James Elliott
8f2cef5ab2
docs: misc fix ( #5302 )
...
Include a missing link.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-23 10:11:40 +10:00
Dennis Gaida
1ba134fd60
docs(oidc): tailscale integration ( #5287 )
...
Adding Tailscale configuration documentation.
2023-04-23 10:06:28 +10:00
Nicolas Znamenski
0ec58d772a
docs: fix typo ( #5301 )
...
Fixed a typo/deprecated parameter --random-charset into --random.charset
Signed-off-by: Nicolas Znamenski <contact@loud.software>
2023-04-23 10:03:39 +10:00
James Elliott
033d3c0408
fix(commands): missing pkcs8 option ( #5270 )
...
Several crypto generate situations could not generate PKCS #8 ASN.1 DER format keys. Ths fixes this.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-18 12:16:45 +10:00
James Elliott
616fa3c48d
docs: header consistency ( #5266 )
2023-04-18 09:53:26 +10:00
James Elliott
9917e3290a
docs: misc fixes ( #5258 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-16 07:48:03 +10:00
James Elliott
9e8db3c3f3
docs(oidc): faq refresh ( #5254 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 22:25:21 +10:00
James Elliott
11eafba079
docs: update blog ( #5251 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 16:08:29 +10:00
James Elliott
773387291a
docs: update branding docs ( #5249 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 15:39:13 +10:00
James Elliott
a179775f6f
refactor: misc out of band changes ( #5238 )
...
This just implements some changes from feat-settings-ui that are out of scope.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-14 21:42:31 +10:00
James Elliott
3d2da0b070
feat(oidc): client authentication modes ( #5150 )
...
This adds a feature to OpenID Connect 1.0 where clients can be restricted to a specific client authentication mode, as well as implements some backend requirements for the private_key_jwt client authentication mode (and potentially the tls_client_auth / self_signed_tls_client_auth client authentication modes). It also adds some improvements to configuration defaults and validations which will for now be warnings but likely be made into errors.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-13 20:58:18 +10:00
James Elliott
db130dad48
docs: github links ( #5230 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-13 20:10:12 +10:00
James Elliott
ecdae9e5d2
build: update lockfiles ( #5212 )
...
* build: update lockfiles
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
* refactor(web): update pnpm dep configuration
---------
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-04-11 12:16:41 +10:00
James Elliott
157675f1f3
docs: adjust references of webauthn ( #5203 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-10 17:01:23 +10:00
James Elliott
304467c10f
docs: fix missing migration ( #5202 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-10 13:12:13 +10:00
James Elliott
2dcfc0b04c
feat(handlers): authz authrequest authelia url ( #5181 )
...
This adjusts the AuthRequest Authz implementation behave similarly to the other implementations in as much as Authelia can return the relevant redirection to the proxy and the proxy just utilizes it if possible. In addition it swaps the HAProxy examples over to the ForwardAuth implementation as that's now supported.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-08 14:48:55 +10:00
James Elliott
3b52ddb137
docs: add adaptation blurbs ( #5163 )
...
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-08 10:00:36 +10:00
James Elliott
19d1b1bbcb
docs: fix gitea example ( #5156 )
...
Fixes the gitea example and a few other minor issues.
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-02 13:12:01 +10:00
Joakim Pettersen
9fe2ed9a46
docs(oidc): firezone integration ( #5125 )
...
This adds a Firezone VPN integration with OpenID Connect 1.0.
2023-03-28 20:29:13 +11:00
Trung Le
154110d4d9
docs: correct the link to the docs ( #5112 )
2023-03-22 13:55:31 +10:00
boomam
0bf40f63ea
docs(oidc): minio integration ( #5100 )
...
Add MinIO OpenID Connect 1.0 documentation.
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-03-21 11:21:23 +11:00
James Elliott
b03c1d0be2
docs: include pull request review checklist ( #5094 )
...
Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-03-20 15:03:52 +11:00
James Elliott
ae719a8e51
docs: include hardening in measures ( #5093 )
2023-03-20 12:30:12 +10:00
James Elliott
0fb5ac78a7
docs: misc improvements ( #5092 )
...
* docs: misc improvements
* docs: misc improvements
2023-03-20 11:25:21 +11:00
James Elliott
d5a4de2d98
docs: misc fixes ( #5088 )
2023-03-19 16:57:26 +10:00
James Elliott
a2b3cbd794
docs: openssf best practices ( #5079 )
...
* docs: openssf best practices
* docs: update csp
* docs: update sponsors and governance
2023-03-19 16:29:12 +10:00
tetricky
a048c48da7
docs: misago oidc ( #5024 )
...
This adds Misago integration docs for OpenID Connect.
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-03-14 08:51:13 +11:00
James Elliott
482f23b506
docs: gen ( #5054 )
2023-03-12 09:33:40 +11:00
James Elliott
fdd9901361
docs: add accessibility resolution recommendations ( #5046 )
2023-03-09 13:03:39 +11:00
James Elliott
e593ab5916
docs: bump deps ( #5043 )
2023-03-08 12:10:38 +11:00
James Elliott
3306c42cc6
docs: accessibility guidelines ( #5033 )
2023-03-06 20:17:57 +11:00
James Elliott
ff6be40f5e
feat(oidc): pushed authorization requests ( #4546 )
...
This implements RFC9126 OAuth 2.0 Pushed Authorization Requests. See https://datatracker.ietf.org/doc/html/rfc9126 for the specification details.
2023-03-06 14:58:50 +11:00
James Elliott
0565be3db1
docs: faq ( #5032 )
2023-03-06 11:32:06 +11:00
James Elliott
fca8e2130a
docs: update integration docs ( #4986 )
2023-03-04 15:53:48 +11:00
James Elliott
b9a6856ff5
fix(logging): injected time format inconsistent ( #5004 )
...
This fixes an issue where the injected log time format is inconsistent with a normalized time format. This adjusts it to use a RFC3339 format.
2023-02-28 20:40:04 +11:00
James Elliott
f62b4d4cd3
docs: update ngnix docs ( #4980 )
2023-02-22 15:26:10 +11:00
James Elliott
8253b44e5d
docs: update swag docs ( #4979 )
2023-02-22 15:11:11 +11:00
James Elliott
891f1de9f2
refactor(commands): x509 bundling ( #4942 )
...
This adds another bundling mode to the certificate command.
2023-02-17 14:29:07 +11:00
James Hillyerd
ad689275d3
docs: improve gitea oidc guidance ( #4808 )
...
Make the non-obvious relationship between the Gitea `Authentication Name` and the path of the redirect URI explicit.
Signed-off-by: James Hillyerd <james@hillyerd.com>
2023-02-13 07:49:43 +11:00
James Elliott
8e4b660f15
refactor: certs ( #4912 )
...
This refactors the suites to use a Enterprise Root CA PKI signed certificate so the CA public certificate can be trusted. This is particularly useful for webauthn in Chrome.
2023-02-11 14:11:40 +11:00
James Elliott
e9fd4160e4
docs: add important note for implicit consent ( #4901 )
2023-02-08 13:51:23 +11:00
James Elliott
2e6d17ba8a
feat(configuration): rfc2307bis implementation ( #4900 )
...
This adds configuration defaults for RFC2307bis LDAP implementations such as OpenLDAP with the RFC2307bis LDIF which should service most user needs.
2023-02-08 13:35:57 +11:00
James Elliott
d1147f9ac4
docs: refactor oidc config docs ( #4892 )
2023-02-08 01:29:43 +11:00
James Elliott
726850fe43
refactor: add some more useful templating funcs ( #4891 )
2023-02-08 01:28:09 +11:00
James Elliott
a7ccf3652f
docs: fix rfc references and fix misc issues ( #4879 )
2023-02-05 18:11:30 +11:00
James Elliott
64312c644a
docs: fix env values ( #4873 )
2023-02-03 11:27:23 +11:00
James Elliott
d101b2aa51
docs: use go 1.19.5 ( #4872 )
2023-02-03 10:45:50 +11:00
James Elliott
370a3b1e8d
build: update to go 1.20 ( #4866 )
2023-02-02 21:19:28 +11:00
James Elliott
e408cb19b1
test: adjust tests and docs to be similar ( #4856 )
2023-02-02 18:13:18 +11:00
James Elliott
598ea2bb19
feat(configuration): disallow public suffix domains ( #4855 )
...
This adds a check to the domains configuration to ensure the domain value is not part of the public suffix list at https://publicsuffix.org . These domains are special and users cannot write cookies with this domain value, this makes them unusable with Authelia and this more readily makes that apparent.
2023-02-02 16:34:49 +11:00