website/integrations: all: install -> installation (#12676)
* website/integrations: all: install -> installation * fix for new integr Signed-off-by: 4d62 <git@sdko.org> --------- Signed-off-by: 4d62 <git@sdko.org>
This commit is contained in:
		| @ -10,7 +10,7 @@ Allows users to authenticate using their Discord credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Discord | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,7 @@ Adding Facebook as a source allows users to authenticate through authentik using | ||||
|  | ||||
| The following placeholders are used: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Facebook configuration | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,7 @@ Allows users to authenticate using their Github credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `www.my.company` Homepage URL for your site | ||||
|  | ||||
| ## Github | ||||
|  | ||||
| @ -10,7 +10,7 @@ Allows users to authenticate using their Google credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Google | ||||
|  | ||||
|  | ||||
| @ -10,8 +10,8 @@ Allows users to authenticate using their Mailcow credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `mailcow.company` is the FQDN of the mailcow install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `mailcow.company` is the FQDN of the mailcow installation. | ||||
|  | ||||
| ## Mailcow | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,7 @@ Allows users to authenticate using their Twitch credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Twitch | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,7 @@ Allows users to authenticate using their twitter credentials | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Twitter | ||||
|  | ||||
|  | ||||
| @ -20,8 +20,8 @@ sidebar_label: Actual Budget | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - _actual.company_ is the FQDN of the Actual Budget install. | ||||
| - _authentik.company_ is the FQDN of the authentik install. | ||||
| - `actual.company` is the FQDN of the Actual Budget installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Apache Guacamole™ | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `guacamole.company` is the FQDN of the Guacamole install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `guacamole.company` is the FQDN of the Guacamole installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: ArgoCD | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `argocd.company` is the FQDN of the ArgoCD install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `argocd.company` is the FQDN of the ArgoCD installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| :::note | ||||
| Only settings that have been modified from default have been listed. | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Aruba Orchestrator | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `arubaorchestrator.company` is the FQDN of the Aruba Orchestrator installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `SSL Certificate` is the name of the SSL certificate used to sign outgoing responses. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
| @ -25,8 +25,8 @@ AWX is the open-source version of RHAAP. The term "AWX" will be used interchange | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `awx.company` is the FQDN of the AWX/RHAAP install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `awx.company` is the FQDN of the AWX/RHAAP installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Budibase | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `budibase.company` is the FQDN of the Budibase install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `budibase.company` is the FQDN of the Budibase installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Chronograf | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `chronograf.company` is the FQDN of your Chronograf install. | ||||
| - `authentik.company` is the FQDN of your authentik install. | ||||
| - `chronograf.company` is the FQDN of your Chronograf installation. | ||||
| - `authentik.company` is the FQDN of your authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -18,7 +18,7 @@ sidebar_label: Cloudflare Access | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `company.cloudflareaccess.com` is the FQDN of your Cloudflare Access subdomain. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| To proceed, you need to register for a free Cloudflare Access account and have both a Cloudflare account and a publicly accessible authentik instance with a trusted SSL certificate. | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ From https://en.wikipedia.org/wiki/DokuWiki | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `dokuwiki.company` is the FQDN of the DokiWiki install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `dokuwiki.company` is the FQDN of the DokiWiki installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## DokuWiki configuration | ||||
|  | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: engomo | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `engomo.company` is the FQDN of the engomo install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `engomo.company` is the FQDN of the engomo installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `engomo.mapping` is the name of the Scope Mapping. | ||||
| - `ak.cert` is the self-signed certificate that will be used for the service provider. | ||||
|  | ||||
|  | ||||
| @ -21,8 +21,8 @@ This guide does _not_ cover Team Mapping. Please refer to EspoCRM's [documentati | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `crm.<your_company>` is the FQDN of the EspoCRM install. | ||||
| - `authentik.<your_company>` is the FQDN of the authentik install. | ||||
| - `crm.<your_company>` is the FQDN of the EspoCRM installation. | ||||
| - `authentik.<your_company>` is the FQDN of the authentik installation. | ||||
| - `_SLUG_` is the slug you choose upon application create in authentik. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
| @ -17,9 +17,9 @@ sidebar_label: Firezone | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `firezone.company` is the FQDN of the Firezone install. | ||||
| - `firezone.company` is the FQDN of the Firezone installation. | ||||
| - `authentik` is the unique ID used to generate logins for this provider. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: FortiGate Admin Login | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `fgt.company` is the FQDN of the FortiGate install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `fgt.company` is the FQDN of the FortiGate installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `fgt.mapping` is the name of the SAML Property Mapping. | ||||
| - `ak.cert` = The authentik self-signed certificate you use for the service provider. | ||||
|  | ||||
|  | ||||
| @ -19,8 +19,8 @@ sidebar_label: FortiManager | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `fgm.company` is the FQDN of the FortiManager install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `fgm.company` is the FQDN of the FortiManager installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application and Provider in authentik, note the slug, as this will be used later. Create a SAML provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -21,8 +21,8 @@ These instructions apply to all projects in the Frappe Family. | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `frappe.company` is the FQDN of the Frappe install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `frappe.company` is the FQDN of the Frappe installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `provider` is the name for the social login provider in Frappe. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
| @ -17,9 +17,9 @@ sidebar_label: FreshRSS | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `freshrss.company` is the FQDN of the FreshRSS install. | ||||
| - `freshrss.company` is the FQDN of the FreshRSS installation. | ||||
| - `port` is the port on which the FreshRSS install is running (usually 443) | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Gatus | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `gatus.company` is the FQDN of the Gatus install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `gatus.company` is the FQDN of the Gatus installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Glitchtip | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `glitchtip.company` is the FQDN of the Glitchtip install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `glitchtip.company` is the FQDN of the Glitchtip installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -20,7 +20,7 @@ sidebar_label: GlobalProtect | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `gp.company` is the FQDN of the GlobalProtect portal. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| :::caution | ||||
| A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication. | ||||
|  | ||||
| @ -17,7 +17,7 @@ sidebar_label: Google Workspace | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `example.com` is the default E-mail address configured in Google workspace. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Grafana | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `grafana.company` is the FQDN of the Grafana install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `grafana.company` is the FQDN of the Grafana installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -19,8 +19,8 @@ sidebar_label: Gravitee | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `gravitee.company` is the FQDN of the Gravitee install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `gravitee.company` is the FQDN of the Gravitee installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Harbor | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `harbor.company` is the FQDN of the Harbor install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `harbor.company` is the FQDN of the Harbor installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: HedgeDoc | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `hedgedoc.company` is the FQDN of the HedgeDoc install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `hedgedoc.company` is the FQDN of the HedgeDoc installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Hoarder | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `hoarder.company` is the FQDN of the Hoarder install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `hoarder.company` is the FQDN of the Hoarder installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -27,8 +27,8 @@ For Home Assistant to work with authentik, a custom integration needs to be inst | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `hass.company` is the FQDN of the Home Assistant install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `hass.company` is the FQDN of the Home Assistant installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -18,7 +18,7 @@ sidebar_label: Immich | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `https://immich.company` is the URL used to access the Immich instance. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -29,8 +29,8 @@ An LDAP outpost must be deployed to use the Jellyfin LDAP plugin | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `jellyfin.company` is the FQDN of the Jellyfin install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `jellyfin.company` is the FQDN of the Jellyfin installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `ldap.company` the FQDN of the LDAP outpost. | ||||
| - `dc=company,dc=com` the Base DN of the LDAP outpost. | ||||
| - `ldap_bind_user` the username of the desired LDAP Bind User | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Jenkins | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `jenkins.company` is the FQDN of the Service install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `jenkins.company` is the FQDN of the Service installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Komga | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `komga.company` is the FQDN of the Komga install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `komga.company` is the FQDN of the Komga installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Linkwarden | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `linkwarden.company` is the FQDN of the Linkwarden install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `linkwarden.company` is the FQDN of the Linkwarden installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Linkwarden configuration | ||||
|  | ||||
| @ -36,7 +36,7 @@ After making these changes, restart your Docker containers to apply the new conf | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
| 1. Access the **Admin Interface** in on your authentik install. | ||||
| 1. Access the **Admin Interface** in on your authentik installation. | ||||
| 2. Create a new **OAuth2 / OpenID Provider**. | ||||
| 3. Note the generated **Client ID** and **Client Secret**. | ||||
| 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://linkwarden.company/api/v1/auth/callback/authentik` | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Mastodon | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `mastodon.company` is the FQDN of the mastodon install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `mastodon.company` is the FQDN of the mastodon installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Matrix Synapse | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `matrix.company` is the FQDN of the Matrix install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `matrix.company` is the FQDN of the Matrix installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -15,8 +15,8 @@ sidebar_label: MeshCentral | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `meshcentral.company` is the FQDN of the MeshCentral install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `meshcentral.company` is the FQDN of the MeshCentral installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: MinIO | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `minio.company` is the FQDN of the MinIO install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `minio.company` is the FQDN of the MinIO installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ### Mapping to MinIO policies | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Mobilizon | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `mobilizon.company` is the FQDN of the mobilizon install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `mobilizon.company` is the FQDN of the mobilizon installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: NetBird | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `netbird.company` is the FQDN of the NetBird install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `netbird.company` is the FQDN of the NetBird installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: NetBox | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `netbox.company` is the FQDN of the NetBox install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `netbox.company` is the FQDN of the NetBox installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _OAuth2/OpenID provider_ with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -39,8 +39,8 @@ There are 3 ways to setup single sign on (SSO) for Nextcloud: | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `nextcloud.company` is the FQDN of the Nextcloud install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `nextcloud.company` is the FQDN of the Nextcloud installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `authentik.local` is the internal FQDN of the authentik install (only relevant when running authentik and Nextcloud behind a reverse proxy) | ||||
|  | ||||
| Lets start by thinking what user attributes need to be available in Nextcloud: | ||||
| @ -228,8 +228,8 @@ If you do not have any relying parties accessing authentik from the outside, you | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `nextcloud.company` is the FQDN of the Nextcloud install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `nextcloud.company` is the FQDN of the Nextcloud installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to _Applications_ -> _Providers_. Create a _SAML provider_ with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -21,8 +21,8 @@ This is based on authentik 2024.6.0 and Observium CE 24.4.13528 | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `observium.company` is the FQDN of the Observium install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `observium.company` is the FQDN of the Observium installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| This guide assumes you already have a working Observium instance. It is recommended to install it with the install script, following the [instructions](https://docs.observium.org/) on Observium's website. | ||||
|  | ||||
|  | ||||
| @ -19,8 +19,8 @@ This integration leverages authentik's LDAP for the identity provider to achieve | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `organizr.company` is the FQDN of the Service install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `organizr.company` is the FQDN of the Service installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`. | ||||
|  | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: Outline | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `outline.company` is the FQDN of the Outline install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `outline.company` is the FQDN of the Outline installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -23,7 +23,7 @@ The author of Paperless-ng recommends you do not expose Paperless outside your n | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `paperless.company` is the FQDN of the Paperless-ng install. | ||||
| - `paperless.company` is the FQDN of the Paperless-ng installation. | ||||
|  | ||||
| Also set up your proxy server to use forward auth with paperless.company: https://goauthentik.io/docs/providers/proxy/forward_auth | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Paperless-ngx | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `paperless.company` is the FQDN of the Paperless-ngx install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `paperless.company` is the FQDN of the Paperless-ngx installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: PowerDNS-Admin | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `pdns-admin.company` is the FQDN of the PowerDNS-Admin install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `pdns-admin.company` is the FQDN of the PowerDNS-Admin installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create a SAML provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -19,7 +19,7 @@ This integration leverages authentik's LDAP for the identity provider to achieve | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -22,7 +22,7 @@ Requires Proxmox VE 7.0 or newer. | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `proxmox.company` is the FQDN of the Proxmox VE server. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: Rancher | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `rancher.company` is the FQDN of the Rancher install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `rancher.company` is the FQDN of the Rancher installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following | ||||
|  | ||||
|  | ||||
| @ -21,7 +21,7 @@ The mail server must support XOAUTH2 for both SMTPD and IMAP/POP. Postfix SMTP s | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping | ||||
| in the provider settings instead of the default oauth mapping. | ||||
|  | ||||
| @ -19,8 +19,8 @@ sidebar_label: Semaphore | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `semaphore.company` is the FQDN of the Semaphore install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `semaphore.company` is the FQDN of the Semaphore installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,7 +17,7 @@ sidebar_label: Semgrep | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `devcompany` is the organization name on Semgrep Cloud platform. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: Sentry | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `sentry.company` is the FQDN of the Sentry install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `sentry.company` is the FQDN of the Sentry installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik. Create a SAML Provider with the following values | ||||
|  | ||||
|  | ||||
| @ -22,7 +22,7 @@ Skyhigh has multiple points for SAML integration: | ||||
|  | ||||
| The following placeholder will be used throughout this document. | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Integration for Dashboard Administrator login | ||||
|  | ||||
|  | ||||
| @ -16,7 +16,7 @@ sidebar_label: Slack | ||||
| The following placeholder will be used: | ||||
|  | ||||
| - You can use <kbd>slack.<em>company</em>></kbd> or <kbd><em>my-workspace</em>.slack.com</kbd> as the FQDN of your Slack instance. | ||||
| - You can use <kbd>authentik.company</kbd> as the FQDN of the authentik install. | ||||
| - You can use <kbd>authentik.company</kbd> as the FQDN of the authentik installation. | ||||
|  | ||||
| For additional information about integrating with Slack, refer to their [documentation](https://slack.com/help/articles/205168057-Custom-SAML-single-sign-on). | ||||
|  | ||||
|  | ||||
| @ -26,8 +26,8 @@ built-in authentication. | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `inventory.company` is the FQDN of the snipe-it install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `inventory.company` is the FQDN of the snipe-it installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `snipeit-user` is the name of the authentik service account we will create. | ||||
| - `DC=ldap,DC=authentik,DC=io` is the Base DN of the LDAP Provider (default) | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: SonarQube | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `sonarqube.company` is the FQDN of the sonarqube install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `sonarqube.company` is the FQDN of the sonarqube installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Terraform provider | ||||
|  | ||||
|  | ||||
| @ -21,8 +21,8 @@ These instructions apply to all projects in the \*arr Family. If you use multipl | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `sonarr.company` is the FQDN of the Sonarr install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `sonarr.company` is the FQDN of the Sonarr installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create a Proxy Provider with the following values | ||||
|  | ||||
|  | ||||
| @ -22,7 +22,7 @@ Kerberos is also not supported. | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `ldap.baseDN` is the Base DN you configure in the LDAP provider. | ||||
| - `ldap.domain` is (typically) an FQDN for your domain. Usually | ||||
|   it is just the components of your base DN. For example, if | ||||
|  | ||||
| @ -22,7 +22,7 @@ This is tested with DSM 7.1 or newer. | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `synology.company` is the FQDN of the Synology DSM server. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Tautulli | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `tautulli.company` is the FQDN of the Tautulli install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `tautulli.company` is the FQDN of the Tautulli installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Setup | ||||
|  | ||||
|  | ||||
| @ -22,7 +22,7 @@ If you made any changes, e.g. using a different name for the user, make sure to | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `dc=company,dc=com` the Base DN of the LDAP outpost. If you followed the LDAP provider guide this is: `dc=goauthentik,dc=io` | ||||
| - `ldap_bind_user` the username of the desired LDAP Bind User. If you followed the LDAP provider guide this is: `ldapservice` | ||||
|  | ||||
|  | ||||
| @ -21,8 +21,8 @@ This setup assumes you will be using HTTPS as TrueCommand generates ACS and Redi | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `truecommand.company` is the FQDN of the snipe-it install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `truecommand.company` is the FQDN of the snipe-it installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik and use the slug for later as `truenas-truecommand`. | ||||
|  | ||||
|  | ||||
| @ -22,7 +22,7 @@ This requires authentik 0.10.3 or newer. | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `landscape.company` is the FQDN of the Landscape server. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Landscape uses the OpenID-Connect Protocol for single-sign on. | ||||
|  | ||||
|  | ||||
| @ -19,8 +19,8 @@ Uptime Kuma currently supports only a single user and no native SSO solution. To | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `uptime-kuma.company` is the FQDN of the Uptime Kuma install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `uptime-kuma.company` is the FQDN of the Uptime Kuma installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik. Create a Proxy provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Veeam Enterprise Manager | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `veeam.company` is the FQDN of the Veeam Enterprise Manager install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `veeam.company` is the FQDN of the Veeam Enterprise Manager installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| You will need an existing group or multiple in authentik to assign roles in Veeam Enterprise Manager to. | ||||
|  | ||||
|  | ||||
| @ -20,7 +20,7 @@ Integration with authentik requires VMware vCenter 8.03 or newer. | ||||
| The following placeholders will be used in the examples below: | ||||
|  | ||||
| - `vcenter.company` is the FQDN of the vCenter server. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Weblate | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `weblate.company` is the FQDN of the Weblate install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `weblate.company` is the FQDN of the Weblate installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `weblate-slug` is the slug of the Weblate application | ||||
|  | ||||
| Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Wekan | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `wekan.company` is the FQDN of the wekan install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `wekan.company` is the FQDN of the wekan installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: What's Up Docker | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `wud.company` is the FQDN of the WUD install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `wud.company` is the FQDN of the WUD installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## WUD configuration | ||||
|  | ||||
| @ -35,7 +35,7 @@ After making these changes, restart your Docker containers to apply the new conf | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
| 1. Access the **Admin Interface** in on your authentik install. | ||||
| 1. Access the **Admin Interface** in on your authentik installation. | ||||
| 2. Create a new **OAuth2 / OpenID Provider**. | ||||
| 3. Note the generated **Client ID** and **Client Secret**. | ||||
| 4. In the provider settings, add this redirect URL under **Redirect URIs/Origins (RegEx)**: `https://wud.company/auth/oidc/authentik/cb` | ||||
|  | ||||
| @ -21,8 +21,8 @@ Currently it is not possible to connect writefreely to authentik without making | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `writefreely.company` is the FQDN of the writefreely install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `writefreely.company` is the FQDN of the writefreely installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -23,7 +23,7 @@ If you are using the Xen Orchestra Appliance, the OIDC Plugin should be present. | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `xenorchestra.company` is the FQDN of the Xen Orchestra instance. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik configuration | ||||
|  | ||||
|  | ||||
| @ -19,8 +19,8 @@ sidebar_label: Zabbix | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `zabbix.company` is the FQDN of the Zabbix install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `zabbix.company` is the FQDN of the Zabbix installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: | ||||
|  | ||||
|  | ||||
| @ -18,8 +18,8 @@ sidebar_label: Zammad | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `zammad.company` is the FQDN of the zammad install. | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `zammad.company` is the FQDN of the zammad installation. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## authentik Configuration | ||||
|  | ||||
|  | ||||
| @ -18,7 +18,7 @@ sidebar_label: Zulip | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
| - `zulip.company` is the FQDN of the Zulip instance. | ||||
|  | ||||
| Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters: | ||||
|  | ||||
| @ -17,8 +17,8 @@ sidebar_label: Service Name | ||||
|  | ||||
| The following placeholders are used in this guide: | ||||
|  | ||||
| - `service.company` is the FQDN of the Service install. (Remove this for SaaS) | ||||
| - `authentik.company` is the FQDN of the authentik install. | ||||
| - `service.company` is the FQDN of the Service installation. (Remove this for SaaS) | ||||
| - `authentik.company` is the FQDN of the authentik installation. | ||||
|  | ||||
| ## Service configuration | ||||
|  | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	 4d62
					4d62