Files
nixconfig/modules/server/containers/data/authentik/ldap.yaml

42 lines
1.2 KiB
YAML

version: 1
metadata:
name: Pre-configured LDAP Outpost
entries:
# 1. Define the LDAP Provider
- model: authentik_providers_ldap.ldapprovider
identifiers:
name: ldap-provider
attrs:
base_dn: "DC=ldap,@AUTHENTIK_LDAP_DC_DOMAIN@"
search_group: null
authorization_flow:
!Find [
authentik_flows.flow,
[slug, default-provider-authorization-implicit-consent],
]
invalidation_flow:
!Find [authentik_flows.flow, [slug, default-provider-invalidation-flow]]
# 2. Define the Token with a static Key
- model: authentik_core.token
identifiers:
identifier: ldap-outpost-static-token
attrs:
intent: api
# MANDATORY: Explicitly set your long, secure pre-shared token here
key: !Env AUTHENTIK_LDAP
user: 1 # Assigns to default akadmin user
# 3. Define the Outpost linking the Provider and the Token
- model: authentik_outposts.outpost
identifiers:
name: LDAP Outpost
attrs:
type: ldap
providers:
- !Find [authentik_providers_ldap.ldapprovider, [name, ldap-provider]]
token:
!Find [authentik_core.token, [identifier, ldap-outpost-static-token]]
config:
log_level: info