traefik-kop
authelia
traefik-kop | authelia | |
---|---|---|
7 | 174 | |
124 | 19,578 | |
9.7% | 1.8% | |
5.3 | 9.9 | |
7 months ago | 5 days ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
traefik-kop
-
Traefik Kobling: a Traefik-to-Traefik discovery agent!
Traefik gives you a lot of options to accomplish this, you can use docker swarm, move to kubernetes or use any of their discovery providers. These options were rather complicated solutions for what I needed, so I decided to look around for other alternatives. Here I found Traefik-Kop, but it I still had to do a lot of manual work and open a different port for each container I wanted to be accesible through my reverse proxy.
- Can an already running Traefik container on a network act as revesre proxy for co tainers on another network
-
Traefik vs NPM vs alternative for multiple machines
The obvious solution is docker swarm/kubernetes, but if you don't want to go all the way there yet I can really recommend traefik kop. Very simple to setup, you just add a redis service next to the traefik instance and set it up as a provider, then you run traefik kop on every other machine, pointed at that redis service. Traefik kop will discover docker services on the machine and write everything to redis and it'll get picked up ny traefik. Worked like a charm!
-
Routing traffic from another machine
Maybe this can help you https://github.com/jittering/traefik-kop
- Running traefik with multiple docker hosts
- New tool: traefik-kop - a discovery agent for non-swarm/k8s docker clusters
- traefik-kop: a dynamic docker->redis->traefik discovery agent
authelia
-
Keycloak SSO with Docker Compose and Nginx
It's me and two others though I'm definitely the most active. We put a lot of effort into security best practices and one of my co-developers is currently reviewing the 4.38.0 release. It's a fairly major release with a lot of important code paths that have been improved for the future.
Our official docs can be found at https://www.authelia.com and you can find docs for a particular PR in the relevant PR. We've also linked the pre-release docs in the pre-release discussions which can be found here: https://github.com/authelia/authelia/discussions/categories/...
-
Protecting WebUI on public IP?
I use NGINX proxy with Authelia in between. Authelia blocks and blacklists faulty logins.
-
Why would anyone need AD/AAD when you can manage devices through Saltstack?
https://github.com/saltstack/salt https://github.com/chocolatey/choco https://github.com/nextcloud https://github.com/authelia/authelia https://github.com/grafana/grafana
- Give this project some luv: Single Sign-On Multi-Factor portal for web apps
-
HAProxy with Forward Auth to Authentik
If you are using HAProxy on PfSense/OPNSense, see my issue https://github.com/authelia/authelia/issues/2696
- Keycloak β Open-Source Identity and Access Management Interview
-
LDAP or AD for selfhosted
https://github.com/lldap/lldap is a very simple and lightweight LDAP solution. Works flawless with https://www.authelia.com/
-
Authelia/SSO With Caddy In Docker Compose?
Ah yeah, so I guess it's been a while since I tried and I forgot where I got stuck last time. Authelia's config.yml is absolutely massive and I'm not sure which section of their guide I should be following. In The Docker Compose section, there's "Unbundled", "Lite", and "Local". I think I want to be running the "lite" bundle, but their example compose file has a ton of Traefik stuff in it. I know I wouldn't keep the Traefik services, but do I need either secure or public?
-
How do you secure your webpages that have no protection?
Authelia supports SSO. If you are behind a reverse proxy itβs quite straightforward to integrate.
-
GitLab behind Authelia
This should probably also be mentioned in the documentation so maybe consider mentioning this on their discussion page.
What are some alternatives?
traefik-modsecurity-plugin - Traefik plugin to proxy requests to owasp/modsecurity-crs:apache container
authentik - The authentication glue you need.
postgres-and-redis - π PostgreSQL + Redis. Self-Hosted. Docker + Traefik + HTTPS.
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
richardsoper.me - My Traefik V2 stack.
oauth2 - Go OAuth2
varnish-towncrier - Distribute cache invalidation requests to a fleet of varnish instances.
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
TraefikKobling - A dynamic Traefik-to-Traefik discovery agent
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
registrator - Service registry bridge for Docker with pluggable adapters
dex - OpenID Connect (OIDC) identity and OAuth 2.0 provider with pluggable connectors