feat: Integrate Authentik OIDC into Semaphore and enhance Proxmox VM template creation with image list selection and SSH key management.
This commit is contained in:
@@ -17,3 +17,7 @@ SEMAPHORE_EMAIL_PASSWORD=smtp_password
|
||||
SEMAPHORE_EMAIL_SECURE=false
|
||||
|
||||
|
||||
AUTHENTIK_URL=https://authentik.example.com/application/o/<slug>/
|
||||
AUTHENTIK_CLIENT_ID=your_client_id
|
||||
AUTHENTIK_CLIENT_SECRET=your_client_secret
|
||||
AUTHENTIK_REDIRECT_URI=https://semaphore.example.com/api/auth/oidc/authentik/redirect/
|
||||
|
||||
@@ -34,6 +34,18 @@ services:
|
||||
SEMAPHORE_EMAIL_USERNAME: ${SEMAPHORE_EMAIL_USERNAME}
|
||||
SEMAPHORE_EMAIL_PASSWORD: ${SEMAPHORE_EMAIL_PASSWORD}
|
||||
SEMAPHORE_EMAIL_SECURE: ${SEMAPHORE_EMAIL_SECURE}
|
||||
SEMAPHORE_OIDC_PROVIDERS: '{
|
||||
"authentik": {
|
||||
"display_name": "Sign in with Authentik",
|
||||
"provider_url": ${AUTHENTIK_URL},
|
||||
"client_id": ${AUTHENTIK_CLIENT_ID},
|
||||
"client_secret": ${AUTHENTIK_CLIENT_SECRET},
|
||||
"redirect_uri": ${AUTHENTIK_REDIRECT_URI},
|
||||
"scopes": ["openid", "profile", "email"],
|
||||
"username_claim": "preferred_username",
|
||||
"name_claim": "preferred_username"
|
||||
}
|
||||
}'
|
||||
volumes:
|
||||
- semaphore_data:/var/lib/semaphore
|
||||
- semaphore_config:/etc/semaphore
|
||||
|
||||
Reference in New Issue
Block a user