website/integrations: all: install -> installation (#12676)

* website/integrations: all: install -> installation

* fix for new integr 

Signed-off-by: 4d62 <git@sdko.org>

---------

Signed-off-by: 4d62 <git@sdko.org>
This commit is contained in:
4d62
2025-01-16 17:23:22 -05:00
committed by GitHub
parent 4597ee45f8
commit d111740f6b
82 changed files with 144 additions and 144 deletions

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Discord credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Discord

View File

@ -10,7 +10,7 @@ Adding Facebook as a source allows users to authenticate through authentik using
The following placeholders are used:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Facebook configuration

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Github credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `www.my.company` Homepage URL for your site
## Github

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Google credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Google

View File

@ -10,8 +10,8 @@ Allows users to authenticate using their Mailcow credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `mailcow.company` is the FQDN of the mailcow install.
- `authentik.company` is the FQDN of the authentik installation.
- `mailcow.company` is the FQDN of the mailcow installation.
## Mailcow

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Twitch credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Twitch

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their twitter credentials
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Twitter

View File

@ -20,8 +20,8 @@ sidebar_label: Actual Budget
The following placeholders are used in this guide:
- _actual.company_ is the FQDN of the Actual Budget install.
- _authentik.company_ is the FQDN of the authentik install.
- `actual.company` is the FQDN of the Actual Budget installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Apache Guacamole™
The following placeholders are used in this guide:
- `guacamole.company` is the FQDN of the Guacamole install.
- `authentik.company` is the FQDN of the authentik install.
- `guacamole.company` is the FQDN of the Guacamole installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: ArgoCD
The following placeholders are used in this guide:
- `argocd.company` is the FQDN of the ArgoCD install.
- `authentik.company` is the FQDN of the authentik install.
- `argocd.company` is the FQDN of the ArgoCD installation.
- `authentik.company` is the FQDN of the authentik installation.
:::note
Only settings that have been modified from default have been listed.

View File

@ -17,8 +17,8 @@ sidebar_label: Aruba Orchestrator
The following placeholders are used in this guide:
- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install.
- `authentik.company` is the FQDN of the authentik install.
- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator installation.
- `authentik.company` is the FQDN of the authentik installation.
- `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses.
## authentik Configuration

View File

@ -25,8 +25,8 @@ AWX is the open-source version of RHAAP. The term "AWX" will be used interchange
The following placeholders are used in this guide:
- `awx.company` is the FQDN of the AWX/RHAAP install.
- `authentik.company` is the FQDN of the authentik install.
- `awx.company` is the FQDN of the AWX/RHAAP installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Budibase
The following placeholders are used in this guide:
- `budibase.company` is the FQDN of the Budibase install.
- `authentik.company` is the FQDN of the authentik install.
- `budibase.company` is the FQDN of the Budibase installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Chronograf
The following placeholders are used in this guide:
- `chronograf.company` is the FQDN of your Chronograf install.
- `authentik.company` is the FQDN of your authentik install.
- `chronograf.company` is the FQDN of your Chronograf installation.
- `authentik.company` is the FQDN of your authentik installation.
## authentik configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Cloudflare Access
The following placeholders are used in this guide:
- `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate.

View File

@ -17,8 +17,8 @@ From https://en.wikipedia.org/wiki/DokuWiki
The following placeholders are used in this guide:
- `dokuwiki.company` is the FQDN of the DokiWiki install.
- `authentik.company` is the FQDN of the authentik install.
- `dokuwiki.company` is the FQDN of the DokiWiki installation.
- `authentik.company` is the FQDN of the authentik installation.
## DokuWiki configuration

View File

@ -18,8 +18,8 @@ sidebar_label: engomo
The following placeholders are used in this guide:
- `engomo.company` is the FQDN of the engomo install.
- `authentik.company` is the FQDN of the authentik install.
- `engomo.company` is the FQDN of the engomo installation.
- `authentik.company` is the FQDN of the authentik installation.
- `engomo.mapping` is the name of the Scope Mapping.
- `ak.cert` is the self-signed certificate that will be used for the service provider.

View File

@ -21,8 +21,8 @@ This guide does _not_ cover Team Mapping. Please refer to EspoCRM's [documentati
The following placeholders are used in this guide:
- `crm.<your_company>` is the FQDN of the EspoCRM install.
- `authentik.<your_company>` is the FQDN of the authentik install.
- `crm.<your_company>` is the FQDN of the EspoCRM installation.
- `authentik.<your_company>` is the FQDN of the authentik installation.
- `_SLUG_` is the slug you choose upon application create in authentik.
## authentik configuration

View File

@ -17,9 +17,9 @@ sidebar_label: Firezone
The following placeholders are used in this guide:
- `firezone.company` is the FQDN of the Firezone install.
- `firezone.company` is the FQDN of the Firezone installation.
- `authentik` is the unique ID used to generate logins for this provider.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -18,8 +18,8 @@ sidebar_label: FortiGate Admin Login
The following placeholders are used in this guide:
- `fgt.company` is the FQDN of the FortiGate install.
- `authentik.company` is the FQDN of the authentik install.
- `fgt.company` is the FQDN of the FortiGate installation.
- `authentik.company` is the FQDN of the authentik installation.
- `fgt.mapping` is the name of the SAML Property Mapping.
- `ak.cert` = The authentik self-signed certificate you use for the service provider.

View File

@ -19,8 +19,8 @@ sidebar_label: FortiManager
The following placeholders are used in this guide:
- `fgm.company` is the FQDN of the FortiManager install.
- `authentik.company` is the FQDN of the authentik install.
- `fgm.company` is the FQDN of the FortiManager installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -21,8 +21,8 @@ These instructions apply to all projects in the Frappe Family.
The following placeholders are used in this guide:
- `frappe.company` is the FQDN of the Frappe install.
- `authentik.company` is the FQDN of the authentik install.
- `frappe.company` is the FQDN of the Frappe installation.
- `authentik.company` is the FQDN of the authentik installation.
- `provider` is the name for the social login provider in Frappe.
## authentik configuration

View File

@ -17,9 +17,9 @@ sidebar_label: FreshRSS
The following placeholders are used in this guide:
- `freshrss.company` is the FQDN of the FreshRSS install.
- `freshrss.company` is the FQDN of the FreshRSS installation.
- `port` is the port on which the FreshRSS install is running (usually 443)
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Gatus
The following placeholders are used in this guide:
- `gatus.company` is the FQDN of the Gatus install.
- `authentik.company` is the FQDN of the authentik install.
- `gatus.company` is the FQDN of the Gatus installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Glitchtip
The following placeholders are used in this guide:
- `glitchtip.company` is the FQDN of the Glitchtip install.
- `authentik.company` is the FQDN of the authentik install.
- `glitchtip.company` is the FQDN of the Glitchtip installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -20,7 +20,7 @@ sidebar_label: GlobalProtect
The following placeholders are used in this guide:
- `gp.company` is the FQDN of the GlobalProtect portal.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
:::caution
A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication.

View File

@ -17,7 +17,7 @@ sidebar_label: Google Workspace
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `example.com` is the default E-mail address configured in Google workspace.
## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Grafana
The following placeholders are used in this guide:
- `grafana.company` is the FQDN of the Grafana install.
- `authentik.company` is the FQDN of the authentik install.
- `grafana.company` is the FQDN of the Grafana installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -19,8 +19,8 @@ sidebar_label: Gravitee
The following placeholders are used in this guide:
- `gravitee.company` is the FQDN of the Gravitee install.
- `authentik.company` is the FQDN of the authentik install.
- `gravitee.company` is the FQDN of the Gravitee installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Harbor
The following placeholders are used in this guide:
- `harbor.company` is the FQDN of the Harbor install.
- `authentik.company` is the FQDN of the authentik install.
- `harbor.company` is the FQDN of the Harbor installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: HedgeDoc
The following placeholders are used in this guide:
- `hedgedoc.company` is the FQDN of the HedgeDoc install.
- `authentik.company` is the FQDN of the authentik install.
- `hedgedoc.company` is the FQDN of the HedgeDoc installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Hoarder
The following placeholders are used in this guide:
- `hoarder.company` is the FQDN of the Hoarder install.
- `authentik.company` is the FQDN of the authentik install.
- `hoarder.company` is the FQDN of the Hoarder installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -27,8 +27,8 @@ For Home Assistant to work with authentik, a custom integration needs to be inst
The following placeholders are used in this guide:
- `hass.company` is the FQDN of the Home Assistant install.
- `authentik.company` is the FQDN of the authentik install.
- `hass.company` is the FQDN of the Home Assistant installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Immich
The following placeholders are used in this guide:
- `https://immich.company` is the URL used to access the Immich instance.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -29,8 +29,8 @@ An LDAP outpost must be deployed to use the Jellyfin LDAP plugin
The following placeholders are used in this guide:
- `jellyfin.company` is the FQDN of the Jellyfin install.
- `authentik.company` is the FQDN of the authentik install.
- `jellyfin.company` is the FQDN of the Jellyfin installation.
- `authentik.company` is the FQDN of the authentik installation.
- `ldap.company` the FQDN of the LDAP outpost.
- `dc=company,dc=com` the Base DN of the LDAP outpost.
- `ldap_bind_user` the username of the desired LDAP Bind User

View File

@ -17,8 +17,8 @@ sidebar_label: Jenkins
The following placeholders are used in this guide:
- `jenkins.company` is the FQDN of the Service install.
- `authentik.company` is the FQDN of the authentik install.
- `jenkins.company` is the FQDN of the Service installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Komga
The following placeholders are used in this guide:
- `komga.company` is the FQDN of the Komga install.
- `authentik.company` is the FQDN of the authentik install.
- `komga.company` is the FQDN of the Komga installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Linkwarden
The following placeholders are used in this guide:
- `linkwarden.company` is the FQDN of the Linkwarden install.
- `authentik.company` is the FQDN of the authentik install.
- `linkwarden.company` is the FQDN of the Linkwarden installation.
- `authentik.company` is the FQDN of the authentik installation.
## Linkwarden configuration
@ -36,7 +36,7 @@ After making these changes, restart your Docker containers to apply the new conf
## authentik configuration
1. Access the **Admin Interface** in on your authentik install.
1. Access the **Admin Interface** in on your authentik installation.
2. Create a new **OAuth2 / OpenID Provider**.
3. Note the generated **Client ID** and **Client Secret**.
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik`

View File

@ -17,8 +17,8 @@ sidebar_label: Mastodon
The following placeholders are used in this guide:
- `mastodon.company` is the FQDN of the mastodon install.
- `authentik.company` is the FQDN of the authentik install.
- `mastodon.company` is the FQDN of the mastodon installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Matrix Synapse
The following placeholders are used in this guide:
- `matrix.company` is the FQDN of the Matrix install.
- `authentik.company` is the FQDN of the authentik install.
- `matrix.company` is the FQDN of the Matrix installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -15,8 +15,8 @@ sidebar_label: MeshCentral
The following placeholders are used in this guide:
- `meshcentral.company` is the FQDN of the MeshCentral install.
- `authentik.company` is the FQDN of the authentik install.
- `meshcentral.company` is the FQDN of the MeshCentral installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: MinIO
The following placeholders are used in this guide:
- `minio.company` is the FQDN of the MinIO install.
- `authentik.company` is the FQDN of the authentik install.
- `minio.company` is the FQDN of the MinIO installation.
- `authentik.company` is the FQDN of the authentik installation.
### Mapping to MinIO policies

View File

@ -17,8 +17,8 @@ sidebar_label: Mobilizon
The following placeholders are used in this guide:
- `mobilizon.company` is the FQDN of the mobilizon install.
- `authentik.company` is the FQDN of the authentik install.
- `mobilizon.company` is the FQDN of the mobilizon installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: NetBird
The following placeholders are used in this guide:
- `netbird.company` is the FQDN of the NetBird install.
- `authentik.company` is the FQDN of the authentik install.
- `netbird.company` is the FQDN of the NetBird installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: NetBox
The following placeholders are used in this guide:
- `netbox.company` is the FQDN of the NetBox install.
- `authentik.company` is the FQDN of the authentik install.
- `netbox.company` is the FQDN of the NetBox installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters:

View File

@ -39,8 +39,8 @@ There are 3 ways to setup single sign on (SSO) for Nextcloud:
The following placeholders are used in this guide:
- `nextcloud.company` is the FQDN of the Nextcloud install.
- `authentik.company` is the FQDN of the authentik install.
- `nextcloud.company` is the FQDN of the Nextcloud installation.
- `authentik.company` is the FQDN of the authentik installation.
- `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy)
Lets start by thinking what user attributes need to be available in Nextcloud:
@ -228,8 +228,8 @@ If you do not have any relying parties accessing authentik from the outside, you
The following placeholders are used in this guide:
- `nextcloud.company` is the FQDN of the Nextcloud install.
- `authentik.company` is the FQDN of the authentik install.
- `nextcloud.company` is the FQDN of the Nextcloud installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters:

View File

@ -21,8 +21,8 @@ This is based on authentik 2024.6.0 and Observium CE 24.4.13528
The following placeholders are used in this guide:
- `observium.company` is the FQDN of the Observium install.
- `authentik.company` is the FQDN of the authentik install.
- `observium.company` is the FQDN of the Observium installation.
- `authentik.company` is the FQDN of the authentik installation.
This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website.

View File

@ -19,8 +19,8 @@ This integration leverages authentik's LDAP for the identity provider to achieve
The following placeholders are used in this guide:
- `organizr.company` is the FQDN of the Service install.
- `authentik.company` is the FQDN of the authentik install.
- `organizr.company` is the FQDN of the Service installation.
- `authentik.company` is the FQDN of the authentik installation.
Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`.

View File

@ -18,8 +18,8 @@ sidebar_label: Outline
The following placeholders are used in this guide:
- `outline.company` is the FQDN of the Outline install.
- `authentik.company` is the FQDN of the authentik install.
- `outline.company` is the FQDN of the Outline installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -23,7 +23,7 @@ The author of Paperless-ng recommends you do not expose Paperless outside your n
The following placeholders are used in this guide:
- `paperless.company` is the FQDN of the Paperless-ng install.
- `paperless.company` is the FQDN of the Paperless-ng installation.
Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth

View File

@ -17,8 +17,8 @@ sidebar_label: Paperless-ngx
The following placeholders are used in this guide:
- `paperless.company` is the FQDN of the Paperless-ngx install.
- `authentik.company` is the FQDN of the authentik install.
- `paperless.company` is the FQDN of the Paperless-ngx installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: PowerDNS-Admin
The following placeholders are used in this guide:
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin install.
- `authentik.company` is the FQDN of the authentik install.
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin installation.
- `authentik.company` is the FQDN of the authentik installation.
Create a SAML provider with the following parameters:

View File

@ -19,7 +19,7 @@ This integration leverages authentik's LDAP for the identity provider to achieve
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -22,7 +22,7 @@ Requires Proxmox VE 7.0 or newer.
The following placeholders are used in this guide:
- `proxmox.company` is the FQDN of the Proxmox VE server.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -18,8 +18,8 @@ sidebar_label: Rancher
The following placeholders are used in this guide:
- `rancher.company` is the FQDN of the Rancher install.
- `authentik.company` is the FQDN of the authentik install.
- `rancher.company` is the FQDN of the Rancher installation.
- `authentik.company` is the FQDN of the authentik installation.
Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following

View File

@ -21,7 +21,7 @@ The mail server must support XOAUTH2 for both SMTPD and IMAP/POP. Postfix SMTP s
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping
in the provider settings instead of the default oauth mapping.

View File

@ -19,8 +19,8 @@ sidebar_label: Semaphore
The following placeholders are used in this guide:
- `semaphore.company` is the FQDN of the Semaphore install.
- `authentik.company` is the FQDN of the authentik install.
- `semaphore.company` is the FQDN of the Semaphore installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,7 +17,7 @@ sidebar_label: Semgrep
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `devcompany` is the organization name on Semgrep Cloud platform.
## authentik configuration

View File

@ -18,8 +18,8 @@ sidebar_label: Sentry
The following placeholders are used in this guide:
- `sentry.company` is the FQDN of the Sentry install.
- `authentik.company` is the FQDN of the authentik install.
- `sentry.company` is the FQDN of the Sentry installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create a SAML Provider with the following values

View File

@ -22,7 +22,7 @@ Skyhigh has multiple points for SAML integration:
The following placeholder will be used throughout this document.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## Integration for Dashboard Administrator login

View File

@ -16,7 +16,7 @@ sidebar_label: Slack
The following placeholder will be used:
- You can use <kbd>slack.<em>company</em>></kbd> or <kbd><em>my-workspace</em>.slack.com</kbd> as the FQDN of your Slack instance.
- You can use <kbd>authentik.company</kbd> as the FQDN of the authentik install.
- You can use <kbd>authentik.company</kbd> as the FQDN of the authentik installation.
For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on).

View File

@ -26,8 +26,8 @@ built-in authentication.
The following placeholders are used in this guide:
- `inventory.company` is the FQDN of the snipe-it install.
- `authentik.company` is the FQDN of the authentik install.
- `inventory.company` is the FQDN of the snipe-it installation.
- `authentik.company` is the FQDN of the authentik installation.
- `snipeit-user` is the name of the authentik service account we will create.
- `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default)

View File

@ -17,8 +17,8 @@ sidebar_label: SonarQube
The following placeholders are used in this guide:
- `sonarqube.company` is the FQDN of the sonarqube install.
- `authentik.company` is the FQDN of the authentik install.
- `sonarqube.company` is the FQDN of the sonarqube installation.
- `authentik.company` is the FQDN of the authentik installation.
## Terraform provider

View File

@ -21,8 +21,8 @@ These instructions apply to all projects in the \*arr Family. If you use multipl
The following placeholders are used in this guide:
- `sonarr.company` is the FQDN of the Sonarr install.
- `authentik.company` is the FQDN of the authentik install.
- `sonarr.company` is the FQDN of the Sonarr installation.
- `authentik.company` is the FQDN of the authentik installation.
Create a Proxy Provider with the following values

View File

@ -22,7 +22,7 @@ Kerberos is also not supported.
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `ldap.baseDN` is the Base DN you configure in the LDAP provider.
- `ldap.domain` is (typically) an FQDN for your domain. Usually
it is just the components of your base DN. For example, if

View File

@ -22,7 +22,7 @@ This is tested with DSM 7.1 or newer.
The following placeholders are used in this guide:
- `synology.company` is the FQDN of the Synology DSM server.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Tautulli
The following placeholders are used in this guide:
- `tautulli.company` is the FQDN of the Tautulli install.
- `authentik.company` is the FQDN of the authentik install.
- `tautulli.company` is the FQDN of the Tautulli installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Setup

View File

@ -22,7 +22,7 @@ If you made any changes, e.g. using a different name for the user, make sure to
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io`
- `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice`

View File

@ -21,8 +21,8 @@ This setup assumes you will be using HTTPS as TrueCommand generates ACS and Redi
The following placeholders are used in this guide:
- `truecommand.company` is the FQDN of the snipe-it install.
- `authentik.company` is the FQDN of the authentik install.
- `truecommand.company` is the FQDN of the snipe-it installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and use the slug for later as `truenas-truecommand`.

View File

@ -22,7 +22,7 @@ This requires authentik 0.10.3 or newer.
The following placeholders are used in this guide:
- `landscape.company` is the FQDN of the Landscape server.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
Landscape uses the OpenID-Connect Protocol for single-sign on.

View File

@ -19,8 +19,8 @@ Uptime Kuma currently supports only a single user and no native SSO solution. To
The following placeholders are used in this guide:
- `uptime-kuma.company` is the FQDN of the Uptime Kuma install.
- `authentik.company` is the FQDN of the authentik install.
- `uptime-kuma.company` is the FQDN of the Uptime Kuma installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create a Proxy provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Veeam Enterprise Manager
The following placeholders are used in this guide:
- `veeam.company` is the FQDN of the Veeam Enterprise Manager install.
- `authentik.company` is the FQDN of the authentik install.
- `veeam.company` is the FQDN of the Veeam Enterprise Manager installation.
- `authentik.company` is the FQDN of the authentik installation.
You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to.

View File

@ -20,7 +20,7 @@ Integration with authentik requires VMware vCenter 8.03 or newer.
The following placeholders will be used in the examples below:
- `vcenter.company` is the FQDN of the vCenter server.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Weblate
The following placeholders are used in this guide:
- `weblate.company` is the FQDN of the Weblate install.
- `authentik.company` is the FQDN of the authentik install.
- `weblate.company` is the FQDN of the Weblate installation.
- `authentik.company` is the FQDN of the authentik installation.
- `weblate-slug` is the slug of the Weblate application
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Wekan
The following placeholders are used in this guide:
- `wekan.company` is the FQDN of the wekan install.
- `authentik.company` is the FQDN of the authentik install.
- `wekan.company` is the FQDN of the wekan installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: What's Up Docker
The following placeholders are used in this guide:
- `wud.company` is the FQDN of the WUD install.
- `authentik.company` is the FQDN of the authentik install.
- `wud.company` is the FQDN of the WUD installation.
- `authentik.company` is the FQDN of the authentik installation.
## WUD configuration
@ -35,7 +35,7 @@ After making these changes, restart your Docker containers to apply the new conf
## authentik configuration
1. Access the **Admin Interface** in on your authentik install.
1. Access the **Admin Interface** in on your authentik installation.
2. Create a new **OAuth2 / OpenID Provider**.
3. Note the generated **Client ID** and **Client Secret**.
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb`

View File

@ -21,8 +21,8 @@ Currently it is not possible to connect writefreely to authentik without making
The following placeholders are used in this guide:
- `writefreely.company` is the FQDN of the writefreely install.
- `authentik.company` is the FQDN of the authentik install.
- `writefreely.company` is the FQDN of the writefreely installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -23,7 +23,7 @@ If you are using the Xen Orchestra Appliance, the OIDC Plugin should be present.
The following placeholders are used in this guide:
- `xenorchestra.company` is the FQDN of the Xen Orchestra instance.
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
## authentik configuration

View File

@ -19,8 +19,8 @@ sidebar_label: Zabbix
The following placeholders are used in this guide:
- `zabbix.company` is the FQDN of the Zabbix install.
- `authentik.company` is the FQDN of the authentik install.
- `zabbix.company` is the FQDN of the Zabbix installation.
- `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -18,8 +18,8 @@ sidebar_label: Zammad
The following placeholders are used in this guide:
- `zammad.company` is the FQDN of the zammad install.
- `authentik.company` is the FQDN of the authentik install.
- `zammad.company` is the FQDN of the zammad installation.
- `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Zulip
The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install.
- `authentik.company` is the FQDN of the authentik installation.
- `zulip.company` is the FQDN of the Zulip instance.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Service Name
The following placeholders are used in this guide:
- `service.company` is the FQDN of the Service install. (Remove this for SaaS)
- `authentik.company` is the FQDN of the authentik install.
- `service.company` is the FQDN of the Service installation. (Remove this for SaaS)
- `authentik.company` is the FQDN of the authentik installation.
## Service configuration