Synology-Docker-Mediaserver
traefik-forward-auth
Our great sponsors
Synology-Docker-Mediaserver | traefik-forward-auth | |
---|---|---|
6 | 32 | |
14 | 2,003 | |
- | - | |
8.4 | 0.0 | |
4 days ago | 16 days ago | |
Shell | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Synology-Docker-Mediaserver
-
Synology Docker Question
Try 8080 and 8081? In case it's useful, here's my full Docker stack on Synology, including Calibre and Calibre-web. I normally use the reverse proxy address, but http://synologyIP: 8081 loads my Calibre fine.
-
Synology + Docker
Here's my full config, to add to the port comment earlier - everything running completely smoothly on a Synology 218+.
-
Please help, I’m a beginner: Creating a Container from Dockerfile and docker-compose.yml on Synology NAS?
This is perhaps a lot more detail than you want right now, but here's my docker-compose.yml for a bunch of containers running on my Synology 218+. The GitHub repo you're talking about will have an address which you'd point to, adding configuration options like in the examples you'll see in my file.
-
Traefik as auth layer? Is there anything like basicAuth but on steroids?
In case it's useful, here's my (Docker) config using that auth container, which authenticates via Google login and is frontend agnostic.
-
My Docker Compose on a ds918+
Thanks for sharing this. My 218+ is running smoothly with this yml (on Github), but I'm sure I'll learn something from yours nevertheless! One thing I'm curious about, though: why did you go the route of freeing up 80 and 443 on the Synology, rather than just forwarding them on your router? In my case, I have Traefik using 89:80 and 449:443, with the router doing those respective forwards.
-
Authentication problems
Here's my full config, in case you want to use it as a starting point.
traefik-forward-auth
- Show HN: Obligator – An OpenID Connect server for self-hosters
-
Authentik reverse proxy vs swag
BTW also keycloak and other similar products offer the oauth-proxy capability, I even used the original oauth2-proxy https://github.com/oauth2-proxy/oauth2-proxy for a while, but it was getting too difficult to maintain for me. I used for a while https://github.com/thomseddon/traefik-forward-auth that was a smart hack configuring a single upstream provider, but it look abandoned. So I was considering authentik but apparently it's just oauth2-proxy embedded in it, at that point why not use oauth2-proxy directly.
-
Traefik with traefik-forward-auth towards Azure AD loop-redirect and fail
It seems there are some more recently updated forks.
-
Dell T320 vs T620 Idle Power
Traefik Forward Auth
-
Assuming I have each individual service working (cloudflare-tunnel, keycloak, nginx, arrs, dashy), how would I go about having a system like this? (more in comments)
One way I got this to work (for another app that doesn’t go through cloudflare) was to use Traefik with forward-auth and this: https://github.com/thomseddon/traefik-forward-auth
-
Just finished migrating my old tower servers to a Kubernetes cluster on my new rack!
In front of all of my private dashboards, I use Traefik Forward Auth to limit who can access them.
-
Is there something like Keycloak or Authelia that supports both forward auth and identity providers?
Hm, interesting. I have worked with traefik-forward-auth before, but I didn't know there is a fork. Are you using the fork? Would you happen to know if this issue from the original project still exists or if it's fixed in the fork?
-
How do you expose some of your services to the internet?
https://github.com/thomseddon/traefik-forward-auth (just another option if everyone accessing already has a google account)
-
Cant wrap my head around auth process
Traefik ingress + forward auth middleware + traefik-forward-auth does the trick.
-
SSO with keycloak and traefik
Hey have u setup a forward auth? https://github.com/thomseddon/traefik-forward-auth
What are some alternatives?
synology-pihole - Install or Update Pi-Hole as Docker Container on a Synology NAS with a Static IP Address
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
synology-update-plex - Script to Auto Update Plex Media Server on Synology NAS
authelia - The Single Sign-On Multi-Factor portal for web apps
LMDS - LMDS - Linux Media Delivery System
pam-keycloak-oidc - PAM module connecting to Keycloak for user authentication using OpenID Connect/OAuth2, with MFA/2FA/TOTP support
deeztek-docker - A collection of scripts to ease the installation of Docker, Docker Compose and various containers on your Ubuntu host.
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
self_hosted - self_hosted
awesome-zero-trust - A curated collection of awesome resources for the zero-trust security model.
PlexGuide.com - Welcome to https://PlexGuide.com ~ Rapidly deploy multiple-hasty Docker Containers through Ansible with local or Unlimited Google HD Space!
Traefik-with-Pomerium-Forward-Auth-and-Proxy-on-Kubernetes-with-Helm - Traefik with Pomerium in Forward Auth and Proxy mode on Kubernetes with Helm/Helmfile