 1b12c90f32
			
		
	
	1b12c90f32
	
	
	
		
			
			* update awx-tower to RHAAP Signed-off-by: Jens Langhammer <jens@goauthentik.io> * migrate to new quotation Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update all Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			74 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| ---
 | |
| title: Zulip
 | |
| ---
 | |
| 
 | |
| <span class="badge badge--secondary">Support level: Community</span>
 | |
| 
 | |
| ## What is Zulip
 | |
| 
 | |
| > **Zulip**: Chat for distributed teams. Zulip combines the immediacy of real-time chat with an email threading model.
 | |
| > With Zulip, you can catch up on important conversations while ignoring irrelevant ones.
 | |
| >
 | |
| > -- https://zulip.com
 | |
| 
 | |
| ## Preparation
 | |
| 
 | |
| The following placeholders will be used:
 | |
| 
 | |
| -   `authentik.company` is the FQDN of the authentik install.
 | |
| -   `zulip.company` is the FQDN of the Zulip instance.
 | |
| 
 | |
| Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
 | |
| 
 | |
| -   ACS URL: `https://zulip.company/complete/saml/`
 | |
| -   Issuer: `https://authentik.company`
 | |
| -   Service Provider Binding: `Post`
 | |
| -   Signing Keypair: Select any certificate you have.
 | |
| -   Property mappings: Select all Managed mappings.
 | |
| 
 | |
| ## Zulip Configuration
 | |
| 
 | |
| Zulip is a Django application and is configured using `/etc/zulip/settings.py`. Only settings that differ
 | |
| from the defaults are displayed below. Please make sure you have the latest `settings.py` file as more settings
 | |
| might have been added to defaults since you installed Zulip.
 | |
| 
 | |
| Uncomment `zproject.backends.SAMLAuthBackend` inside the `AUTHENTICATION_BACKENDS` parameter to enable SAML support
 | |
| and fill in the following required configuration.
 | |
| 
 | |
| ```
 | |
| SOCIAL_AUTH_SAML_ORG_INFO = {
 | |
|     "en-US": {
 | |
|         "displayname": "authentik Zulip",
 | |
|         "name": "zulip",
 | |
|         "url": "{}{}".format("https://", EXTERNAL_HOST),
 | |
|     },
 | |
| }
 | |
| 
 | |
| SOCIAL_AUTH_SAML_ENABLED_IDPS: Dict[str, Any] = {
 | |
|     # idp identifier and settings
 | |
|     "authentik": {
 | |
| 
 | |
| 	    # KEEP OTHER SETTINGS AS DEFAULT OR CONFIGURE THEM ACCORDING TO YOUR PREFERENCES
 | |
|         "entity_id": "https://authentik.company",
 | |
|         "url": "https://authentik.company/application/saml/<application slug>/sso/binding/redirect/",
 | |
|         "display_name": "authentik SAML",
 | |
|     },
 | |
| }
 | |
| 
 | |
| ```
 | |
| 
 | |
| Place the certificate you associated with the SAML provider in authentik inside the `/etc/zulip/saml/idps` directory.
 | |
| The certificate file name must match the idp identifier name you set in the configuration (i.e. authentik.crt).
 | |
| 
 | |
| :::note
 | |
| Remember to restart Zulip.
 | |
| :::
 | |
| 
 | |
| ## Additional Resources
 | |
| 
 | |
| Please refer to the following for further information:
 | |
| 
 | |
| -   https://zulip.com/
 | |
| -   https://zulip.readthedocs.io
 | |
| -   https://chat.zulip.org/ (Official public Zulip Chat instance)
 |