Skip to content

Commit 1e14c91

Browse files
committed
feat: support for authentik forward auth
1 parent d1ddf1f commit 1e14c91

25 files changed

+171
-8
lines changed

README.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,23 @@ infra_wazuh_api_password: ~
6767
6868
### Recommended configuration changes
6969
70+
#### Configure authentik as a forward proxy authentication provider
71+
72+
- Make sure to [Configure authentik as a "Forward Auth" proxy](./docs/authentik.md#configure-authentik-as-a-forward-auth-proxy) as well
73+
74+
```yml
75+
# Enable authentik deployment
76+
infra_use_authentik: true
77+
# Enable for the various services
78+
infra_graylog_use_authentik: true
79+
infra_pihole_use_authentik: true
80+
infra_unifi_use_authentik: true
81+
infra_uptimekuma_use_authentik: true
82+
infra_vaultwarden_use_authentik: true
83+
infra_wazuh_use_authentik: true
84+
infra_wireguard_use_authentik: true
85+
```
86+
7087
#### Set the Pi-Hole admin portal password
7188
```yml
7289
# Password for Pihole web UI. Autogenerated if not set.

defaults/main/graylog.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,12 @@ infra_graylog_db_version: 5.0
77
# Version of the opensearch Docker image to use
88
infra_graylog_opensearch_version: 2.4.0
99

10+
## authentik forward auth proxy
11+
# whether to use authentik as an auth proxy
12+
infra_graylog_use_authentik: false
13+
# which middleware to use. must exist in the traefik config.
14+
infra_graylog_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
15+
1016
## graylog secrets
1117
# Password for the graylog MongoDB user (infra_graylog_db_user)
1218
infra_graylog_db_password: ~
@@ -122,6 +128,8 @@ infra_graylog_log_options:
122128
max-size: 20m
123129
max-file: '5'
124130
compress: 'true'
131+
# Traefik middlewares for the graylog container
132+
infra_graylog_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
125133

126134
## Docker volume configs
127135
# Name of the graylog config Docker volume

defaults/main/main.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,4 +73,11 @@ infra_use_godns: false
7373
infra_use_uptimekuma: true
7474
# Configure wazuh
7575
infra_use_wazuh: false
76+
77+
## Traefik (from netr0m.svc)
78+
# Default middlewares for services behind traefik
79+
infra_default_traefik_middlewares:
80+
- infra-default-mwr@file
81+
# Default middleware for forward auth proxying
82+
infra_default_traefik_auth_mwr: authentik-auth-mwr@file
7683
...

defaults/main/pihole.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@
33
# Version of the pihole Docker image to use (see 'infra_pihole_container_image')
44
infra_pihole_version: 2024.07.0
55

6+
## authentik forward auth proxy
7+
# whether to use authentik as an auth proxy
8+
infra_pihole_use_authentik: false
9+
# which middleware to use. must exist in the traefik config.
10+
infra_pihole_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
11+
612
## Pihole secrets
713
# Password for the web UI
814
infra_pihole_password: ~
@@ -76,6 +82,8 @@ infra_pihole_port_web: 8053
7682
infra_pihole_port_dns: 53
7783
# Max. wait time for pihole compose deployment
7884
infra_pihole_compose_wait_timeout: 300
85+
# Traefik middlewares for the pihole container
86+
infra_pihole_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
7987

8088
## Docker volume configs
8189
# Name of the data Docker volume

defaults/main/unifi.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ infra_unifi_version: 9.0.114
55
# Version of the MongoDB Docker image to use
66
infra_unifi_db_version: 8.0
77

8+
## authentik forward auth proxy
9+
# whether to use authentik as an auth proxy
10+
infra_unifi_use_authentik: false
11+
# which middleware to use. must exist in the traefik config.
12+
infra_unifi_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
13+
814
## Unifi secrets
915
# Password for the unifi MongoDB user (infra_unifi_db_user)
1016
infra_unifi_db_password: ~
@@ -90,6 +96,8 @@ infra_unifi_port_discovery: 10001
9096
infra_unifi_port_l2_discovery: 1900
9197
# Syslog port for the unifi server
9298
infra_unifi_port_syslog: 5514
99+
# Traefik middlewares for the unifi container
100+
infra_unifi_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
93101

94102
## Docker volume configs
95103
# Name of the config Docker volume

defaults/main/uptimekuma.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@
33
# Version of the uptime-kuma Docker image to use (see 'infra_uptimekuma_container_image')
44
infra_uptimekuma_version: 1.23.11-alpine
55

6+
## authentik forward auth proxy
7+
# whether to use authentik as an auth proxy
8+
infra_uptimekuma_use_authentik: false
9+
# which middleware to use. must exist in the traefik config.
10+
infra_uptimekuma_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
11+
612
## uptime-kuma settings. See https://github.com/louislam/uptime-kuma/wiki/Environment-Variables
713
infra_uptimekuma_settings: {}
814

@@ -39,6 +45,8 @@ infra_uptimekuma_fqdn: "{{ infra_uptimekuma_container_hostname }}.{{ infra_domai
3945
infra_uptimekuma_restart_policy: "{{ infra_restart_policy }}"
4046
# Memory limit for the uptime-kuma container
4147
infra_uptimekuma_container_memory: 1g
48+
# Traefik middlewares for the uptime-kuma container
49+
infra_uptimekuma_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
4250

4351
## Docker volume configs
4452
# Name of the redis data Docker volume

defaults/main/vaultwarden.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@
33
# Version of the vaultwarden Docker image to use (see 'infra_vaultwarden_container_image')
44
infra_vaultwarden_version: 1.33.2
55

6+
## authentik forward auth proxy
7+
# whether to use authentik as an auth proxy
8+
infra_vaultwarden_use_authentik: false
9+
# which middleware to use. must exist in the traefik config.
10+
infra_vaultwarden_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
11+
612
## Vaultwarden settings. See https://github.com/dani-garcia/vaultwarden/wiki
713
infra_vaultwarden_settings:
814
EXTENDED_LOGGING: 'true'
@@ -48,6 +54,8 @@ infra_vaultwarden_fqdn: "{{ infra_vaultwarden_container_hostname }}.{{ infra_dom
4854
infra_vaultwarden_restart_policy: "{{ infra_restart_policy }}"
4955
# Memory limit for the vaultwarden container
5056
infra_vaultwarden_container_memory: 1g
57+
# Traefik middlewares for the vaultwarden container
58+
infra_vaultwarden_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
5159

5260
## Docker volume configs
5361
# Name of the data Docker volume

defaults/main/wazuh.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ infra_wazuh_version: 4.11.0
55
# Version of the wazuh Docker image to use (see 'infra_wazuh_cert_tool_container_image')
66
infra_wazuh_cert_tool_version: 0.0.2
77

8+
## authentik forward auth proxy
9+
# whether to use authentik as an auth proxy
10+
infra_wazuh_use_authentik: false
11+
# which middleware to use. must exist in the traefik config.
12+
infra_wazuh_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
13+
814
## wazuh secrets
915
# Password for the wazuh indexer 'admin' user (infra_wazuh_indexer_admin_user)
1016
infra_wazuh_indexer_admin_password: ~
@@ -145,6 +151,8 @@ infra_wazuh_ulimit_memlock_hard: -1
145151
infra_wazuh_ulimit_nofile_soft: 65536
146152
# hard ulimit for nofile
147153
infra_wazuh_ulimit_nofile_hard: 65536
154+
# Traefik middlewares for the wazuh container
155+
infra_wazuh_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
148156

149157
## Docker volume configs
150158
# Name of the manager api config Docker volume

defaults/main/wireguard.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ infra_wireguard_version: latest
55
# Version of the wireguard-ui Docker image to use (see 'infra_wireguard_ui_container_image')
66
infra_wireguard_ui_version: latest
77

8+
## authentik forward auth proxy
9+
# whether to use authentik as an auth proxy
10+
infra_wireguard_ui_use_authentik: false
11+
# which middleware to use. must exist in the traefik config.
12+
infra_wireguard_auth_mwr: "{{ infra_default_traefik_auth_mwr }}"
13+
814
## Wireguard secrets
915
# Session secret used to encrypt wireguard-ui session cookies
1016
infra_wireguard_ui_session_secret: ~
@@ -99,6 +105,9 @@ infra_wireguard_container_dns_servers:
99105
- 1.0.0.1
100106
# Whether to use Pihole for Wireguard DNS. Requires 'infra_use_pihole' to be true
101107
infra_wireguard_use_pihole_dns: "{{ infra_use_pihole }}"
108+
# Traefik middlewares for the wireguard-ui container
109+
infra_wireguard_ui_traefik_middlewares: "{{ infra_default_traefik_middlewares }}"
110+
102111

103112
## Docker volume configs
104113
# Name of the config files' Docker volume

docs/authentik.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# Authentik
2+
3+
## Initial configuration
4+
1. After deploying, navigate to the Authentik dashboard (e.g. `https://authentik.<DOMAIN>.<tld>/if/flow/initial-setup/`. See `infra_authentik_fqdn`)
5+
2. Create the admin user
6+
7+
## Configure authentik as a "Forward Auth" proxy
8+
9+
Firstly, navigate to the [Admin interface](https://authentik.<DOMAIN>.<tld>/if/admin/)
10+
11+
### Create the Application and Application Provider
12+
1. Under [Applications](https://authentik.<DOMAIN>.<tld>/if/admin/#/core/applications), click "Create with wizard"
13+
2. Provide a name for the application (e.g., "Traefik"), and click "Next"
14+
3. Select "Proxy Provider" as the Provider Type, and click "Next"
15+
4. Under "Authorization flow", select the "explicit-auth" option
16+
5. Select "Forward auth (domain level)", and enter the "Authentication URL" (e.g., `authentik.<DOMAIN>.<tld>`) and "Cookie domain" (e.g. `<DOMAIN>.<tld>`). Click "Next"
17+
6. For "Bindings", click "Next" (leave as-is)
18+
7. Click "Submit" to create the Application and Provider
19+
20+
### Configure the Outpost
21+
1. Navigate to [Outposts](https://authentik.<DOMAIN>.<tld>/if/admin/#/outpost/outposts),
22+
2. Click the "Edit" button for the "authentik Embedded Outpost"
23+
3. Highlight the Application you created above (left-hand side), and click the right arrow icon to select the Application
24+
4. Click "Update" to save the change

tasks/deploy_graylog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,11 @@
77
group: "{{ infra_graylog_directory_group }}"
88
mode: "{{ infra_graylog_directory_mode }}"
99

10+
- name: Add Authentik auth middleware
11+
when: infra_graylog_use_authentik
12+
ansible.builtin.set_fact:
13+
infra_graylog_traefik_middlewares: "{{ infra_graylog_traefik_middlewares + [infra_graylog_auth_mwr] }}"
14+
1015
- name: Manage service files
1116
block:
1217
- name: Write graylog DB password secret to file

tasks/deploy_pihole.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@
1515
group: "{{ infra_pihole_dnsmasq_d_directory_group }}"
1616
mode: "{{ infra_pihole_dnsmasq_d_directory_mode }}"
1717

18+
- name: Add Authentik auth middleware
19+
when: infra_pihole_use_authentik
20+
ansible.builtin.set_fact:
21+
infra_pihole_traefik_middlewares: "{{ infra_pihole_traefik_middlewares + [infra_pihole_auth_mwr] }}"
22+
1823
- name: Query for docker network details of '{{ svc_docker_network_name }}'
1924
community.docker.docker_network_info:
2025
name: "{{ svc_docker_network_name }}"

tasks/deploy_unifi.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,11 @@
77
group: "{{ infra_unifi_directory_group }}"
88
mode: "{{ infra_unifi_directory_mode }}"
99

10+
- name: Add Authentik auth middleware
11+
when: infra_unifi_use_authentik
12+
ansible.builtin.set_fact:
13+
infra_unifi_traefik_middlewares: "{{ infra_unifi_traefik_middlewares + [infra_unifi_auth_mwr] }}"
14+
1015
- name: Manage service files
1116
block:
1217
- name: Write unifi DB password secret to file

tasks/deploy_uptimekuma.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,11 @@
77
group: "{{ infra_uptimekuma_directory_group }}"
88
mode: "{{ infra_uptimekuma_directory_mode }}"
99

10+
- name: Add Authentik auth middleware
11+
when: infra_uptimekuma_use_authentik
12+
ansible.builtin.set_fact:
13+
infra_uptimekuma_traefik_middlewares: "{{ infra_uptimekuma_traefik_middlewares + [infra_uptimekuma_auth_mwr] }}"
14+
1015
- name: Manage service files
1116
block:
1217
- name: Write uptimekuma environment variables to file

tasks/deploy_vaultwarden.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,11 @@
77
group: "{{ infra_vaultwarden_directory_group }}"
88
mode: "{{ infra_vaultwarden_directory_mode }}"
99

10+
- name: Add Authentik auth middleware
11+
when: infra_vaultwarden_use_authentik
12+
ansible.builtin.set_fact:
13+
infra_vaultwarden_traefik_middlewares: "{{ infra_vaultwarden_traefik_middlewares + [infra_vaultwarden_auth_mwr] }}"
14+
1015
- name: Manage service files
1116
block:
1217
- name: Write vaultwarden environment variables to file

tasks/deploy_wazuh.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@
1515
group: "{{ infra_wazuh_config_directory_group }}"
1616
mode: "{{ infra_wazuh_config_directory_mode }}"
1717

18+
- name: Add Authentik auth middleware
19+
when: infra_wazuh_use_authentik
20+
ansible.builtin.set_fact:
21+
infra_wazuh_traefik_middlewares: "{{ infra_wazuh_traefik_middlewares + [infra_wazuh_auth_mwr] }}"
22+
1823
- name: Check if initial setup
1924
block:
2025
- name: Stat init file

tasks/deploy_wireguard.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,11 @@
77
group: "{{ infra_wireguard_directory_group }}"
88
mode: "{{ infra_wireguard_directory_mode }}"
99

10+
- name: Add Authentik auth middleware
11+
when: infra_wireguard_ui_use_authentik
12+
ansible.builtin.set_fact:
13+
infra_wireguard_ui_traefik_middlewares: "{{ infra_wireguard_ui_traefik_middlewares + [infra_wireguard_auth_mwr] }}"
14+
1015
- name: Add Pihole as a DNS server for wireguard
1116
when: infra_wireguard_use_pihole_dns and infra_use_pihole
1217
block:

templates/compose/graylog.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ services:
8080
traefik.http.services.{{ infra_graylog_service_name }}-svc.loadbalancer.server.scheme: http
8181
traefik.http.routers.{{ infra_graylog_service_name }}-rtr.service: {{ infra_graylog_service_name }}-svc
8282
traefik.http.middlewares.{{ infra_graylog_service_name }}-mwr.headers.customrequestheaders.X-Graylog-Server-URL: http://{{ infra_graylog_fqdn }}/
83-
traefik.http.routers.{{ infra_graylog_service_name }}-rtr.middlewares: {{ infra_graylog_service_name }}-mwr,lan-mwr@file
83+
traefik.http.routers.{{ infra_graylog_service_name }}-rtr.middlewares: {{ infra_graylog_service_name }}-mwr,{{ infra_graylog_traefik_middlewares | join(',') }}
8484
docker-volume-backup.stop-during-backup: "{{ infra_graylog_service_name }}"
8585
networks:
8686
- default

templates/compose/pihole.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ services:
4444
traefik.http.services.{{ infra_pihole_service_name }}-web-svc.loadbalancer.server.port: 80
4545
traefik.http.services.{{ infra_pihole_service_name }}-web-svc.loadbalancer.server.scheme: http
4646
traefik.http.routers.{{ infra_pihole_service_name }}-web-rtr.service: {{ infra_pihole_service_name }}-web-svc
47-
traefik.http.routers.{{ infra_pihole_service_name }}-web-rtr.middlewares: lan-mwr@file
47+
traefik.http.routers.{{ infra_pihole_service_name }}-web-rtr.middlewares: {{ infra_pihole_traefik_middlewares | join(',') }}
4848
# DNS/tcp shared router
4949
traefik.tcp.services.pihole-dns-tcp-svc.loadbalancer.server.port: 53
5050
# DNS-TLS/tcp

templates/compose/unifi.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ services:
4646
traefik.http.services.{{ infra_unifi_service_name }}-svc.loadbalancer.server.port: 8443
4747
traefik.http.services.{{ infra_unifi_service_name }}-svc.loadbalancer.server.scheme: https
4848
traefik.http.routers.{{ infra_unifi_service_name }}-rtr.service: {{ infra_unifi_service_name }}-svc
49-
traefik.http.routers.{{ infra_unifi_service_name }}-rtr.middlewares: lan-mwr@file
49+
traefik.http.routers.{{ infra_unifi_service_name }}-rtr.middlewares: {{ infra_unifi_traefik_middlewares | join(',') }}
5050
docker-volume-backup.stop-during-backup: "{{ infra_unifi_service_name }}"
5151
networks:
5252
- default

templates/compose/uptimekuma.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ services:
2020
traefik.http.services.{{ infra_uptimekuma_service_name }}-svc.loadbalancer.server.port: 3001
2121
traefik.http.services.{{ infra_uptimekuma_service_name }}-svc.loadbalancer.server.scheme: http
2222
traefik.http.routers.{{ infra_uptimekuma_service_name }}-rtr.service: {{ infra_uptimekuma_service_name }}-svc
23-
traefik.http.routers.{{ infra_uptimekuma_service_name }}-rtr.middlewares: lan-mwr@file
23+
traefik.http.routers.{{ infra_uptimekuma_service_name }}-rtr.middlewares: {{ infra_uptimekuma_traefik_middlewares | join(',') }}
2424
docker-volume-backup.stop-during-backup: "{{ infra_uptimekuma_service_name }}"
2525
networks:
2626
{{ svc_docker_network_name }}:

templates/compose/vaultwarden.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ services:
2020
traefik.http.services.{{ infra_vaultwarden_service_name }}-svc.loadbalancer.server.port: 80
2121
traefik.http.services.{{ infra_vaultwarden_service_name }}-svc.loadbalancer.server.scheme: http
2222
traefik.http.routers.{{ infra_vaultwarden_service_name }}-rtr.service: {{ infra_vaultwarden_service_name }}-svc
23-
traefik.http.routers.{{ infra_vaultwarden_service_name }}-rtr.middlewares: lan-mwr@file
23+
traefik.http.routers.{{ infra_vaultwarden_service_name }}-rtr.middlewares: {{ infra_uptimekuma_traefik_middlewares | join(',') }}
2424
docker-volume-backup.stop-during-backup: "{{ infra_vaultwarden_service_name }}"
2525
networks:
2626
{{ svc_docker_network_name }}:

templates/compose/wazuh.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ services:
104104
traefik.http.services.{{ infra_wazuh_service_name }}-svc.loadbalancer.server.port: 5601
105105
traefik.http.services.{{ infra_wazuh_service_name }}-svc.loadbalancer.server.scheme: https
106106
traefik.http.routers.{{ infra_wazuh_service_name }}-rtr.service: {{ infra_wazuh_service_name }}-svc
107-
traefik.http.routers.{{ infra_wazuh_service_name }}-rtr.middlewares: lan-mwr@file
107+
traefik.http.routers.{{ infra_wazuh_service_name }}-rtr.middlewares: {{ infra_wazuh_traefik_middlewares | join(',') }}
108108
docker-volume-backup.stop-during-backup: "{{ infra_wazuh_service_name }}"
109109
networks:
110110
- default

templates/compose/wireguard.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ services:
4949
traefik.http.services.{{ infra_wireguard_ui_service_name }}-svc.loadbalancer.server.port: 5000
5050
traefik.http.services.{{ infra_wireguard_ui_service_name }}-svc.loadbalancer.server.scheme: http
5151
traefik.http.routers.{{ infra_wireguard_ui_service_name }}-rtr.service: {{ infra_wireguard_ui_service_name }}-svc
52-
traefik.http.routers.{{ infra_wireguard_ui_service_name }}-rtr.middlewares: lan-mwr@file
52+
traefik.http.routers.{{ infra_wireguard_ui_service_name }}-rtr.middlewares: {{ infra_uptimekuma_traefik_middlewares | join(',') }}
5353
network_mode: service:{{ infra_wireguard_service_name }}
5454
cap_add:
5555
- NET_ADMIN

vars/main/main.yml

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,30 @@ infra_docker_volume_shared_labels:
55
netr0m.ansible-role: infra
66

77
# Additional middlewares to include in the traefik config
8-
svc_traefik_extra_middlewares_infra: {}
8+
svc_traefik_extra_middlewares_infra:
9+
infra-default-mwr:
10+
chain:
11+
middlewares:
12+
- lan-mwr
13+
- rate-limit-mwr
14+
# - sec-headers-mwr
15+
authentik-auth-mwr:
16+
forwardAuth:
17+
address: https://{{ infra_authentik_fqdn }}/outpost.goauthentik.io/auth/traefik
18+
trustForwardHeader: true
19+
authResponseHeaders:
20+
- X-authentik-username
21+
- X-authentik-groups
22+
- X-authentik-entitlements
23+
- X-authentik-email
24+
- X-authentik-name
25+
- X-authentik-uid
26+
- X-authentik-jwt
27+
- X-authentik-meta-jwks
28+
- X-authentik-meta-outpost
29+
- X-authentik-meta-provider
30+
- X-authentik-meta-app
31+
- X-authentik-meta-version
932

1033
# Additional entrypoints to include in the traefik config
1134
svc_traefik_extra_entrypoints:

0 commit comments

Comments
 (0)