docker-swag
authelia
Our great sponsors
docker-swag | authelia | |
---|---|---|
295 | 174 | |
2,488 | 19,235 | |
2.9% | 3.3% | |
9.2 | 9.9 | |
6 days ago | 4 days ago | |
Dockerfile | Go | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-swag
- Fail2Ban – Daemon to ban hosts that cause multiple authentication errors
- How do you renew SSL certificates?
-
LDAP or AD for selfhosted
https://docs.linuxserver.io/general/swag makes the setup of Authelia very simple.
-
VPN vs Exposing ports/subdomains for services
If you're issuing certs, you might as well centralize with a reverse proxy etc etc. -- take a look at something like a combination of Duckdns and SWAG from linuxserver.io (https://docs.linuxserver.io/general/swag), which does a lot of the heavy lifting for integrations with Lets Encrypt.
-
Next cloud Nginx on two different machines
Linuxserver.io maintains a reverse proxy (SWAG) and they have a github repo of all the configs they support, nextcloud being one of them (ofc to do it on your own you have to merge a few of the includes they have ssl.conf, proxy.conf, etc).
-
Did you have serious attacks on your exposed services before?
I have a domain through Cloudflare and I use a Cloudflare tunnel to expose my services on my domain. Geoblocking helps filter a lot of erroneous traffic. Cloudflare also has some useful features to help with blocking malicious attacks and bots. For my reverse proxy, I use SWAG
- Plex, sonarr, and radarr have saved my sanity... and ruined my gaming computer at the same time
-
Who else doesn’t work in IT? What are you struggling with today.
Long-time amateur here. I tried a bunch of different methods for reverse proxies, and in the end, I used the SWAG docker container from Linuxserver.io, which simplifies it a great deal, and helped me understand the proper syntax.
This is what I used: https://docs.linuxserver.io/general/swag
-
This is probably the stupidest question and I'm 99% sure I know the answer
It's all in their repo https://github.com/linuxserver/docker-swag and docs https://docs.linuxserver.io/general/swag
authelia
-
Keycloak SSO with Docker Compose and Nginx
It's me and two others though I'm definitely the most active. We put a lot of effort into security best practices and one of my co-developers is currently reviewing the 4.38.0 release. It's a fairly major release with a lot of important code paths that have been improved for the future.
Our official docs can be found at https://www.authelia.com and you can find docs for a particular PR in the relevant PR. We've also linked the pre-release docs in the pre-release discussions which can be found here: https://github.com/authelia/authelia/discussions/categories/...
I've been eyeing authentik[1] and authelia[2].
Authelia looks really good to me, but the fact that keycloak has connectors for angular and you need to setup oidc angular plugins with authelia for example made me a little bit wary. But I guess having a config for Keycloak makes it's easier to get started.
> My only concern is that Authelia hasn't had a new release for more than a year, which raises security concerns.
I'm a bit concerned about that too. When setting it up, I found a lot of their docs on github mentioned they have `template` and `expand-env` "configuration filters", then it took me entirely too long to realize that while the 4.38 pre-release notes, posted in January 2023, say it's "just around the corner", it's still being worked on.
Having said that, there still seems to be somewhat active development. It may just be one person at this point.
https://hub.docker.com/layers/authelia/authelia/v4.38.0-beta...
That's not a new release of authelia. Authelia's releases are at https://github.com/authelia/authelia/releases
The updates to the AUR package were not about new releases since 2022:
aur/authelia $ git log ad4e6ca^..HEAD
-
Why would anyone need AD/AAD when you can manage devices through Saltstack?
https://github.com/saltstack/salt https://github.com/chocolatey/choco https://github.com/nextcloud https://github.com/authelia/authelia https://github.com/grafana/grafana
-
HAProxy with Forward Auth to Authentik
If you are using HAProxy on PfSense/OPNSense, see my issue https://github.com/authelia/authelia/issues/2696
-
Keycloak – Open-Source Identity and Access Management Interview
We used keycloak for openid identity provider as well. It is fine to setup keycloak once. But it is painful share the setup with other engineers.
For local development, we end up using dex (https://dexidp.io). When we need support group/role, we use dex and glauth(https://glauth.github.io). Both dex and glauth can be configured with yaml files. We just created a few yaml files and a docker compose file, every engineer can be brought up the whole environment in a few seconds.
Also https://www.authelia.com and https://github.com/goauthentik/authentik look pretty promising, if you need more advanced features from them.
-
LDAP or AD for selfhosted
https://github.com/lldap/lldap is a very simple and lightweight LDAP solution. Works flawless with https://www.authelia.com/
-
Authelia/SSO With Caddy In Docker Compose?
Ah yeah, so I guess it's been a while since I tried and I forgot where I got stuck last time. Authelia's config.yml is absolutely massive and I'm not sure which section of their guide I should be following. In The Docker Compose section, there's "Unbundled", "Lite", and "Local". I think I want to be running the "lite" bundle, but their example compose file has a ton of Traefik stuff in it. I know I wouldn't keep the Traefik services, but do I need either secure or public?
What are some alternatives?
authentik - The authentication glue you need.
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
oauth2 - Go OAuth2
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
dex - OpenID Connect (OIDC) identity and OAuth 2.0 provider with pluggable connectors
Portainer - Making Docker and Kubernetes management easy.
traefik-forward-auth - Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy
traefik-examples - docker-compose configurations examples for traefik
uptime-kuma - A fancy self-hosted monitoring tool