fix ldap authentik
This commit is contained in:
@@ -143,7 +143,7 @@ in {
|
|||||||
echo "ERROR: Server failed to accept restart command."
|
echo "ERROR: Server failed to accept restart command."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
sleep 5
|
sleep 1-
|
||||||
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
|
until [ "$(${pkgs.curl}/bin/curl -sf "$JELLYFIN_URL/health")" = "Healthy" ]; do
|
||||||
sleep 5
|
sleep 5
|
||||||
done
|
done
|
||||||
|
|||||||
@@ -8,6 +8,4 @@ entries:
|
|||||||
slug: gitea
|
slug: gitea
|
||||||
attrs:
|
attrs:
|
||||||
name: Gitea
|
name: Gitea
|
||||||
provider:
|
|
||||||
!Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
|
|
||||||
launch_url: "@GITEA_DOMAIN@"
|
launch_url: "@GITEA_DOMAIN@"
|
||||||
|
|||||||
@@ -8,6 +8,4 @@ entries:
|
|||||||
slug: jellyfin
|
slug: jellyfin
|
||||||
attrs:
|
attrs:
|
||||||
name: Jellyfin
|
name: Jellyfin
|
||||||
provider:
|
|
||||||
!Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
|
|
||||||
launch_url: "@JELLYFIN_DOMAIN@"
|
launch_url: "@JELLYFIN_DOMAIN@"
|
||||||
|
|||||||
@@ -44,18 +44,19 @@ entries:
|
|||||||
attributes:
|
attributes:
|
||||||
ak_recovery_immutable: true
|
ak_recovery_immutable: true
|
||||||
|
|
||||||
- model: authentik_core.group
|
- model: authentik_core.role
|
||||||
state: present
|
state: present
|
||||||
identifiers:
|
identifiers:
|
||||||
name: "LDAP Bind Service Account Group"
|
name: "LDAP Search Role"
|
||||||
attrs:
|
attrs:
|
||||||
users:
|
users:
|
||||||
- !Find [authentik_core.user, [username, ldap-service]]
|
- !Find [authentik_core.user, [username, ldap-service]]
|
||||||
|
|
||||||
- model: authentik_policies.policybinding
|
- model: authentik_core.objectpermission
|
||||||
state: present
|
state: present
|
||||||
identifiers:
|
identifiers:
|
||||||
target:
|
permission: !KeyOf authentik_core.permission:codename=search_full_directory,content_type__app_label=authentik_providers_ldap
|
||||||
|
role: !Find [authentik_core.role, [name, LDAP Search Role]]
|
||||||
|
attrs:
|
||||||
|
object_pk:
|
||||||
!Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
|
!Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
|
||||||
permission: "authentik_providers_ldap.search_full_directory"
|
|
||||||
user: !Find [authentik_core.user, [username, ldap-service]]
|
|
||||||
|
|||||||
@@ -2,7 +2,6 @@ version: 1
|
|||||||
metadata:
|
metadata:
|
||||||
name: nextcloud-saml-setup
|
name: nextcloud-saml-setup
|
||||||
entries:
|
entries:
|
||||||
# 1. Create the SAML Provider
|
|
||||||
- model: authentik_providers_saml.samlprovider
|
- model: authentik_providers_saml.samlprovider
|
||||||
identifiers:
|
identifiers:
|
||||||
name: Nextcloud SAML
|
name: Nextcloud SAML
|
||||||
@@ -15,12 +14,10 @@ entries:
|
|||||||
invalidation_flow:
|
invalidation_flow:
|
||||||
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
|
||||||
|
|
||||||
# Adjust these URLs to match your Nextcloud domain
|
|
||||||
acs_url: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/acs
|
acs_url: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/acs
|
||||||
audience: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/metadata
|
audience: https://@NEXTCLOUD_DOMAIN@/apps/user_saml/saml/metadata
|
||||||
issuer: https://@AUTHENTIK_DOMAIN@
|
issuer: https://@AUTHENTIK_DOMAIN@
|
||||||
sp_binding: post
|
sp_binding: post
|
||||||
# Map the attributes for Name, Email, and Groups
|
|
||||||
property_mappings:
|
property_mappings:
|
||||||
- !Find [
|
- !Find [
|
||||||
authentik_core.propertymapping,
|
authentik_core.propertymapping,
|
||||||
@@ -43,32 +40,6 @@ entries:
|
|||||||
[name, "authentik default SAML Mapping: User ID"],
|
[name, "authentik default SAML Mapping: User ID"],
|
||||||
]
|
]
|
||||||
|
|
||||||
# - !Find [
|
|
||||||
# authentik_providers_saml.samlpropertymapping,
|
|
||||||
# [managed, "goauthentik.io/providers/saml/ms-name"],
|
|
||||||
# ]
|
|
||||||
# - !Find [
|
|
||||||
# authentik_providers_saml.samlpropertymapping,
|
|
||||||
# [managed, "goauthentik.io/providers/saml/ms-email"],
|
|
||||||
# ]
|
|
||||||
# - !Find [
|
|
||||||
# authentik_providers_saml.samlpropertymapping,
|
|
||||||
# [managed, "goauthentik.io/providers/saml/ms-groups"],
|
|
||||||
# ]
|
|
||||||
|
|
||||||
# - !Find [
|
|
||||||
# authentik_core.propertymapping,
|
|
||||||
# [managed, goauthentik.io/providers/saml/ms-name],
|
|
||||||
# ]
|
|
||||||
# - !Find [
|
|
||||||
# authentik_core.propertymapping,
|
|
||||||
# [managed, goauthentik.io/providers/saml/ms-email],
|
|
||||||
# ]
|
|
||||||
# - !Find [
|
|
||||||
# authentik_core.propertymapping,
|
|
||||||
# [managed, goauthentik.io/providers/saml/ms-groups],
|
|
||||||
# ]
|
|
||||||
# Select your signing certificate (default is usually self-signed)
|
|
||||||
signing_kp:
|
signing_kp:
|
||||||
!Find [
|
!Find [
|
||||||
authentik_crypto.certificatekeypair,
|
authentik_crypto.certificatekeypair,
|
||||||
@@ -77,7 +48,6 @@ entries:
|
|||||||
sign_assertion: true
|
sign_assertion: true
|
||||||
sign_response: false
|
sign_response: false
|
||||||
|
|
||||||
# 2. Create the Application
|
|
||||||
- model: authentik_core.application
|
- model: authentik_core.application
|
||||||
identifiers:
|
identifiers:
|
||||||
slug: nextcloud
|
slug: nextcloud
|
||||||
|
|||||||
Reference in New Issue
Block a user