Files
authentik/website/integrations/services/linkwarden/index.md
dependabot[bot] 3996bdac33 website: Bump prettier from 3.3.3 to 3.4.1 in /website (#12205)
* website: Bump prettier from 3.3.3 to 3.4.1 in /website

Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1.
- [Release notes](https://github.com/prettier/prettier/releases)
- [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md)
- [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1)

---
updated-dependencies:
- dependency-name: prettier
  dependency-type: direct:development
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

* update formatting

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* sigh

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* disable flaky test

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2024-11-27 15:14:19 +01:00

1.6 KiB

title, sidebar_label
title sidebar_label
Integrate with Linkwarden Linkwarden

Linkwarden

Support level: Community

What is Linkwarden

Linkwarden is an open-source collaborative bookmark manager used to collect, organize, and preserve webpages.

-- https://linkwarden.app/

Preparation

The following placeholders will be used:

  • linkwarden.company is the FQDN of the Linkwarden install.
  • authentik.company is the FQDN of the authentik install.

Linkwarden configuration

To configure Linkwarden to use authentik, add the following values to your .env file:

NEXT_PUBLIC_AUTHENTIK_ENABLED=true
AUTHENTIK_CUSTOM_NAME=authentik # Optionally set a custom provider name. Will be displayed on the login page
AUTHENTIK_ISSUER=https://authentik.company/application/o/linkwarden
AUTHENTIK_CLIENT_ID=<Your Client ID>
AUTHENTIK_CLIENT_SECRET=<Your Client Secret>

After making these changes, restart your Docker containers to apply the new configuration.

authentik configuration

  1. Access the Admin Interface in on your authentik install.
  2. Create a new OAuth2 / OpenID Provider.
  3. Note the generated Client ID and Client Secret.
  4. In the provider settings, add this redirect URL under Redirect URIs/Origins (RegEx): https://linkwarden.company/api/v1/auth/callback/authentik
  5. Click Finish to save the provider configuration.
  6. Create a new application associated with this provider.

Once completed, Linkwarden should be successfully configured to use authentik as its Single Sign-On SSO provider.