caddy-security
vouch-proxy
Our great sponsors
caddy-security | vouch-proxy | |
---|---|---|
17 | 48 | |
1,234 | 2,643 | |
- | 2.2% | |
8.1 | 3.2 | |
19 days ago | about 1 month ago | |
Go | Go | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
caddy-security
- Caddy-Security: Security App and Plugin for Caddy
-
Security flaws in an SSO plugin for Caddy
There is no "refusal" as far as I can tell. The issues were reported [1] in September 2023 (as was this blog post) and the simplest one has been fixed (insecure random seed). I'm not aware of any public statements from the plugin maintainers, and there is no hostility in the issue comments.
[1]: https://github.com/greenpau/caddy-security/issues?q=is%3Aiss...
> September 18, 2023: The disclosure blog post was released and issues were filed with the original project repository.
I don't see those issues listed in the GitHub project issue tracker https://github.com/greenpau/caddy-security/issues. Have they been deleted?
-
Web authentication for reverse proxy
Check out https://github.com/greenpau/caddy-security
-
What 3rd party auth provider would you guys recommend to use with Caddy on Windows, and are there any tutorials or documentation?
There a pretty comprehensive auth plugin for Caddy. It can do local authentication with a session cookie, which should work with your IPTV apps. If your app can show a login form, it's super easy, but if I remember correctly you can also authenticate with basic auth and store the session in a cookie (this is mostly used to carry over the authentication to a different subdomain).
-
Q: I need help with securing my selfhosted services
I use Caddy + Caddy Security, set up OAuth, and also only expose services over IPv6. It's not extra security, but it's less logs to deal with because nobody is scanning IPv6 address ranges, and there are less IPv6 capable hosts who are compromised.
- Authentication in Go? Best practices
-
Web server with content upload and authentication
Not sure if this fits your bill, but have a look at Caddy web server and its available authentification methods or even more with a plugin
-
Hiding Public IP
Also look at github.com/greenpau/caddy-security to enable MFA for Caddy.
-
Guacamole + LetsEncrypt (Nginx/Træfik) + VPN ? (x-post r/selfhosted)
- Guacamole docker connects to Debian VNC Desktop - Caddy docker offers HTTPS proxy with Guacamole and the Caddy Security plug in for Auth with TOTP
vouch-proxy
- I'm looking for an SSO server/reverse proxy with features I'm not sure exist
-
Keycloak vs. Authentik vs. Authelia, help choose SSO
Look into vouch proxy
- Solf-hosted login form for self-hosted app ?
- AWS EKS front end authentication with Okta?
-
Is there something like Keycloak or Authelia that supports both forward auth and identity providers?
Vouch proxy is designed for this usage: https://github.com/vouch/vouch-proxy I don't think there are any nice UIs to configure it though so you'll need to be familiar with running it yourself.
-
cloudflare and ingress-nginx
Not sure this is a "best practice", but it lets me keep control of the Ingress resources inside their YAML configs. I've also layered Vouch Proxy into the ingress configurations to require SSO/MFA auth to access the resources behind the Ingress. Cloudflare has the ability to do this, but I found it cumbersome to keep track of the configs outside the K8s cluster.
-
Single Sign on for reverse proxy (NGINX Proxy Manager)
I've used vouch proxy for my own stuff previously, before more recently moving to Cloudflare Access. vouch can be slightly janky at times to get working right, but once set up, it's been solid.
-
Yubikey support in Jellyfin
For example: nginx -> Vouch proxy -> KeyCloak -> Jellyfin
-
Jump Host SSO to Internal Apps
While this works, we were hoping to make access a bit easier with say an OpenID Connect SSO and reverse-proxy solution. I've seen Vouch Proxy, https://github.com/vouch/vouch-proxy which is really just SSO on top of nginx, but I'm wondering if there's a simpler way to do this.
-
Do you prefer to build your own auth, or use some library or provider (like auth0, Next Auth, Supabase, etc)?
You seem to be quite knowledgeable and a minimal provider with just the bare minimum would suffice for you. Have a look at Vouch Proxy, it does one thing and it does it well.
What are some alternatives?
caddy-auth-portal - Authentication Plugin for Caddy v2 implementing Form-Based, Basic, Local, LDAP, OpenID Connect, OAuth 2.0 (Github, Google, Facebook, Okta, etc.), SAML Authentication. MFA with App Authenticators and Yubico.
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
scim-for-keycloak - a third party module that extends keycloak by SCIM functionality
jfa-go - a better way to manage your Jellyfin users, now in go
caddy-maxmind-geolocation - Caddy v2 module to filter requests based on source IP geolocation
authentik - The authentication glue you need.
SuperTokens Community - Open source alternative to Auth0 / Firebase Auth / AWS Cognito
authelia - The Single Sign-On Multi-Factor portal for web apps
webauthn - WebAuthn (FIDO2) server library written in Go
traefik-forward-auth - Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface