website/integrations: all: install -> installation (#12676)

* website/integrations: all: install -> installation

* fix for new integr 

Signed-off-by: 4d62 <git@sdko.org>

---------

Signed-off-by: 4d62 <git@sdko.org>
This commit is contained in:
4d62
2025-01-16 17:23:22 -05:00
committed by GitHub
parent 4597ee45f8
commit d111740f6b
82 changed files with 144 additions and 144 deletions

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Discord credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Discord ## Discord

View File

@ -10,7 +10,7 @@ Adding Facebook as a source allows users to authenticate through authentik using
The following placeholders are used: The following placeholders are used:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Facebook configuration ## Facebook configuration

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Github credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `www.my.company` Homepage URL for your site - `www.my.company` Homepage URL for your site
## Github ## Github

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Google credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Google ## Google

View File

@ -10,8 +10,8 @@ Allows users to authenticate using their Mailcow credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `mailcow.company` is the FQDN of the mailcow install. - `mailcow.company` is the FQDN of the mailcow installation.
## Mailcow ## Mailcow

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their Twitch credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Twitch ## Twitch

View File

@ -10,7 +10,7 @@ Allows users to authenticate using their twitter credentials
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Twitter ## Twitter

View File

@ -20,8 +20,8 @@ sidebar_label: Actual Budget
The following placeholders are used in this guide: The following placeholders are used in this guide:
- _actual.company_ is the FQDN of the Actual Budget install. - `actual.company` is the FQDN of the Actual Budget installation.
- _authentik.company_ is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Apache Guacamole™
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `guacamole.company` is the FQDN of the Guacamole install. - `guacamole.company` is the FQDN of the Guacamole installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: ArgoCD
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `argocd.company` is the FQDN of the ArgoCD install. - `argocd.company` is the FQDN of the ArgoCD installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
:::note :::note
Only settings that have been modified from default have been listed. Only settings that have been modified from default have been listed.

View File

@ -17,8 +17,8 @@ sidebar_label: Aruba Orchestrator
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install. - `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses. - `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses.
## authentik Configuration ## authentik Configuration

View File

@ -25,8 +25,8 @@ AWX is the open-source version of RHAAP. The term "AWX" will be used interchange
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `awx.company` is the FQDN of the AWX/RHAAP install. - `awx.company` is the FQDN of the AWX/RHAAP installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Budibase
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `budibase.company` is the FQDN of the Budibase install. - `budibase.company` is the FQDN of the Budibase installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Chronograf
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `chronograf.company` is the FQDN of your Chronograf install. - `chronograf.company` is the FQDN of your Chronograf installation.
- `authentik.company` is the FQDN of your authentik install. - `authentik.company` is the FQDN of your authentik installation.
## authentik configuration ## authentik configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Cloudflare Access
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain. - `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate. To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate.

View File

@ -17,8 +17,8 @@ From https://en.wikipedia.org/wiki/DokuWiki
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `dokuwiki.company` is the FQDN of the DokiWiki install. - `dokuwiki.company` is the FQDN of the DokiWiki installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## DokuWiki configuration ## DokuWiki configuration

View File

@ -18,8 +18,8 @@ sidebar_label: engomo
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `engomo.company` is the FQDN of the engomo install. - `engomo.company` is the FQDN of the engomo installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `engomo.mapping` is the name of the Scope Mapping. - `engomo.mapping` is the name of the Scope Mapping.
- `ak.cert` is the self-signed certificate that will be used for the service provider. - `ak.cert` is the self-signed certificate that will be used for the service provider.

View File

@ -21,8 +21,8 @@ This guide does _not_ cover Team Mapping. Please refer to EspoCRM's [documentati
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `crm.<your_company>` is the FQDN of the EspoCRM install. - `crm.<your_company>` is the FQDN of the EspoCRM installation.
- `authentik.<your_company>` is the FQDN of the authentik install. - `authentik.<your_company>` is the FQDN of the authentik installation.
- `_SLUG_` is the slug you choose upon application create in authentik. - `_SLUG_` is the slug you choose upon application create in authentik.
## authentik configuration ## authentik configuration

View File

@ -17,9 +17,9 @@ sidebar_label: Firezone
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `firezone.company` is the FQDN of the Firezone install. - `firezone.company` is the FQDN of the Firezone installation.
- `authentik` is the unique ID used to generate logins for this provider. - `authentik` is the unique ID used to generate logins for this provider.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -18,8 +18,8 @@ sidebar_label: FortiGate Admin Login
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `fgt.company` is the FQDN of the FortiGate install. - `fgt.company` is the FQDN of the FortiGate installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `fgt.mapping` is the name of the SAML Property Mapping. - `fgt.mapping` is the name of the SAML Property Mapping.
- `ak.cert` = The authentik self-signed certificate you use for the service provider. - `ak.cert` = The authentik self-signed certificate you use for the service provider.

View File

@ -19,8 +19,8 @@ sidebar_label: FortiManager
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `fgm.company` is the FQDN of the FortiManager install. - `fgm.company` is the FQDN of the FortiManager installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters: Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -21,8 +21,8 @@ These instructions apply to all projects in the Frappe Family.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `frappe.company` is the FQDN of the Frappe install. - `frappe.company` is the FQDN of the Frappe installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `provider` is the name for the social login provider in Frappe. - `provider` is the name for the social login provider in Frappe.
## authentik configuration ## authentik configuration

View File

@ -17,9 +17,9 @@ sidebar_label: FreshRSS
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `freshrss.company` is the FQDN of the FreshRSS install. - `freshrss.company` is the FQDN of the FreshRSS installation.
- `port` is the port on which the FreshRSS install is running (usually 443) - `port` is the port on which the FreshRSS install is running (usually 443)
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Gatus
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `gatus.company` is the FQDN of the Gatus install. - `gatus.company` is the FQDN of the Gatus installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Glitchtip
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `glitchtip.company` is the FQDN of the Glitchtip install. - `glitchtip.company` is the FQDN of the Glitchtip installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -20,7 +20,7 @@ sidebar_label: GlobalProtect
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `gp.company` is the FQDN of the GlobalProtect portal. - `gp.company` is the FQDN of the GlobalProtect portal.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
:::caution :::caution
A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication. A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication.

View File

@ -17,7 +17,7 @@ sidebar_label: Google Workspace
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `example.com` is the default E-mail address configured in Google workspace. - `example.com` is the default E-mail address configured in Google workspace.
## authentik Configuration ## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Grafana
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `grafana.company` is the FQDN of the Grafana install. - `grafana.company` is the FQDN of the Grafana installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -19,8 +19,8 @@ sidebar_label: Gravitee
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `gravitee.company` is the FQDN of the Gravitee install. - `gravitee.company` is the FQDN of the Gravitee installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Harbor
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `harbor.company` is the FQDN of the Harbor install. - `harbor.company` is the FQDN of the Harbor installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: HedgeDoc
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `hedgedoc.company` is the FQDN of the HedgeDoc install. - `hedgedoc.company` is the FQDN of the HedgeDoc installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Hoarder
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `hoarder.company` is the FQDN of the Hoarder install. - `hoarder.company` is the FQDN of the Hoarder installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -27,8 +27,8 @@ For Home Assistant to work with authentik, a custom integration needs to be inst
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `hass.company` is the FQDN of the Home Assistant install. - `hass.company` is the FQDN of the Home Assistant installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Immich
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `https://immich.company` is the URL used to access the Immich instance. - `https://immich.company` is the URL used to access the Immich instance.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -29,8 +29,8 @@ An LDAP outpost must be deployed to use the Jellyfin LDAP plugin
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `jellyfin.company` is the FQDN of the Jellyfin install. - `jellyfin.company` is the FQDN of the Jellyfin installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `ldap.company` the FQDN of the LDAP outpost. - `ldap.company` the FQDN of the LDAP outpost.
- `dc=company,dc=com` the Base DN of the LDAP outpost. - `dc=company,dc=com` the Base DN of the LDAP outpost.
- `ldap_bind_user` the username of the desired LDAP Bind User - `ldap_bind_user` the username of the desired LDAP Bind User

View File

@ -17,8 +17,8 @@ sidebar_label: Jenkins
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `jenkins.company` is the FQDN of the Service install. - `jenkins.company` is the FQDN of the Service installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an OAuth2/OpenID provider with the following parameters: Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Komga
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `komga.company` is the FQDN of the Komga install. - `komga.company` is the FQDN of the Komga installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Linkwarden
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `linkwarden.company` is the FQDN of the Linkwarden install. - `linkwarden.company` is the FQDN of the Linkwarden installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Linkwarden configuration ## Linkwarden configuration
@ -36,7 +36,7 @@ After making these changes, restart your Docker containers to apply the new conf
## authentik configuration ## authentik configuration
1. Access the **Admin Interface** in on your authentik install. 1. Access the **Admin Interface** in on your authentik installation.
2. Create a new **OAuth2 / OpenID Provider**. 2. Create a new **OAuth2 / OpenID Provider**.
3. Note the generated **Client ID** and **Client Secret**. 3. Note the generated **Client ID** and **Client Secret**.
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik` 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik`

View File

@ -17,8 +17,8 @@ sidebar_label: Mastodon
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `mastodon.company` is the FQDN of the mastodon install. - `mastodon.company` is the FQDN of the mastodon installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Matrix Synapse
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `matrix.company` is the FQDN of the Matrix install. - `matrix.company` is the FQDN of the Matrix installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -15,8 +15,8 @@ sidebar_label: MeshCentral
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `meshcentral.company` is the FQDN of the MeshCentral install. - `meshcentral.company` is the FQDN of the MeshCentral installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: MinIO
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `minio.company` is the FQDN of the MinIO install. - `minio.company` is the FQDN of the MinIO installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
### Mapping to MinIO policies ### Mapping to MinIO policies

View File

@ -17,8 +17,8 @@ sidebar_label: Mobilizon
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `mobilizon.company` is the FQDN of the mobilizon install. - `mobilizon.company` is the FQDN of the mobilizon installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: NetBird
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `netbird.company` is the FQDN of the NetBird install. - `netbird.company` is the FQDN of the NetBird installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: NetBox
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `netbox.company` is the FQDN of the NetBox install. - `netbox.company` is the FQDN of the NetBox installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters: Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters:

View File

@ -39,8 +39,8 @@ There are 3 ways to setup single sign on (SSO) for Nextcloud:
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `nextcloud.company` is the FQDN of the Nextcloud install. - `nextcloud.company` is the FQDN of the Nextcloud installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy) - `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy)
Lets start by thinking what user attributes need to be available in Nextcloud: Lets start by thinking what user attributes need to be available in Nextcloud:
@ -228,8 +228,8 @@ If you do not have any relying parties accessing authentik from the outside, you
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `nextcloud.company` is the FQDN of the Nextcloud install. - `nextcloud.company` is the FQDN of the Nextcloud installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters: Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters:

View File

@ -21,8 +21,8 @@ This is based on authentik 2024.6.0 and Observium CE 24.4.13528
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `observium.company` is the FQDN of the Observium install. - `observium.company` is the FQDN of the Observium installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website. This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website.

View File

@ -19,8 +19,8 @@ This integration leverages authentik's LDAP for the identity provider to achieve
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `organizr.company` is the FQDN of the Service install. - `organizr.company` is the FQDN of the Service installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`. Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`.

View File

@ -18,8 +18,8 @@ sidebar_label: Outline
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `outline.company` is the FQDN of the Outline install. - `outline.company` is the FQDN of the Outline installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -23,7 +23,7 @@ The author of Paperless-ng recommends you do not expose Paperless outside your n
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `paperless.company` is the FQDN of the Paperless-ng install. - `paperless.company` is the FQDN of the Paperless-ng installation.
Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth

View File

@ -17,8 +17,8 @@ sidebar_label: Paperless-ngx
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `paperless.company` is the FQDN of the Paperless-ngx install. - `paperless.company` is the FQDN of the Paperless-ngx installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -17,8 +17,8 @@ sidebar_label: PowerDNS-Admin
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin install. - `pdns-admin.company` is the FQDN of the PowerDNS-Admin installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create a SAML provider with the following parameters: Create a SAML provider with the following parameters:

View File

@ -19,7 +19,7 @@ This integration leverages authentik's LDAP for the identity provider to achieve
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -22,7 +22,7 @@ Requires Proxmox VE 7.0 or newer.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `proxmox.company` is the FQDN of the Proxmox VE server. - `proxmox.company` is the FQDN of the Proxmox VE server.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -18,8 +18,8 @@ sidebar_label: Rancher
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `rancher.company` is the FQDN of the Rancher install. - `rancher.company` is the FQDN of the Rancher installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following

View File

@ -21,7 +21,7 @@ The mail server must support XOAUTH2 for both SMTPD and IMAP/POP. Postfix SMTP s
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping
in the provider settings instead of the default oauth mapping. in the provider settings instead of the default oauth mapping.

View File

@ -19,8 +19,8 @@ sidebar_label: Semaphore
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `semaphore.company` is the FQDN of the Semaphore install. - `semaphore.company` is the FQDN of the Semaphore installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,7 +17,7 @@ sidebar_label: Semgrep
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `devcompany` is the organization name on Semgrep Cloud platform. - `devcompany` is the organization name on Semgrep Cloud platform.
## authentik configuration ## authentik configuration

View File

@ -18,8 +18,8 @@ sidebar_label: Sentry
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `sentry.company` is the FQDN of the Sentry install. - `sentry.company` is the FQDN of the Sentry installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create a SAML Provider with the following values Create an application in authentik. Create a SAML Provider with the following values

View File

@ -22,7 +22,7 @@ Skyhigh has multiple points for SAML integration:
The following placeholder will be used throughout this document. The following placeholder will be used throughout this document.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Integration for Dashboard Administrator login ## Integration for Dashboard Administrator login

View File

@ -16,7 +16,7 @@ sidebar_label: Slack
The following placeholder will be used: The following placeholder will be used:
- You can use <kbd>slack.<em>company</em>></kbd> or <kbd><em>my-workspace</em>.slack.com</kbd> as the FQDN of your Slack instance. - You can use <kbd>slack.<em>company</em>></kbd> or <kbd><em>my-workspace</em>.slack.com</kbd> as the FQDN of your Slack instance.
- You can use <kbd>authentik.company</kbd> as the FQDN of the authentik install. - You can use <kbd>authentik.company</kbd> as the FQDN of the authentik installation.
For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on). For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on).

View File

@ -26,8 +26,8 @@ built-in authentication.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `inventory.company` is the FQDN of the snipe-it install. - `inventory.company` is the FQDN of the snipe-it installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `snipeit-user` is the name of the authentik service account we will create. - `snipeit-user` is the name of the authentik service account we will create.
- `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default) - `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default)

View File

@ -17,8 +17,8 @@ sidebar_label: SonarQube
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `sonarqube.company` is the FQDN of the sonarqube install. - `sonarqube.company` is the FQDN of the sonarqube installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Terraform provider ## Terraform provider

View File

@ -21,8 +21,8 @@ These instructions apply to all projects in the \*arr Family. If you use multipl
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `sonarr.company` is the FQDN of the Sonarr install. - `sonarr.company` is the FQDN of the Sonarr installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create a Proxy Provider with the following values Create a Proxy Provider with the following values

View File

@ -22,7 +22,7 @@ Kerberos is also not supported.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `ldap.baseDN` is the Base DN you configure in the LDAP provider. - `ldap.baseDN` is the Base DN you configure in the LDAP provider.
- `ldap.domain` is (typically) an FQDN for your domain. Usually - `ldap.domain` is (typically) an FQDN for your domain. Usually
it is just the components of your base DN. For example, if it is just the components of your base DN. For example, if

View File

@ -22,7 +22,7 @@ This is tested with DSM 7.1 or newer.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `synology.company` is the FQDN of the Synology DSM server. - `synology.company` is the FQDN of the Synology DSM server.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Tautulli
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `tautulli.company` is the FQDN of the Tautulli install. - `tautulli.company` is the FQDN of the Tautulli installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Setup ## authentik Setup

View File

@ -22,7 +22,7 @@ If you made any changes, e.g. using a different name for the user, make sure to
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io` - `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io`
- `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice` - `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice`

View File

@ -21,8 +21,8 @@ This setup assumes you will be using HTTPS as TrueCommand generates ACS and Redi
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `truecommand.company` is the FQDN of the snipe-it install. - `truecommand.company` is the FQDN of the snipe-it installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and use the slug for later as `truenas-truecommand`. Create an application in authentik and use the slug for later as `truenas-truecommand`.

View File

@ -22,7 +22,7 @@ This requires authentik 0.10.3 or newer.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `landscape.company` is the FQDN of the Landscape server. - `landscape.company` is the FQDN of the Landscape server.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Landscape uses the OpenID-Connect Protocol for single-sign on. Landscape uses the OpenID-Connect Protocol for single-sign on.

View File

@ -19,8 +19,8 @@ Uptime Kuma currently supports only a single user and no native SSO solution. To
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `uptime-kuma.company` is the FQDN of the Uptime Kuma install. - `uptime-kuma.company` is the FQDN of the Uptime Kuma installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create a Proxy provider with the following parameters: Create an application in authentik. Create a Proxy provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Veeam Enterprise Manager
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `veeam.company` is the FQDN of the Veeam Enterprise Manager install. - `veeam.company` is the FQDN of the Veeam Enterprise Manager installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to. You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to.

View File

@ -20,7 +20,7 @@ Integration with authentik requires VMware vCenter 8.03 or newer.
The following placeholders will be used in the examples below: The following placeholders will be used in the examples below:
- `vcenter.company` is the FQDN of the vCenter server. - `vcenter.company` is the FQDN of the vCenter server.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -17,8 +17,8 @@ sidebar_label: Weblate
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `weblate.company` is the FQDN of the Weblate install. - `weblate.company` is the FQDN of the Weblate installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `weblate-slug` is the slug of the Weblate application - `weblate-slug` is the slug of the Weblate application
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Wekan
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `wekan.company` is the FQDN of the wekan install. - `wekan.company` is the FQDN of the wekan installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: What's Up Docker
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `wud.company` is the FQDN of the WUD install. - `wud.company` is the FQDN of the WUD installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## WUD configuration ## WUD configuration
@ -35,7 +35,7 @@ After making these changes, restart your Docker containers to apply the new conf
## authentik configuration ## authentik configuration
1. Access the **Admin Interface** in on your authentik install. 1. Access the **Admin Interface** in on your authentik installation.
2. Create a new **OAuth2 / OpenID Provider**. 2. Create a new **OAuth2 / OpenID Provider**.
3. Note the generated **Client ID** and **Client Secret**. 3. Note the generated **Client ID** and **Client Secret**.
4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb` 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb`

View File

@ -21,8 +21,8 @@ Currently it is not possible to connect writefreely to authentik without making
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `writefreely.company` is the FQDN of the writefreely install. - `writefreely.company` is the FQDN of the writefreely installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -23,7 +23,7 @@ If you are using the Xen Orchestra Appliance, the OIDC Plugin should be present.
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `xenorchestra.company` is the FQDN of the Xen Orchestra instance. - `xenorchestra.company` is the FQDN of the Xen Orchestra instance.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik configuration ## authentik configuration

View File

@ -19,8 +19,8 @@ sidebar_label: Zabbix
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `zabbix.company` is the FQDN of the Zabbix install. - `zabbix.company` is the FQDN of the Zabbix installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -18,8 +18,8 @@ sidebar_label: Zammad
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `zammad.company` is the FQDN of the zammad install. - `zammad.company` is the FQDN of the zammad installation.
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## authentik Configuration ## authentik Configuration

View File

@ -18,7 +18,7 @@ sidebar_label: Zulip
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
- `zulip.company` is the FQDN of the Zulip instance. - `zulip.company` is the FQDN of the Zulip instance.
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:

View File

@ -17,8 +17,8 @@ sidebar_label: Service Name
The following placeholders are used in this guide: The following placeholders are used in this guide:
- `service.company` is the FQDN of the Service install. (Remove this for SaaS) - `service.company` is the FQDN of the Service installation. (Remove this for SaaS)
- `authentik.company` is the FQDN of the authentik install. - `authentik.company` is the FQDN of the authentik installation.
## Service configuration ## Service configuration