diff --git a/docs/community/oidc-integrations.md b/docs/community/oidc-integrations.md index 659b489eb..e1f9245ac 100644 --- a/docs/community/oidc-integrations.md +++ b/docs/community/oidc-integrations.md @@ -2,7 +2,9 @@ layout: default title: Community-Tested OIDC Integrations parent: Community -nav_order: 4 +nav_order: 5 +has_children: true +has_toc: false --- # OIDC Integrations diff --git a/docs/community/oidc-integrations/portainer.md b/docs/community/oidc-integrations/portainer.md new file mode 100644 index 000000000..58120f720 --- /dev/null +++ b/docs/community/oidc-integrations/portainer.md @@ -0,0 +1,44 @@ +--- +layout: default +title: Portainer +parent: Community-Tested OIDC Integrations +grand_parent: Community +nav_order: 1 +--- + +# OIDC Integrations: Portainer + +{{ page.path }} + +**Note** these setting have been tested with authelia `v4.33.2` and Portainer-CE `2.11.0` + +## Authelia config + +The specific client config for portainer. + +```yaml +identity_providers: + oidc: + clients: + - id: portainer_client_id + description: Some description you want to shown on the Authelia consent page + secret: some secret string which should also be entered in the portainer config + public: false + authorization_policy: two_factor + audience: [] + scopes: + - openid + redirect_uris: + - https://portainer.example.com + userinfo_signing_algorithm: none +``` + +## Portainer config + +To setup Authelia as SSO provider in portainer go to **Settings > Authentication** and select **Authentication method** OAuth and **Provider** Custom and make sure automatic user provision is turned so users get automatically created. + +**Note** make sure that Redirect URL matches exacty the redirect_uris in authelia config. Also us `preferred_username` as the User identifier which makes sure the portianer user and authelia user have the same username. + +
\ No newline at end of file diff --git a/docs/community/oidc-integrations/proxmox.md b/docs/community/oidc-integrations/proxmox.md new file mode 100644 index 000000000..86183f34f --- /dev/null +++ b/docs/community/oidc-integrations/proxmox.md @@ -0,0 +1,42 @@ +--- +layout: default +title: Proxmox +parent: Community-Tested OIDC Integrations +grand_parent: Community +nav_order: 2 +--- + +# OIDC Integrations: Proxmox + +{{ page.path }} + +## Authelia config + +**Note** these setting have been tested with authelia `v4.33.2` and Proxmox `7.1-10` + +The specific client config for proxmox. + +```yaml +identity_providers: + oidc: + clients: + - id: some id you want to use on the client + description: Some description you want to shown on the Authelia consent page + secret: some secret string which should also be entered in the proxmox config + public: false + authorization_policy: two_factor + audience: [] + scopes: + - openid + redirect_uris: + - https://proxmox.example.com + userinfo_signing_algorithm: none +``` + +## Proxmox config + +Under Datacenter go to **Persmission > Realms** and add the an OpenID Connect Server + + \ No newline at end of file diff --git a/docs/images/portainer.gif b/docs/images/portainer.gif new file mode 100644 index 000000000..fcc34a6b0 Binary files /dev/null and b/docs/images/portainer.gif differ diff --git a/docs/images/proxmox.gif b/docs/images/proxmox.gif new file mode 100644 index 000000000..d6f82a2db Binary files /dev/null and b/docs/images/proxmox.gif differ