: OpenID 'openid'` | ||||
|  | ||||
| @ -33,7 +33,6 @@ To support the integration of Harbor with authentik, you need to create an appli | ||||
| - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
| - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
|     - **Protocol Settings**: | ||||
|         - **Redirect URI**: | ||||
|             - Strict: `https://harbor.company/c/oidc/callback/`. | ||||
| @ -52,7 +51,6 @@ To support the integration of authentik with Harbor, you need to configure OIDC | ||||
| 1. Log in to the Harbor dashboard as an admin. | ||||
| 2. Navigate to **Configuration** and select the **Authentication** tab. | ||||
| 3. In the **Auth Mode** dropdown, select **OIDC** and provide the following required configurations. | ||||
|  | ||||
|     - **OIDC Provider Name**: `authentik` | ||||
|     - **OIDC Endpoint**: `https://authentik.company/application/o/harbor` | ||||
|     - **OIDC Client ID**: client ID from authentik | ||||
|  | ||||
| @ -34,7 +34,6 @@ This documentation lists only the settings that you need to change from their de | ||||
| ## authentik configuration | ||||
|  | ||||
| 1. Create a **Proxy Provider** under **Applications** > **Providers** using the following settings: | ||||
|  | ||||
|     - **Name**: Home Assistant | ||||
|     - **Authentication flow**: default-authentication-flow | ||||
|     - **Authorization flow**: default-provider-authorization-explicit-consent | ||||
| @ -42,7 +41,6 @@ This documentation lists only the settings that you need to change from their de | ||||
|     - **Internal Host**: `http://hass.company:8123` | ||||
|  | ||||
| 2. Create an **Application** under **Applications** > **Applications** using the following settings: | ||||
|  | ||||
|     - **Name**: Home Assistant | ||||
|     - **Slug**: homeassistant | ||||
|     - **Provider**: Home Assistant (the provider you created in step 1) | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Immich with authentik, you need to create an appli | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -131,7 +131,6 @@ https://raw.githubusercontent.com/9p4/jellyfin-plugin-sso/manifest-release/manif | ||||
| 6. Go back to the plugin tab. | ||||
| 7. Click the SSO-Auth plugin. | ||||
| 8. Fill out the Add / Update Provider Configuration: | ||||
|  | ||||
|     - Name of OID Provider: `authentik` | ||||
|     - OID Endpoint: `https://authentik.company/application/o/jellyfin/.well-known/openid-configuration` | ||||
|     - OpenID Client ID: ClientID from provider | ||||
| @ -140,7 +139,6 @@ https://raw.githubusercontent.com/9p4/jellyfin-plugin-sso/manifest-release/manif | ||||
|     - Enable Authorization by Plugin: **CHECKED** | ||||
|  | ||||
| 9. If you want to use the role claim then also fill out these: | ||||
|  | ||||
|     - Roles: roles to look for when authorizing access (should be done through authentik instead) | ||||
|     - Admin Roles: roles to look for when giving administrator privilege | ||||
|     - Role Claim: `groups` | ||||
|  | ||||
| @ -32,7 +32,6 @@ To support the integration of Knocknoc with authentik, you need to create an app | ||||
|  | ||||
| - **Select type**: Select **SAML Provider Property Mapping** as the type and click **Next**. | ||||
| - **Create SAML Provider Property Mapping**: | ||||
|  | ||||
|     - **Name**: provide a descriptive name (e.g. `SAML to Knocknoc realName`) | ||||
|     - **SAML Attribute Name**: `realName` | ||||
|     - **Expression**: | ||||
| @ -46,7 +45,6 @@ To support the integration of Knocknoc with authentik, you need to create an app | ||||
|  | ||||
| - **Select type**: Select **SAML Provider Property Mapping** as the type and click **Next**. | ||||
| - **Create SAML Provider Property Mapping**: | ||||
|  | ||||
|     - **Name**: provide a descriptive name (e.g. `SAML to Knocknoc groups`) | ||||
|     - **SAML Attribute Name**: `groups` | ||||
|     - **Expression**: | ||||
| @ -57,7 +55,6 @@ To support the integration of Knocknoc with authentik, you need to create an app | ||||
|  | ||||
| - **Select type**: Select **SAML Provider Property Mapping** as the type and click **Next**. | ||||
| - **Create SAML Provider Property Mapping**: | ||||
|  | ||||
|     - **Name**: provide a descriptive name (e.g. `SAML to Knocknoc session duration`) | ||||
|     - **SAML Attribute Name**: `sessionDuration` | ||||
|     - **Expression**: | ||||
| @ -97,7 +94,6 @@ This example will set session duration at 540 minutes. Change the value to match | ||||
|  | ||||
| 1. Log in to Knocknoc and navigate to **Admin** > **Settings** > **SAML** | ||||
| 2. Set the following configuration: | ||||
|  | ||||
|     - **Metadata URL**: **SAML Metadata URL** copied from the authentik provider. | ||||
|     - **Public URL**: `https://knocknoc.company` | ||||
|     - **Key file**: select a key file. | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Komodo with authentik, you need to create an appli | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -172,7 +172,6 @@ grep "RSA PRIVATE KEY" "Mautic Self-signed Certificate_private_key.pem" | ||||
|  | ||||
|     This will prompt you to enter values for the certificate which you can choose freely. | ||||
|     For some, you can use authentik's generated values: | ||||
|  | ||||
|     - **Organization Name**: `authentik` | ||||
|     - **Organizational Unit Name**: `Self-signed` | ||||
|     - **Common Name**: `Mautic Self-signed Certificate` | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Miniflux with authentik, you need to create an app | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name (e.g., `Miniflux`), an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: Select OAuth2/OpenID Provider as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. - Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later. - Set a `Strict` redirect URI to `https://miniflux.company/oauth2/oidc/callback` - Select any available signing key. | ||||
|  | ||||
| @ -76,10 +76,8 @@ If you want to control user storage and designate Nextcloud administrators, you | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property mappings** and click **Create**. | ||||
|  | ||||
|     - **Select type**: select **Scope mapping**. | ||||
|     - **Create Scope Mapping**: | ||||
|  | ||||
|         - **Name**: `Nextcloud Profile` | ||||
|         - **Scope name**: `nextcloud` | ||||
|         - **Expression**: | ||||
| @ -118,7 +116,6 @@ To connect to an existing Nextcloud user, set the `nextcloud_user_id` attribute | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -141,14 +138,12 @@ Depending on your Nextcloud configuration, you may need to use `https://nextclou | ||||
| 1. In Nextcloud, ensure that the **OpenID Connect user backend** app is installed. | ||||
| 2. Log in to Nextcloud as an administrator and navigate to **Settings** > **OpenID Connect**. | ||||
| 3. Click the **+** button and enter the following settings: | ||||
|  | ||||
|     - **Identifier**: `authentik` | ||||
|     - **Client ID**: Client ID from authentik | ||||
|     - **Client secret**: Client secret from authentik | ||||
|     - **Discovery endpoint**: `https://authentik.company/application/o/<application_slug>/.well-known/openid-configuration` | ||||
|     - **Scope**: `email nextcloud openid` | ||||
|     - Under **Attribute mappings**: | ||||
|  | ||||
|         - **User ID mapping**: `sub` (or `user_id` for existing users) | ||||
|         - **Display name mapping**: `name` | ||||
|         - **Email mapping**: `email` | ||||
| @ -207,7 +202,6 @@ If you require [server side encryption](https://docs.nextcloud.com/server/latest | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|         - Note the application slug because it will be required later. | ||||
|     - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
| @ -247,10 +241,8 @@ To configure group quotas you will need to create groups in authentik for each q | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property mappings** and click **Create**. | ||||
|  | ||||
|     - **Select type**: select **SAML Provider Property Mapping** as the property mapping type. | ||||
|     - **Create SAML Provider Property Mapping**: | ||||
|  | ||||
|         - **Name**: Provide a name for the property mapping. | ||||
|         - **SAML Attribute Name**: `nextcloud_quota` | ||||
|         - **Expression**: | ||||
| @ -279,10 +271,8 @@ To grant Nextcloud admin access to authentik users you will need to create a pro | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property mappings** and click **Create**. | ||||
|  | ||||
|     - **Select type**: select **SAML Provider Property Mapping** as the property mapping type. | ||||
|     - **Create SAML Provider Property Mapping**: | ||||
|  | ||||
|         - **Name**: Provide a name for the property mapping. | ||||
|         - **SAML Attribute Name**: `http://schemas.xmlsoap.org/claims/Group` | ||||
|         - **Expression**: | ||||
| @ -304,13 +294,11 @@ To grant Nextcloud admin access to authentik users you will need to create a pro | ||||
|  | ||||
| 1. In Nextcloud, ensure that the **SSO & SAML Authentication** app is installed. | ||||
| 2. Log in to Nextcloud as an administrator, navigate to **Settings** > **SSO & SAML Authentication**, and configure the following settings: | ||||
|  | ||||
|     - **Attribute to map the UID to**: `http://schemas.goauthentik.io/2021/02/saml/uid` | ||||
|  | ||||
|     :::danger | ||||
|     Using the UID attribute as username is **not recommended** because of its mutable nature. If you map to the username instead, [disable username changing](https://docs.goauthentik.io/docs/sys-mgmt/settings#allow-users-to-change-username) and set the UID attribute to `http://schemas.goauthentik.io/2021/02/saml/username`. | ||||
|     ::: | ||||
|  | ||||
|     - **Optional display name**: `authentik` | ||||
|     - **Identifier of the IdP entity**: `https://authentik.company` | ||||
|     - **URL target for authentication requests**: `https://authentik.company/application/saml/<application_slug>/sso/binding/redirect/` | ||||
| @ -347,7 +335,6 @@ This documentation lists only the settings that you need to change from their de | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **LDAP** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name) and the bind flow to use for this provider | ||||
| @ -359,7 +346,6 @@ This documentation lists only the settings that you need to change from their de | ||||
|  | ||||
| 1. Log in to authentik as an admin, and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Outposts** and click **Create**. | ||||
|  | ||||
|     - **Name**: provide a suitable name for the outpost. | ||||
|     - **Type**: `LDAP` | ||||
|     - Under applications, add the newly created Nextcloud application to **Selected Applications**. | ||||
| @ -371,9 +357,7 @@ This documentation lists only the settings that you need to change from their de | ||||
| 1. In Nextcloud, ensure that the **LDAP user and group backend** app is installed. | ||||
| 2. Log in to Nextcloud as an administrator. | ||||
| 3. Navigate to **Settings** > **LDAP user and group backend** and configure the following settings: | ||||
|  | ||||
|     - On the **Server** tab: | ||||
|  | ||||
|         - Click the **+** icon and enter the following settings: | ||||
|             - **Host**: enter the hostname/IP address of the authentik LDAP outpost preceded by `ldap://` or `ldaps://`. If using LDAPS you will also need to specify the certificate that is being used. | ||||
|             - **Port**: `389` or `636` for secure LDAP. | ||||
| @ -381,11 +365,9 @@ This documentation lists only the settings that you need to change from their de | ||||
|             - Under **Base DN**, enter the **Search base** of the authentik LDAP provider. | ||||
|  | ||||
|     - On the **Users** tab: | ||||
|  | ||||
|         - Set **Only these object classes** to `Users`. | ||||
|  | ||||
|     - On the **LDAP/AD integration** tab: | ||||
|  | ||||
|         - Uncheck **LDAP/AD Username**. | ||||
|         - Set **Other Attributes** to `cn`. | ||||
|         - Click **Expert** in the top right corner and enter these settings: | ||||
| @ -405,7 +387,6 @@ This documentation lists only the settings that you need to change from their de | ||||
|                 - **Email Field**: `mailPrimaryAddress` | ||||
|  | ||||
|     - On the **Groups** tab: | ||||
|  | ||||
|         - Set **Only these object classes** to `groups`. | ||||
|         - Select the authentik groups that require Nextcloud access. | ||||
|  | ||||
|  | ||||
| @ -85,7 +85,6 @@ To support the integration of Observium with authentik, you need to create an ap | ||||
|     ``` | ||||
|  | ||||
|     Meaning of variables: | ||||
|  | ||||
|     - `OIDCRedirectURI` is the same URI that is set for the authentik Provider. | ||||
|     - The `OIDCCryptoPassphrase` directive should be set to a random string, for more information, see [the official documentation](https://github.com/OpenIDC/mod_auth_openidc/blob/9c0909af71eb52283f4d3797e55d1efef64966f2/auth_openidc.conf#L15). | ||||
|     - `OIDCXForwardedHeaders` is necessary if your instance is behind a reverse proxy. If omitted, the module does not accept information from these headers. | ||||
|  | ||||
| @ -44,7 +44,6 @@ To support the integration of Omni with authentik, you need to create a property | ||||
| - **Choose a Provider type**: select SAML Provider as the provider type. | ||||
|  | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
|     - **ACS URL**: `https://omni.company/saml/acs` | ||||
|     - **Service Provider Binding**: `Post` | ||||
|     - **Audience**: `https://omni.company/saml/metadata` | ||||
|  | ||||
| @ -34,7 +34,6 @@ OpenProject requires a first and last name for each user. By default authentik o | ||||
|  | ||||
| - **Select type**: select **Scope Mapping** as the property mapping type. | ||||
| - **Configure the Scope Mapping**: Provide a descriptive name (e.g. `Open Project Profile Scope`), and an optional description | ||||
|  | ||||
|     - **Scope name**: `profile` | ||||
|     - **Expression**: | ||||
|  | ||||
|  | ||||
| @ -35,45 +35,36 @@ The configuration for each application is nearly identical, except for the **Cli | ||||
| - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
| - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
|     - Note the **Client ID**,**Client Secret**, and **slug** values because they will be required later. | ||||
|     - **Protocol settings:** | ||||
|  | ||||
|         **Web UI:** | ||||
|  | ||||
|         - **Signing Key**: Select any available signing key. | ||||
|         - **Client ID**: Use the value generated by authentik. | ||||
|         - **Client Secret**: Use the value generated by authentik. | ||||
|         - **Redirect URIs**: | ||||
|  | ||||
|             - Strict: `https://owncloud.company/apps/openidconnect/redirect` | ||||
|  | ||||
|         **Desktop Application** | ||||
|  | ||||
|         - **Signing Key**: Select any available signing key. | ||||
|         - **Client ID**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-id). | ||||
|         - **Client Secret**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-secret). | ||||
|         - **Redirect URIs**: | ||||
|  | ||||
|             - Regex: `http://localhost:\d+` | ||||
|             - Regex: `http://127.0.0.1:\d+` | ||||
|  | ||||
|         **Android Application** | ||||
|  | ||||
|         - **Signing Key**: Select any available signing key. | ||||
|         - **Client ID**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-id). | ||||
|         - **Client Secret**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-secret). | ||||
|         - **Redirect URI**: | ||||
|  | ||||
|             - Strict: `oc://android.owncloud.com` | ||||
|  | ||||
|         **iOS Application** | ||||
|  | ||||
|         - **Signing Key**: Select any available signing key. | ||||
|         - **Client ID**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-id). | ||||
|         - **Client Secret**: Use the predefined value found in the [ownCloud admin manual](https://doc.owncloud.com/server/latest/admin_manual/configuration/user/oidc/oidc.html#client-secret). | ||||
|         - **Redirect URI**: | ||||
|  | ||||
|             - Strict: `oc://ios.owncloud.com` | ||||
|  | ||||
|     - **Advanced protocol settings:** | ||||
| @ -96,7 +87,6 @@ For other reverse proxies, consult the provider-specific documentation for guida | ||||
| To enable OIDC functionality in ownCloud, follow these steps: | ||||
|  | ||||
| 1.  **Navigate to the Market**: | ||||
|  | ||||
|     - Access the Market by visiting: | ||||
|       `https://owncloud.company/apps/market/#/` | ||||
|       or by clicking the **Hamburger Menu** in the top-left corner of any page in your ownCloud deployment and selecting **Market**. | ||||
| @ -117,7 +107,6 @@ To enable OIDC functionality in ownCloud, follow these steps: | ||||
|     ::: | ||||
|  | ||||
| 3.  **Create the `oidc.config.php` File**: | ||||
|  | ||||
|     - Place a file named `oidc.config.php` in the same directory as the existing `config.php` file in your ownCloud installation. | ||||
|     - Files named with this pattern are treated as "override" files, allowing ownCloud to override matching configuration keys in the `config.php` file. | ||||
|  | ||||
| @ -202,7 +191,6 @@ For more information on other available configuration options, refer to the OIDC | ||||
| You have successfully configured OIDC authentication through authentik. Here's what you can expect next: | ||||
|  | ||||
| - **Login Behavior:** | ||||
|  | ||||
|     - If the `autoRedirectOnLoginPage` option is **set to false**, navigating to `https://owncloud.company` will present the standard login page, which now includes an "Log in with authentik" button (or any custom text defined in the `loginButtonName` field). | ||||
|     - If the `autoRedirectOnLoginPage` option is **set to true**, users will be automatically redirected to the authentik login page when attempting to access `https://owncloud.company`. | ||||
|  | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Pangolin with authentik, you need to create an app | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -44,7 +43,6 @@ To support the integration of Pangolin with authentik, you need to create an app | ||||
|  | ||||
| 1. Log in to Pangolin as an administrator. | ||||
| 2. Navigate to **Server Admin** > **Identity Providers**, and click **Add Identity Provider**. | ||||
|  | ||||
|     - Under **General Information**: | ||||
|         - **Name**: `authentik` | ||||
|         - **Auto Provision Users** _(optional)_: enable this option for authentik users to be automatically provisioned in Pangolin on first login. | ||||
|  | ||||
| @ -29,7 +29,6 @@ To support the integration of Paperless-ngx with authentik, you need to create a | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -33,7 +33,6 @@ To support the integration of pgAdmin with authentik, you need to create an appl | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -51,7 +50,6 @@ To configure OAuth in pgAdmin, you can either use the `config_local.py` file or | ||||
| ### Using `config_local.py` | ||||
|  | ||||
| 1. Locate or create the `config_local.py` file in the `/pgadmin4/` directory. | ||||
|  | ||||
|     - If the file does not exist, create it manually. | ||||
|  | ||||
| 2. Add the following configuration settings to `config_local.py`: | ||||
|  | ||||
| @ -39,34 +39,29 @@ You need to ensure users and groups exist before we proceed with the next steps. | ||||
| The groups are used for property mappings later to give the user the correct permission level in the application. For this documentation there is an example for each of the 3 main default permission levels and an easy way to visualise the differences between them. | ||||
|  | ||||
| 1. **Create test-user 0** | ||||
|  | ||||
|     - username: test-user0 | ||||
|     - Name: Test User0 | ||||
|     - Email: test-user0@domain.company | ||||
|     - path: users | ||||
|  | ||||
| 2. **Create test-user 1** | ||||
|  | ||||
|     - username: test-user1 | ||||
|     - Name: Test User1 | ||||
|     - Email: test-user1@domain.company | ||||
|     - path: users | ||||
|  | ||||
| 3. **Create test-user 2** | ||||
|  | ||||
|     - username: test-user2 | ||||
|     - Name: Test User2 | ||||
|     - Email: test-user2@domain.company | ||||
|     - path: users | ||||
|  | ||||
| 4. **Create all required groups (under _Directory/Groups_)** | ||||
|  | ||||
|     - admin-permission-group | ||||
|     - operator-permission-group | ||||
|     - guest-permission-group | ||||
|  | ||||
| 5. **Assign groups to users for testing** | ||||
|  | ||||
|     - admin-permission-group | ||||
|         - Select Directory -> Groups | ||||
|         - Select `admin-permission-group` | ||||
| @ -91,7 +86,6 @@ In order to support automatic user provisioning (JIT) with phpIPAM, additional S | ||||
| - Select Create -> SAML Property Mapping -> Next | ||||
|  | ||||
| 1. display_name | ||||
|  | ||||
|     - Name: phpipam-display-name | ||||
|     - SAML Attribute Name: display_name | ||||
|     - Expression: | ||||
| @ -101,7 +95,6 @@ In order to support automatic user provisioning (JIT) with phpIPAM, additional S | ||||
|     ``` | ||||
|  | ||||
| 2. email | ||||
|  | ||||
|     - Name: phpipam-email | ||||
|     - SAML Attribute Name: email | ||||
|     - Expression: | ||||
| @ -111,7 +104,6 @@ In order to support automatic user provisioning (JIT) with phpIPAM, additional S | ||||
|     ``` | ||||
|  | ||||
| 3. is_admin | ||||
|  | ||||
|     - Name: phpipam-is-admin | ||||
|     - SAML Attribute Name: is_admin | ||||
|     - Expression: | ||||
| @ -121,7 +113,6 @@ In order to support automatic user provisioning (JIT) with phpIPAM, additional S | ||||
|     ``` | ||||
|  | ||||
| 4. groups | ||||
|  | ||||
|     - Name: phpipam-groups | ||||
|     - SAML Attribute Name: groups | ||||
|     - Expression: | ||||
|  | ||||
| @ -47,7 +47,6 @@ To support the integration of Plesk with authentik, you need to create an applic | ||||
| ## Plesk configuration | ||||
|  | ||||
| 1. Install the OAuth login extension: | ||||
|  | ||||
|     - Log in to your Plesk installation. | ||||
|     - Navigate to **Extensions** in the left sidebar. | ||||
|     - Select **Extensions Catalog**. | ||||
| @ -55,12 +54,10 @@ To support the integration of Plesk with authentik, you need to create an applic | ||||
|     - Click **Install** next to the OAuth login extension. | ||||
|  | ||||
| 2. Enable and configure OAuth authentication: | ||||
|  | ||||
|     - After installation, select **Extensions** > **OAuth Login** in the left sidebar. | ||||
|     - Enable OAuth authentication using the toggle switch in the main configuration panel. | ||||
|  | ||||
| 3. In the same panel, configure these OAuth settings: | ||||
|  | ||||
|     - **Client ID**: Enter the Client ID from your authentik provider | ||||
|     - **Client Secret**: Enter the Client Secret from your authentik provider | ||||
|     - **Callback Host**: Enter your Plesk FQDN (example: `https://plesk.company`) | ||||
|  | ||||
| @ -49,12 +49,10 @@ To support the integration of Proxmox with authentik, you need to create an appl | ||||
| 1. Log in to the Proxmox VE web interface using an administrative account. | ||||
|  | ||||
| 2. Navigate to authentication source settings. | ||||
|  | ||||
|     - Go to **Datacenter** > **Permissions** > **Realms**. | ||||
|     - Click **Add** and select **Realm** to open the Add Realm dialog. | ||||
|  | ||||
| 3. Fill out the OpenID Connect settings. | ||||
|  | ||||
|     - In the dialog that appears, fill in the following details: | ||||
|         - **Issuer URL**: Enter the Issuer URL from authentik (found in your provider's overview tab), e.g., `https://authentik.company/application/o/proxmox/`. | ||||
|         - **Realm**: Enter a name for this authentication source, such as `authentik`. | ||||
| @ -69,15 +67,12 @@ To support the integration of Proxmox with authentik, you need to create an appl | ||||
|      | ||||
|  | ||||
| 4. **Save the configuration**. | ||||
|  | ||||
|     - Click **Add** to save the settings. | ||||
|  | ||||
| 5. **Assign permissions** | ||||
|  | ||||
|     - After setting up the authentication source, go to **Permissions** to assign roles and permissions for each user as needed. | ||||
|  | ||||
| 6. **Logging in** | ||||
|  | ||||
|     - Users can select this authentication method from the Proxmox login screen, or if set as default, it will be automatically selected. | ||||
|  | ||||
|      | ||||
|  | ||||
| @ -30,10 +30,8 @@ Push Security requires separate first and last names for each user, but authenti | ||||
|  | ||||
| 1. Log in to authentik as an administrator, and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property Mappings** and click **Create**. | ||||
|  | ||||
|     - **Select type**: select **SAML Provider Property Mapping** as the property mapping type. | ||||
|     - **Configure the SAML Provider Property Mapping**: | ||||
|  | ||||
|         - **Name**: `givenname` | ||||
|         - **SAML Attribute Name**: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname` | ||||
|         - **Expression**: | ||||
| @ -44,10 +42,8 @@ Push Security requires separate first and last names for each user, but authenti | ||||
|  | ||||
| 3. Click **Finish**. | ||||
| 4. Click **Create** to create the second property mapping. | ||||
|  | ||||
|     - **Select type**: select **SAML Provider Property Mapping** as the property mapping type. | ||||
|     - **Configure the SAML Provider Property Mapping**: | ||||
|  | ||||
|         - **Name**: `familyname` | ||||
|         - **SAML Attribute Name**: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname` | ||||
|         - **Expression**: | ||||
| @ -62,7 +58,6 @@ Push Security requires separate first and last names for each user, but authenti | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|         - Take note of the application slug as it will be required later on. | ||||
|     - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
|  | ||||
| @ -65,7 +65,6 @@ In Rocket.chat, follow the procedure below: | ||||
|  | ||||
|  | ||||
| 5. Scroll down to the new OAuth application, expand the dropdown, and enter the following settings: | ||||
|  | ||||
|     - Enable: Turn the radio button to the _on_ position | ||||
|     - URL: https://authentik.company/application/o | ||||
|     - Token Path: /token/ | ||||
|  | ||||
| @ -31,7 +31,6 @@ To support the integration of Semaphore with authentik, you need to create an ap | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -56,11 +56,9 @@ To support the integration of Stripe with authentik, you need to create a group, | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **SAML Provider** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
|         - Set the **ACS URL** to `https://dashboard.stripe.com/login/saml/consume`. | ||||
|         - Set the **Audience** to `https://dashboard.stripe.com/saml/metadata`. | ||||
|         - Set the **Service Provider Binding** to `Post`. | ||||
| @ -86,7 +84,6 @@ To support the integration of Stripe with authentik, you need to create a group, | ||||
| 3. Click **Add domain**, then input the domain that SSO users will use. For more information, see the [Stripe Proving Domain Owenership documentation](https://docs.stripe.com/get-started/account/sso/other#proving-domain-verification). | ||||
| 4. Once your domain is verified, click on the 3 dots next to the domain name, and click **Manage SSO Settings**. | ||||
| 5. Enter the following settings: | ||||
|  | ||||
|     - **Identity Provider URL**: `https://auth.domain.com/application/saml/stripe/sso/binding/redirect/` | ||||
|     - **Issuer ID**: `authentik` | ||||
|     - **Identity Provider Certificate**: Paste in the contents of your authentik signing certificate. | ||||
|  | ||||
| @ -48,7 +48,6 @@ To support the integration of Tailscale with authentik, you need to create an ap | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
| @ -35,7 +35,6 @@ To support the integration of Uptime Kuma with authentik, you need to create an | ||||
| - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
| - **Choose a Provider type**: select **Proxy Provider** as the provider type. | ||||
| - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
|  | ||||
|     - Set the **External host** to `https://uptime-kuma.company`. | ||||
|     - Set the **Internal host** to `http://uptime-kuma:3001` where `uptime-kuma:3001` is the hostname and port of your Uptime Kuma container. | ||||
|     - Under **Advanced protocol settings**, set **Unauthenticated Paths** to the following to allow unauthenticated access to the public status page: | ||||
|  | ||||
| @ -49,7 +49,6 @@ To support the integration of vCenter with authentik, you need to create an appl | ||||
| 2. Click **Change Provider** in the top-right corner, and then select **Okta** from the drop-down list. | ||||
|  | ||||
| 3. In the wizard, click **Run Prechecks**, select the confirmation box, and then click **Next** | ||||
|  | ||||
|     - Enter the **Directory Name**. For example `authentik` or any other name. | ||||
|     - Add a **Domain Name**. For example `authentik.company`. | ||||
|     - Click on the Plus (+) sign to show the default domain name. | ||||
| @ -57,7 +56,6 @@ To support the integration of vCenter with authentik, you need to create an appl | ||||
| 4. Click **Next**. | ||||
|  | ||||
| 5. On the OpenID Connect page, enter the following values: | ||||
|  | ||||
|     - Set **Identity Provider Name** to `authentik`. | ||||
|     - Set **Client Identifier** to the client ID from authentik. | ||||
|     - Set **Shared secret** to the client secret from authentik. | ||||
| @ -66,14 +64,12 @@ To support the integration of vCenter with authentik, you need to create an appl | ||||
| 6. Click **Next**, and then **Finish**. | ||||
|  | ||||
| 7. On the **Single Sign On -> Configuration** page, in the **User Provisioning** area, take the following steps: | ||||
|  | ||||
|     - Copy the **Tenant URL** and save to a safe place. | ||||
|     - Click on **Generate** to generate a SCIM token. | ||||
|     - Click **Generate** in the newly opened modal box. | ||||
|     - Copy the token and save to a safe place. | ||||
|  | ||||
| 8. Return to the authentik Admin interface. | ||||
|  | ||||
|     - Create a SCIM provider with the name `vcenter-scim`. | ||||
|     - Paste the Tenant URL into **URL** field for the provider. | ||||
|     - Paste the token you saved into the **Token** field. | ||||
| @ -84,7 +80,6 @@ To support the integration of vCenter with authentik, you need to create an appl | ||||
|     - Navigate to the provider and trigger a sync. | ||||
|  | ||||
| 9. Return to vCenter. | ||||
|  | ||||
|     - Navigate to **Administration -> Access Control -> Global Permissions**. | ||||
|     - Click **Add**. | ||||
|     - Select the Domain created above from the dropdown. | ||||
|  | ||||
| @ -38,7 +38,6 @@ To support the integration of Wazuh with authentik, you need to create a group, | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Customization** > **Property Mappings** and click **Create**. Create a **SAML Provider Property Mapping** with the following settings: | ||||
|  | ||||
|     - **Name**: Choose a descriptive name | ||||
|     - **SAML Attribute Name**: `Roles` | ||||
|     - **Friendly Name**: Leave blank | ||||
| @ -192,7 +191,6 @@ And the `metadata_file`, `kibana_url`, and `exchange_key` parameters in the `sam | ||||
| 2. On the Wazuh dashboard click the upper-left menu icon ☰ to open the menu, go to **Server management** -> **Security** -> **Roles mapping** | ||||
|  | ||||
| 3. Click **Create Role mapping** and configure the following parameters: | ||||
|  | ||||
|     - **Role Name**: set a name for the role mapping (e.g. authentik_admins) | ||||
|     - **Roles**: select a role (e.g.`administrator`) | ||||
|     - **Custom rules**: Click **Add new rule** and set: | ||||
|  | ||||
| @ -22,7 +22,6 @@ To support the integration of XCreds with authentik, you need to create an appli | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|     - **Choose a Provider type**: select **OAuth2/OpenID Connect** as the provider type. | ||||
|     - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. | ||||
| @ -47,7 +46,6 @@ After XCreds is installed on a target Mac you will need to configure it by creat | ||||
| [ProfileCreator](https://github.com/ProfileCreator/ProfileCreator) is an open source macOS application used to create configuration policies. It is required to create a configuration policy for XCreds. | ||||
|  | ||||
| 1. Open the **ProfileCreator** application and click on the `+` icon in the top left corner to create a new configuration policy: | ||||
|  | ||||
|     - Under **General** provide a descriptive Payload Display Name, Payload Description, and Payload Organization. | ||||
|  | ||||
| 2. Now you need to add a XCreds payload to the configuration policy. Click on the **Application Managed Preferences** icon in the left hand column that looks like an `A` (third icon from the left, in the left hand column). | ||||
|  | ||||
| @ -31,7 +31,6 @@ _Any specific info about this integration can go here._ | ||||
|  | ||||
| 1. Log in to authentik as an administrator and open the authentik Admin interface. | ||||
| 2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.) | ||||
|  | ||||
|     - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. | ||||
|         - _If there are any specific settings required, list them here. Refer to the [ownCloud integration documentation](https://github.com/goauthentik/authentik/blob/main/website/integrations/services/owncloud/index.md) for a complex requirements example._ | ||||
|     - **Choose a Provider type**: _If there is a specific provider type required, state that here._ | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	![49699333+dependabot[bot]@users.noreply.github.com](/assets/img/avatar_default.png) dependabot[bot]
					dependabot[bot]