Authentik + Nginx + JetKVM: A guid to SSO (needs to be tested) #57
-
JetKVM is a greate tool also for Home labers. In my Home Lab I have been using Authentik on most of my services and I always try to impliment it even when it is not exacly designed for it. In this thread I am hoping to find a way to make JetKVM work with Authentik + Nginx Proxy Manager. For this method I will use JetKVM with a Password to make things more dificult for us and more realistic from a security stand. Step 1: JetKVM Authentication Tokens:
The file ./cookie.txt conains the access token just as described in documentations. Inspecting the Login page, it seems that the Respons contains a header named The token can easily be obtined using Authentik Scope Mapping. As an example we will save JetKVM Password as a Group Attributes in Authentik so members of the group will have access to In Authentik Admin Panel, go to In Authentik Admin Panel, go to
Test this Scope with some users. Users that belonge to the groupe with the Attribute we addedd should return the Access Token and others will return "Null". Step 2: Outpost is accessble Step 3: Create Proxy Authentication Provider Step 4: Fetching JetKVM Access Token
When testing make sure to clear all cookies or try it in incognito window. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Realistically, the best way would to support OIDC is in the application itself. The problem is the chain. You can support OIDC on the device, by making some changes to the way the login process works. Currently the device is hard locked to support Google to login into your device, and link it to the cloud. We have to do something to change that. Support OIDC on your device would probably be something along the lines of you setup a U&P on the device for the first time, and later can go in and setup your OIDC connection. |
Beta Was this translation helpful? Give feedback.
Realistically, the best way would to support OIDC is in the application itself. The problem is the chain. You can support OIDC on the device, by making some changes to the way the login process works.
Currently the device is hard locked to support Google to login into your device, and link it to the cloud. We have to do something to change that. Support OIDC on your device would probably be something along the lines of you setup a U&P on the device for the first time, and later can go in and setup your OIDC connection.