diff --git a/Caddyfile b/Caddyfile index ebd2fff..8f8316c 100644 --- a/Caddyfile +++ b/Caddyfile @@ -77,7 +77,6 @@ netbird.akanealw.com { reverse_proxy @backend 192.168.1.31:8081 # Dashboard (everything else) - import auth reverse_proxy /* 192.168.1.31:8080 } diff --git a/authelia/config/configuration.yml b/authelia/config/configuration.yml index 9a6a222..6f8f821 100644 --- a/authelia/config/configuration.yml +++ b/authelia/config/configuration.yml @@ -65,6 +65,42 @@ webauthn: - 'USER_VERIFICATION_BYPASS' - 'ATTESTATION_KEY_COMPROMISE' +identity_providers: + oidc: + ## The other portions of the mandatory OpenID Connect 1.0 configuration go here. + ## See: https://www.authelia.com/c/oidc + cors: + allowed_origins_from_client_redirect_uris: true + endpoints: + - 'userinfo' + - 'authorization' + - 'token' + - 'revocation' + - 'introspection' + clients: + - client_id: 'wWXrRkVCMDkwNHTm2.d-A4yWyXjxwmvYv~jb9XxlVx5Cb_SfEb.ma3x1.KFZyDbxuE2aS3Iy' + client_name: 'NetBird' + client_secret: '$pbkdf2-sha512$310000$HcYlWJDCNyqCkcW8Zc9.yQ$4EGMr6nOkEeuFLLbCNVKLjbfVquMvA0eP9vQAI6lS9Uzq2CVG0qezS3liaquhaE0wSUcBCix/LlI5LbCR5EJsg' # The digest of 'insecure_secret'. + public: false + authorization_policy: 'two_factor' + require_pkce: false + pkce_challenge_method: '' + redirect_uris: + - 'https://netbird.akanealw.com/peers' + - 'https://netbird.akanealw.com/add-peers' + - 'http://localhost' + scopes: + - 'openid' + - 'email' + - 'profile' + response_types: + - 'code' + grant_types: + - 'authorization_code' + access_token_signed_response_alg: 'none' + userinfo_signed_response_alg: 'none' + token_endpoint_auth_method: 'client_secret_post' + authentication_backend: file: path: '/config/users_database.yml'