vaultwarden-backup
authelia
vaultwarden-backup | authelia | |
---|---|---|
8 | 174 | |
180 | 19,578 | |
- | 1.8% | |
6.0 | 9.9 | |
5 months ago | 6 days ago | |
Shell | Go | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
vaultwarden-backup
-
Is this an adequate backup for Vaultwarden?
I've been using https://github.com/Bruceforce/vaultwarden-backup and it seems to work well.
-
Advice on how to backup self hosted instance of bitwarden on synology nas
Daily backups using https://github.com/Bruceforce/vaultwarden-backup. This container safely dumps the database and creates a compressed archive on my ZFS mirrored NAS.
-
Need help, my backup does not work
Aside from that it looks like you are using the default values. So not specifying any environment variables in the vaultwarden-backup service might just work (unless you get a permission denied error).
-
Backingup vaultwarden
if you are using docker: https://github.com/Bruceforce/vaultwarden-backup
-
Bitwarden backup
I use this. You can set days to delete after. It is essentially backing up sqlite DB.
-
Vaultwarden is accessible to the whole world - hosted on this little thing. Doesn’t that amaze you?
That is not safe for databases, which vaultwarden uses. Reason is db might not be in consistent state on file system when you copy it. Use something like https://github.com/Bruceforce/bitwarden_rs-backup to backup the db and then backup that volume.
- Backing up Docker volumes
authelia
-
Keycloak SSO with Docker Compose and Nginx
It's me and two others though I'm definitely the most active. We put a lot of effort into security best practices and one of my co-developers is currently reviewing the 4.38.0 release. It's a fairly major release with a lot of important code paths that have been improved for the future.
Our official docs can be found at https://www.authelia.com and you can find docs for a particular PR in the relevant PR. We've also linked the pre-release docs in the pre-release discussions which can be found here: https://github.com/authelia/authelia/discussions/categories/...
-
Protecting WebUI on public IP?
I use NGINX proxy with Authelia in between. Authelia blocks and blacklists faulty logins.
-
Why would anyone need AD/AAD when you can manage devices through Saltstack?
https://github.com/saltstack/salt https://github.com/chocolatey/choco https://github.com/nextcloud https://github.com/authelia/authelia https://github.com/grafana/grafana
- Give this project some luv: Single Sign-On Multi-Factor portal for web apps
-
HAProxy with Forward Auth to Authentik
If you are using HAProxy on PfSense/OPNSense, see my issue https://github.com/authelia/authelia/issues/2696
- Keycloak – Open-Source Identity and Access Management Interview
-
LDAP or AD for selfhosted
https://github.com/lldap/lldap is a very simple and lightweight LDAP solution. Works flawless with https://www.authelia.com/
-
Authelia/SSO With Caddy In Docker Compose?
Ah yeah, so I guess it's been a while since I tried and I forgot where I got stuck last time. Authelia's config.yml is absolutely massive and I'm not sure which section of their guide I should be following. In The Docker Compose section, there's "Unbundled", "Lite", and "Local". I think I want to be running the "lite" bundle, but their example compose file has a ton of Traefik stuff in it. I know I wouldn't keep the Traefik services, but do I need either secure or public?
-
How do you secure your webpages that have no protection?
Authelia supports SSO. If you are behind a reverse proxy it’s quite straightforward to integrate.
-
GitLab behind Authelia
This should probably also be mentioned in the documentation so maybe consider mentioning this on their discussion page.
What are some alternatives?
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]
authentik - The authentication glue you need.
bitwarden-backup-docker - Backup job for bitwarden-rs as docker container
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
oauth2 - Go OAuth2
vaultwarden - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
dex - OpenID Connect (OIDC) identity and OAuth 2.0 provider with pluggable connectors
Portainer - Making Docker and Kubernetes management easy.
traefik-forward-auth - Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy