bildung.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Bildung unter den Bedingungen der digitalen Transformation.

Verwaltet von:

Serverstatistik:

843
aktive Profile

#authentik

0 Beiträge0 Beteiligte0 Beiträge heute

And down the rabbit hole I go… 🐇 This time, I’ve started setting up #ArgoCD! Step one? Installing #Gitea in my #k3s cluster and, of course, integrating it with #Authentik because why not complicate my life further?

Every self-hosting journey feels like a new chapter in an endless saga. Can’t wait to see how deep this one goes.

Follow along with my adventures under #SelfHostingChronicles and join the chaos!

#RabbitOps#GitOps#OpenSource

Ihr wollt #Mastodon auch mit (zusätzlichem) #SSO betreiben? Eure bisherigen Nutzer sollen dabei erhalten bleiben?

Ich hab da was zusammen gesucht aus der Dokumentation und verschiedenen Issues auf Github. Hier eine funktionierende Konfiguration. Ich verwende sie selbst in Verbindung mit #authentik

crypt.storagemte.eu/code/#/2/c

Bitte beachtet, das ihr bei Mastodon dieselbe E-Mailadresse wie in eurem Identitätsprovider haben müsst!

crypt.storagemte.euEncrypted CodeCryptPad: end-to-end encrypted collaboration suite

I hear really good things about #authentik and from what I can tell from reviews and the documentation, it is very flexible and can do a lot.

But man, if it’s not confusing. #Authelia has worked so well for the last few years, but development has slowed and I haven’t had the time to dig into the code base.

We’ll see how far I get, but it hasn’t been a good start. I can’t setup my #ldap outpost because my #ldap application doesn’t show up as an available app. 🤷🏼 #SelfHosting #authentication

I had a vauge failure message when trying to login to #tailscale with my OIDC provider via #authentik

After a some yak shaving fixing my kubeconfig to get into my cluster, fix the broken webfinger implementation to work correctly again, and it turns out that the signing certificate used for the provider in Authentik had expired and needed replacing with a new RSA based cert.

Why is nothing ever a simple fix in #selfhosting land...

I got #authentik up and running and it seems... complicated. Does anyone run #authelia? I mean, I don't need all the fancy LDAP trinkets and such, I just need webauthn that opens the floodgates to my oauth-capable backends.

What stops me is that authelia has a security assessment and authentik doesn't.

So I'm learning that #headscale is intentionally missing features from #tailscale. And it seems I am in need of a couple of those features. I wonder how hard it would be to migrate from selfhosted to commercial? The free plan is basically an unlimited demo, so that is fine. It even lists #authentik as an example of a supported IDP..

Guess what isn't actually supported? Well, start with "any IDP that doesn't run on the bare domain, matching the email address" because they use webfinger. (The tl;dr on that is that if your account is "cats@dogs.com", it downloads
https://dogs.com/.well-known/webfinger. What if there is no site at dogs.com? That is just too bad.)

OK now pretend you happily reconfigured everything to align your email address with your bare domain.. Your next prize is discovering that Authentik does not, in fact, support webfinger. All you did is jack up your configurations and DNS for no reason.

So um well there is a lot wrong there and maybe I'll just get a normal account. Now I have to decide who gets access to my tailnet without my permission: Google, Microsoft, Microsoft, or Apple. This just keeps getting worse.

I have a headache.

#security #selfhost #selfhosting