Commit Graph

242 Commits (eaddb57c274d9d9b8a78bf40055007e437bcd541)

Author SHA1 Message Date
James Elliott eaddb57c27
docs: add exhaustive complete logs reference guide (#5345)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-05-01 12:36:02 +10:00
Dennis Gaida 63d2de7604
docs: update screenshot (#5342)
Signed-off-by: Dennis Gaida <2392217+DennisGaida@users.noreply.github.com>
2023-05-01 12:19:06 +10:00
James Elliott 9537ad6813
docs: fix line endings (#5340)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-30 11:13:55 +10:00
Dennis Gaida c3cc4061b8
docs: improve tailscale integration (#5330)
This is an addendum to #5287 and includes some improvements.

Signed-off-by: Dennis Gaida <2392217+DennisGaida@users.noreply.github.com>
2023-04-30 09:18:57 +10:00
Harold f08cf83be4
docs(oidc): kasm workspaces (#5314)
This adds a Kasm Workspaces OpenID Connect 1.0 integration guide.

Signed-off-by: Harold <73724671+HaroldVB@users.noreply.github.com>
2023-04-27 18:40:06 +10:00
James Elliott c772ec26b1
i18n: update generated language support (#5316)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-26 13:00:54 +10:00
James Elliott b11353bbe8
docs: implement developer certificate of origin (#5096)
This implements the Developer Certificate of Origin as a commit check via the commitlint hook and add the relevant documentation.

Closes #5095

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-26 12:48:15 +10:00
James Elliott 8f2cef5ab2
docs: misc fix (#5302)
Include a missing link.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-23 10:11:40 +10:00
Dennis Gaida 1ba134fd60
docs(oidc): tailscale integration (#5287)
Adding Tailscale configuration documentation.
2023-04-23 10:06:28 +10:00
Nicolas Znamenski 0ec58d772a
docs: fix typo (#5301)
Fixed a typo/deprecated parameter --random-charset into --random.charset

Signed-off-by: Nicolas Znamenski <contact@loud.software>
2023-04-23 10:03:39 +10:00
James Elliott 033d3c0408
fix(commands): missing pkcs8 option (#5270)
Several crypto generate situations could not generate PKCS #8 ASN.1 DER format keys. Ths fixes this.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-18 12:16:45 +10:00
James Elliott 616fa3c48d
docs: header consistency (#5266) 2023-04-18 09:53:26 +10:00
James Elliott 9917e3290a
docs: misc fixes (#5258)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-16 07:48:03 +10:00
James Elliott 9e8db3c3f3
docs(oidc): faq refresh (#5254)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 22:25:21 +10:00
James Elliott 11eafba079
docs: update blog (#5251)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 16:08:29 +10:00
James Elliott 773387291a
docs: update branding docs (#5249)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-15 15:39:13 +10:00
James Elliott a179775f6f
refactor: misc out of band changes (#5238)
This just implements some changes from feat-settings-ui that are out of scope.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-14 21:42:31 +10:00
James Elliott 3d2da0b070
feat(oidc): client authentication modes (#5150)
This adds a feature to OpenID Connect 1.0 where clients can be restricted to a specific client authentication mode, as well as implements some backend requirements for the private_key_jwt client authentication mode (and potentially the tls_client_auth / self_signed_tls_client_auth client authentication modes). It also adds some improvements to configuration defaults and validations which will for now be warnings but likely be made into errors.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-13 20:58:18 +10:00
James Elliott db130dad48
docs: github links (#5230)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-13 20:10:12 +10:00
James Elliott 157675f1f3
docs: adjust references of webauthn (#5203)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-10 17:01:23 +10:00
James Elliott 304467c10f
docs: fix missing migration (#5202)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-10 13:12:13 +10:00
James Elliott 2dcfc0b04c
feat(handlers): authz authrequest authelia url (#5181)
This adjusts the AuthRequest Authz implementation behave similarly to the other implementations in as much as Authelia can return the relevant redirection to the proxy and the proxy just utilizes it if possible. In addition it swaps the HAProxy examples over to the ForwardAuth implementation as that's now supported.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-08 14:48:55 +10:00
James Elliott 3b52ddb137
docs: add adaptation blurbs (#5163)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-08 10:00:36 +10:00
James Elliott 19d1b1bbcb
docs: fix gitea example (#5156)
Fixes the gitea example and a few other minor issues.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-04-02 13:12:01 +10:00
Joakim Pettersen 9fe2ed9a46
docs(oidc): firezone integration (#5125)
This adds a Firezone VPN integration with OpenID Connect 1.0.
2023-03-28 20:29:13 +11:00
Trung Le 154110d4d9
docs: correct the link to the docs (#5112) 2023-03-22 13:55:31 +10:00
boomam 0bf40f63ea
docs(oidc): minio integration (#5100)
Add MinIO OpenID Connect 1.0 documentation.

Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-03-21 11:21:23 +11:00
James Elliott b03c1d0be2
docs: include pull request review checklist (#5094)
Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-03-20 15:03:52 +11:00
James Elliott ae719a8e51
docs: include hardening in measures (#5093) 2023-03-20 12:30:12 +10:00
James Elliott 0fb5ac78a7
docs: misc improvements (#5092)
* docs: misc improvements

* docs: misc improvements
2023-03-20 11:25:21 +11:00
James Elliott d5a4de2d98
docs: misc fixes (#5088) 2023-03-19 16:57:26 +10:00
James Elliott a2b3cbd794
docs: openssf best practices (#5079)
* docs: openssf best practices

* docs: update csp

* docs: update sponsors and governance
2023-03-19 16:29:12 +10:00
tetricky a048c48da7
docs: misago oidc (#5024)
This adds Misago integration docs for OpenID Connect.

Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-03-14 08:51:13 +11:00
James Elliott 482f23b506
docs: gen (#5054) 2023-03-12 09:33:40 +11:00
James Elliott fdd9901361
docs: add accessibility resolution recommendations (#5046) 2023-03-09 13:03:39 +11:00
James Elliott 3306c42cc6
docs: accessibility guidelines (#5033) 2023-03-06 20:17:57 +11:00
James Elliott ff6be40f5e
feat(oidc): pushed authorization requests (#4546)
This implements RFC9126 OAuth 2.0 Pushed Authorization Requests. See https://datatracker.ietf.org/doc/html/rfc9126 for the specification details.
2023-03-06 14:58:50 +11:00
James Elliott 0565be3db1
docs: faq (#5032) 2023-03-06 11:32:06 +11:00
James Elliott fca8e2130a
docs: update integration docs (#4986) 2023-03-04 15:53:48 +11:00
James Elliott b9a6856ff5
fix(logging): injected time format inconsistent (#5004)
This fixes an issue where the injected log time format is inconsistent with a normalized time format. This adjusts it to use a RFC3339 format.
2023-02-28 20:40:04 +11:00
James Elliott f62b4d4cd3
docs: update ngnix docs (#4980) 2023-02-22 15:26:10 +11:00
James Elliott 8253b44e5d
docs: update swag docs (#4979) 2023-02-22 15:11:11 +11:00
James Elliott 891f1de9f2
refactor(commands): x509 bundling (#4942)
This adds another bundling mode to the certificate command.
2023-02-17 14:29:07 +11:00
James Hillyerd ad689275d3
docs: improve gitea oidc guidance (#4808)
Make the non-obvious relationship between the Gitea `Authentication Name` and the path of the redirect URI explicit.

Signed-off-by: James Hillyerd <james@hillyerd.com>
2023-02-13 07:49:43 +11:00
James Elliott 8e4b660f15
refactor: certs (#4912)
This refactors the suites to use a Enterprise Root CA PKI signed certificate so the CA public certificate can be trusted. This is particularly useful for webauthn in Chrome.
2023-02-11 14:11:40 +11:00
James Elliott e9fd4160e4
docs: add important note for implicit consent (#4901) 2023-02-08 13:51:23 +11:00
James Elliott 2e6d17ba8a
feat(configuration): rfc2307bis implementation (#4900)
This adds configuration defaults for RFC2307bis LDAP implementations such as OpenLDAP with the RFC2307bis LDIF which should service most user needs.
2023-02-08 13:35:57 +11:00
James Elliott d1147f9ac4
docs: refactor oidc config docs (#4892) 2023-02-08 01:29:43 +11:00
James Elliott 726850fe43
refactor: add some more useful templating funcs (#4891) 2023-02-08 01:28:09 +11:00
James Elliott a7ccf3652f
docs: fix rfc references and fix misc issues (#4879) 2023-02-05 18:11:30 +11:00