docs: added example configs for oidc for specific services (portainer, proxmox) (#2831)

Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
pull/2857/head
Dylan Drost 2022-02-08 00:05:10 +01:00 committed by GitHub
parent 380e6fccb6
commit b6cffaaf50
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 89 additions and 1 deletions

View File

@ -2,7 +2,9 @@
layout: default layout: default
title: Community-Tested OIDC Integrations title: Community-Tested OIDC Integrations
parent: Community parent: Community
nav_order: 4 nav_order: 5
has_children: true
has_toc: false
--- ---
# OIDC Integrations # OIDC Integrations

View File

@ -0,0 +1,44 @@
---
layout: default
title: Portainer
parent: Community-Tested OIDC Integrations
grand_parent: Community
nav_order: 1
---
# OIDC Integrations: Portainer
{{ page.path }}
**Note** these setting have been tested with authelia `v4.33.2` and Portainer-CE `2.11.0`
## Authelia config
The specific client config for portainer.
```yaml
identity_providers:
oidc:
clients:
- id: portainer_client_id
description: Some description you want to shown on the Authelia consent page
secret: some secret string which should also be entered in the portainer config
public: false
authorization_policy: two_factor
audience: []
scopes:
- openid
redirect_uris:
- https://portainer.example.com
userinfo_signing_algorithm: none
```
## Portainer config
To setup Authelia as SSO provider in portainer go to **Settings > Authentication** and select **Authentication method** OAuth and **Provider** Custom and make sure automatic user provision is turned so users get automatically created.
**Note** make sure that Redirect URL matches exacty the redirect_uris in authelia config. Also us `preferred_username` as the User identifier which makes sure the portianer user and authelia user have the same username.
<p align="center">
<a href="../../images/portainer.gif" target="_blank"><img src="../../images/portainer.gif" width="736"></a>
</p>

View File

@ -0,0 +1,42 @@
---
layout: default
title: Proxmox
parent: Community-Tested OIDC Integrations
grand_parent: Community
nav_order: 2
---
# OIDC Integrations: Proxmox
{{ page.path }}
## Authelia config
**Note** these setting have been tested with authelia `v4.33.2` and Proxmox `7.1-10`
The specific client config for proxmox.
```yaml
identity_providers:
oidc:
clients:
- id: some id you want to use on the client
description: Some description you want to shown on the Authelia consent page
secret: some secret string which should also be entered in the proxmox config
public: false
authorization_policy: two_factor
audience: []
scopes:
- openid
redirect_uris:
- https://proxmox.example.com
userinfo_signing_algorithm: none
```
## Proxmox config
Under Datacenter go to **Persmission > Realms** and add the an OpenID Connect Server
<p align="center">
<a href="../../images/portainer.gif" target="_blank"><img src="../../images/proxmox.gif" width="736"></a>
</p>

Binary file not shown.

After

Width:  |  Height:  |  Size: 82 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 96 KiB