website/integrations: all: install -> installation (#12676)
* website/integrations: all: install -> installation * fix for new integr Signed-off-by: 4d62 <git@sdko.org> --------- Signed-off-by: 4d62 <git@sdko.org>
This commit is contained in:
@ -10,7 +10,7 @@ Allows users to authenticate using their Discord credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Discord
|
||||
|
||||
|
@ -10,7 +10,7 @@ Adding Facebook as a source allows users to authenticate through authentik using
|
||||
|
||||
The following placeholders are used:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Facebook configuration
|
||||
|
||||
|
@ -10,7 +10,7 @@ Allows users to authenticate using their Github credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `www.my.company` Homepage URL for your site
|
||||
|
||||
## Github
|
||||
|
@ -10,7 +10,7 @@ Allows users to authenticate using their Google credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Google
|
||||
|
||||
|
@ -10,8 +10,8 @@ Allows users to authenticate using their Mailcow credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `mailcow.company` is the FQDN of the mailcow install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `mailcow.company` is the FQDN of the mailcow installation.
|
||||
|
||||
## Mailcow
|
||||
|
||||
|
@ -10,7 +10,7 @@ Allows users to authenticate using their Twitch credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Twitch
|
||||
|
||||
|
@ -10,7 +10,7 @@ Allows users to authenticate using their twitter credentials
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Twitter
|
||||
|
||||
|
@ -20,8 +20,8 @@ sidebar_label: Actual Budget
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- _actual.company_ is the FQDN of the Actual Budget install.
|
||||
- _authentik.company_ is the FQDN of the authentik install.
|
||||
- `actual.company` is the FQDN of the Actual Budget installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Apache Guacamole™
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `guacamole.company` is the FQDN of the Guacamole install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `guacamole.company` is the FQDN of the Guacamole installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: ArgoCD
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `argocd.company` is the FQDN of the ArgoCD install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `argocd.company` is the FQDN of the ArgoCD installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
:::note
|
||||
Only settings that have been modified from default have been listed.
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Aruba Orchestrator
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses.
|
||||
|
||||
## authentik Configuration
|
||||
|
@ -25,8 +25,8 @@ AWX is the open-source version of RHAAP. The term "AWX" will be used interchange
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `awx.company` is the FQDN of the AWX/RHAAP install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `awx.company` is the FQDN of the AWX/RHAAP installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Budibase
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `budibase.company` is the FQDN of the Budibase install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `budibase.company` is the FQDN of the Budibase installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Chronograf
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `chronograf.company` is the FQDN of your Chronograf install.
|
||||
- `authentik.company` is the FQDN of your authentik install.
|
||||
- `chronograf.company` is the FQDN of your Chronograf installation.
|
||||
- `authentik.company` is the FQDN of your authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -18,7 +18,7 @@ sidebar_label: Cloudflare Access
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate.
|
||||
|
||||
|
@ -17,8 +17,8 @@ From https://en.wikipedia.org/wiki/DokuWiki
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `dokuwiki.company` is the FQDN of the DokiWiki install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `dokuwiki.company` is the FQDN of the DokiWiki installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## DokuWiki configuration
|
||||
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: engomo
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `engomo.company` is the FQDN of the engomo install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `engomo.company` is the FQDN of the engomo installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `engomo.mapping` is the name of the Scope Mapping.
|
||||
- `ak.cert` is the self-signed certificate that will be used for the service provider.
|
||||
|
||||
|
@ -21,8 +21,8 @@ This guide does _not_ cover Team Mapping. Please refer to EspoCRM's [documentati
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `crm.<your_company>` is the FQDN of the EspoCRM install.
|
||||
- `authentik.<your_company>` is the FQDN of the authentik install.
|
||||
- `crm.<your_company>` is the FQDN of the EspoCRM installation.
|
||||
- `authentik.<your_company>` is the FQDN of the authentik installation.
|
||||
- `_SLUG_` is the slug you choose upon application create in authentik.
|
||||
|
||||
## authentik configuration
|
||||
|
@ -17,9 +17,9 @@ sidebar_label: Firezone
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `firezone.company` is the FQDN of the Firezone install.
|
||||
- `firezone.company` is the FQDN of the Firezone installation.
|
||||
- `authentik` is the unique ID used to generate logins for this provider.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: FortiGate Admin Login
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `fgt.company` is the FQDN of the FortiGate install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `fgt.company` is the FQDN of the FortiGate installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `fgt.mapping` is the name of the SAML Property Mapping.
|
||||
- `ak.cert` = The authentik self-signed certificate you use for the service provider.
|
||||
|
||||
|
@ -19,8 +19,8 @@ sidebar_label: FortiManager
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `fgm.company` is the FQDN of the FortiManager install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `fgm.company` is the FQDN of the FortiManager installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||
|
||||
|
@ -21,8 +21,8 @@ These instructions apply to all projects in the Frappe Family.
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `frappe.company` is the FQDN of the Frappe install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `frappe.company` is the FQDN of the Frappe installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `provider` is the name for the social login provider in Frappe.
|
||||
|
||||
## authentik configuration
|
||||
|
@ -17,9 +17,9 @@ sidebar_label: FreshRSS
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `freshrss.company` is the FQDN of the FreshRSS install.
|
||||
- `freshrss.company` is the FQDN of the FreshRSS installation.
|
||||
- `port` is the port on which the FreshRSS install is running (usually 443)
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Gatus
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `gatus.company` is the FQDN of the Gatus install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `gatus.company` is the FQDN of the Gatus installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Glitchtip
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `glitchtip.company` is the FQDN of the Glitchtip install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `glitchtip.company` is the FQDN of the Glitchtip installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -20,7 +20,7 @@ sidebar_label: GlobalProtect
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `gp.company` is the FQDN of the GlobalProtect portal.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
:::caution
|
||||
A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication.
|
||||
|
@ -17,7 +17,7 @@ sidebar_label: Google Workspace
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `example.com` is the default E-mail address configured in Google workspace.
|
||||
|
||||
## authentik Configuration
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Grafana
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `grafana.company` is the FQDN of the Grafana install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `grafana.company` is the FQDN of the Grafana installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -19,8 +19,8 @@ sidebar_label: Gravitee
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `gravitee.company` is the FQDN of the Gravitee install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `gravitee.company` is the FQDN of the Gravitee installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Harbor
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `harbor.company` is the FQDN of the Harbor install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `harbor.company` is the FQDN of the Harbor installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: HedgeDoc
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `hedgedoc.company` is the FQDN of the HedgeDoc install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `hedgedoc.company` is the FQDN of the HedgeDoc installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Hoarder
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `hoarder.company` is the FQDN of the Hoarder install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `hoarder.company` is the FQDN of the Hoarder installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -27,8 +27,8 @@ For Home Assistant to work with authentik, a custom integration needs to be inst
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `hass.company` is the FQDN of the Home Assistant install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `hass.company` is the FQDN of the Home Assistant installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -18,7 +18,7 @@ sidebar_label: Immich
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `https://immich.company` is the URL used to access the Immich instance.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -29,8 +29,8 @@ An LDAP outpost must be deployed to use the Jellyfin LDAP plugin
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `jellyfin.company` is the FQDN of the Jellyfin install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `jellyfin.company` is the FQDN of the Jellyfin installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `ldap.company` the FQDN of the LDAP outpost.
|
||||
- `dc=company,dc=com` the Base DN of the LDAP outpost.
|
||||
- `ldap_bind_user` the username of the desired LDAP Bind User
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Jenkins
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `jenkins.company` is the FQDN of the Service install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `jenkins.company` is the FQDN of the Service installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Komga
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `komga.company` is the FQDN of the Komga install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `komga.company` is the FQDN of the Komga installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Linkwarden
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `linkwarden.company` is the FQDN of the Linkwarden install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `linkwarden.company` is the FQDN of the Linkwarden installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Linkwarden configuration
|
||||
|
||||
@ -36,7 +36,7 @@ After making these changes, restart your Docker containers to apply the new conf
|
||||
|
||||
## authentik configuration
|
||||
|
||||
1. Access the **Admin Interface** in on your authentik install.
|
||||
1. Access the **Admin Interface** in on your authentik installation.
|
||||
2. Create a new **OAuth2 / OpenID Provider**.
|
||||
3. Note the generated **Client ID** and **Client Secret**.
|
||||
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik`
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Mastodon
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `mastodon.company` is the FQDN of the mastodon install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `mastodon.company` is the FQDN of the mastodon installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Matrix Synapse
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `matrix.company` is the FQDN of the Matrix install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `matrix.company` is the FQDN of the Matrix installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -15,8 +15,8 @@ sidebar_label: MeshCentral
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `meshcentral.company` is the FQDN of the MeshCentral install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `meshcentral.company` is the FQDN of the MeshCentral installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: MinIO
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `minio.company` is the FQDN of the MinIO install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `minio.company` is the FQDN of the MinIO installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
### Mapping to MinIO policies
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Mobilizon
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `mobilizon.company` is the FQDN of the mobilizon install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `mobilizon.company` is the FQDN of the mobilizon installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: NetBird
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `netbird.company` is the FQDN of the NetBird install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `netbird.company` is the FQDN of the NetBird installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: NetBox
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `netbox.company` is the FQDN of the NetBox install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `netbox.company` is the FQDN of the NetBox installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters:
|
||||
|
||||
|
@ -39,8 +39,8 @@ There are 3 ways to setup single sign on (SSO) for Nextcloud:
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `nextcloud.company` is the FQDN of the Nextcloud install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `nextcloud.company` is the FQDN of the Nextcloud installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy)
|
||||
|
||||
Lets start by thinking what user attributes need to be available in Nextcloud:
|
||||
@ -228,8 +228,8 @@ If you do not have any relying parties accessing authentik from the outside, you
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `nextcloud.company` is the FQDN of the Nextcloud install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `nextcloud.company` is the FQDN of the Nextcloud installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters:
|
||||
|
||||
|
@ -21,8 +21,8 @@ This is based on authentik 2024.6.0 and Observium CE 24.4.13528
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `observium.company` is the FQDN of the Observium install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `observium.company` is the FQDN of the Observium installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website.
|
||||
|
||||
|
@ -19,8 +19,8 @@ This integration leverages authentik's LDAP for the identity provider to achieve
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `organizr.company` is the FQDN of the Service install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `organizr.company` is the FQDN of the Service installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`.
|
||||
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: Outline
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `outline.company` is the FQDN of the Outline install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `outline.company` is the FQDN of the Outline installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -23,7 +23,7 @@ The author of Paperless-ng recommends you do not expose Paperless outside your n
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `paperless.company` is the FQDN of the Paperless-ng install.
|
||||
- `paperless.company` is the FQDN of the Paperless-ng installation.
|
||||
|
||||
Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Paperless-ngx
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `paperless.company` is the FQDN of the Paperless-ngx install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `paperless.company` is the FQDN of the Paperless-ngx installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: PowerDNS-Admin
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create a SAML provider with the following parameters:
|
||||
|
||||
|
@ -19,7 +19,7 @@ This integration leverages authentik's LDAP for the identity provider to achieve
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -22,7 +22,7 @@ Requires Proxmox VE 7.0 or newer.
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `proxmox.company` is the FQDN of the Proxmox VE server.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: Rancher
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `rancher.company` is the FQDN of the Rancher install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `rancher.company` is the FQDN of the Rancher installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following
|
||||
|
||||
|
@ -21,7 +21,7 @@ The mail server must support XOAUTH2 for both SMTPD and IMAP/POP. Postfix SMTP s
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping
|
||||
in the provider settings instead of the default oauth mapping.
|
||||
|
@ -19,8 +19,8 @@ sidebar_label: Semaphore
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `semaphore.company` is the FQDN of the Semaphore install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `semaphore.company` is the FQDN of the Semaphore installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,7 +17,7 @@ sidebar_label: Semgrep
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `devcompany` is the organization name on Semgrep Cloud platform.
|
||||
|
||||
## authentik configuration
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: Sentry
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `sentry.company` is the FQDN of the Sentry install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `sentry.company` is the FQDN of the Sentry installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik. Create a SAML Provider with the following values
|
||||
|
||||
|
@ -22,7 +22,7 @@ Skyhigh has multiple points for SAML integration:
|
||||
|
||||
The following placeholder will be used throughout this document.
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Integration for Dashboard Administrator login
|
||||
|
||||
|
@ -16,7 +16,7 @@ sidebar_label: Slack
|
||||
The following placeholder will be used:
|
||||
|
||||
- You can use <kbd>slack.<em>company</em>></kbd> or <kbd><em>my-workspace</em>.slack.com</kbd> as the FQDN of your Slack instance.
|
||||
- You can use <kbd>authentik.company</kbd> as the FQDN of the authentik install.
|
||||
- You can use <kbd>authentik.company</kbd> as the FQDN of the authentik installation.
|
||||
|
||||
For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on).
|
||||
|
||||
|
@ -26,8 +26,8 @@ built-in authentication.
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `inventory.company` is the FQDN of the snipe-it install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `inventory.company` is the FQDN of the snipe-it installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `snipeit-user` is the name of the authentik service account we will create.
|
||||
- `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default)
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: SonarQube
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `sonarqube.company` is the FQDN of the sonarqube install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `sonarqube.company` is the FQDN of the sonarqube installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Terraform provider
|
||||
|
||||
|
@ -21,8 +21,8 @@ These instructions apply to all projects in the \*arr Family. If you use multipl
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `sonarr.company` is the FQDN of the Sonarr install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `sonarr.company` is the FQDN of the Sonarr installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create a Proxy Provider with the following values
|
||||
|
||||
|
@ -22,7 +22,7 @@ Kerberos is also not supported.
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `ldap.baseDN` is the Base DN you configure in the LDAP provider.
|
||||
- `ldap.domain` is (typically) an FQDN for your domain. Usually
|
||||
it is just the components of your base DN. For example, if
|
||||
|
@ -22,7 +22,7 @@ This is tested with DSM 7.1 or newer.
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `synology.company` is the FQDN of the Synology DSM server.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Tautulli
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `tautulli.company` is the FQDN of the Tautulli install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `tautulli.company` is the FQDN of the Tautulli installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Setup
|
||||
|
||||
|
@ -22,7 +22,7 @@ If you made any changes, e.g. using a different name for the user, make sure to
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io`
|
||||
- `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice`
|
||||
|
||||
|
@ -21,8 +21,8 @@ This setup assumes you will be using HTTPS as TrueCommand generates ACS and Redi
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `truecommand.company` is the FQDN of the snipe-it install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `truecommand.company` is the FQDN of the snipe-it installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik and use the slug for later as `truenas-truecommand`.
|
||||
|
||||
|
@ -22,7 +22,7 @@ This requires authentik 0.10.3 or newer.
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `landscape.company` is the FQDN of the Landscape server.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Landscape uses the OpenID-Connect Protocol for single-sign on.
|
||||
|
||||
|
@ -19,8 +19,8 @@ Uptime Kuma currently supports only a single user and no native SSO solution. To
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `uptime-kuma.company` is the FQDN of the Uptime Kuma install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `uptime-kuma.company` is the FQDN of the Uptime Kuma installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik. Create a Proxy provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Veeam Enterprise Manager
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `veeam.company` is the FQDN of the Veeam Enterprise Manager install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `veeam.company` is the FQDN of the Veeam Enterprise Manager installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to.
|
||||
|
||||
|
@ -20,7 +20,7 @@ Integration with authentik requires VMware vCenter 8.03 or newer.
|
||||
The following placeholders will be used in the examples below:
|
||||
|
||||
- `vcenter.company` is the FQDN of the vCenter server.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Weblate
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `weblate.company` is the FQDN of the Weblate install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `weblate.company` is the FQDN of the Weblate installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `weblate-slug` is the slug of the Weblate application
|
||||
|
||||
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Wekan
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `wekan.company` is the FQDN of the wekan install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `wekan.company` is the FQDN of the wekan installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:
|
||||
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: What's Up Docker
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `wud.company` is the FQDN of the WUD install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `wud.company` is the FQDN of the WUD installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## WUD configuration
|
||||
|
||||
@ -35,7 +35,7 @@ After making these changes, restart your Docker containers to apply the new conf
|
||||
|
||||
## authentik configuration
|
||||
|
||||
1. Access the **Admin Interface** in on your authentik install.
|
||||
1. Access the **Admin Interface** in on your authentik installation.
|
||||
2. Create a new **OAuth2 / OpenID Provider**.
|
||||
3. Note the generated **Client ID** and **Client Secret**.
|
||||
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb`
|
||||
|
@ -21,8 +21,8 @@ Currently it is not possible to connect writefreely to authentik without making
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `writefreely.company` is the FQDN of the writefreely install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `writefreely.company` is the FQDN of the writefreely installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -23,7 +23,7 @@ If you are using the Xen Orchestra Appliance, the OIDC Plugin should be present.
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `xenorchestra.company` is the FQDN of the Xen Orchestra instance.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik configuration
|
||||
|
||||
|
@ -19,8 +19,8 @@ sidebar_label: Zabbix
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `zabbix.company` is the FQDN of the Zabbix install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `zabbix.company` is the FQDN of the Zabbix installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||
|
||||
|
@ -18,8 +18,8 @@ sidebar_label: Zammad
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `zammad.company` is the FQDN of the zammad install.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `zammad.company` is the FQDN of the zammad installation.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## authentik Configuration
|
||||
|
||||
|
@ -18,7 +18,7 @@ sidebar_label: Zulip
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
- `zulip.company` is the FQDN of the Zulip instance.
|
||||
|
||||
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||
|
@ -17,8 +17,8 @@ sidebar_label: Service Name
|
||||
|
||||
The following placeholders are used in this guide:
|
||||
|
||||
- `service.company` is the FQDN of the Service install. (Remove this for SaaS)
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
- `service.company` is the FQDN of the Service installation. (Remove this for SaaS)
|
||||
- `authentik.company` is the FQDN of the authentik installation.
|
||||
|
||||
## Service configuration
|
||||
|
||||
|
Reference in New Issue
Block a user