260 lines
7.5 KiB
YAML
260 lines
7.5 KiB
YAML
ingress:
|
|
enabled: false
|
|
|
|
|
|
pod:
|
|
kind: 'Deployment'
|
|
replicas: 1
|
|
|
|
|
|
|
|
##
|
|
## Authelia Config Map Generator
|
|
##
|
|
configMap:
|
|
key: 'configuration.yaml'
|
|
# include sub-maps wich OVERRIDE the values generated by the helm chart
|
|
extraConfigs:
|
|
- /secrets/authelia-smtp/smtp.yml
|
|
|
|
|
|
# many of the values remain default from the helm chart
|
|
authentication_backend:
|
|
ldap:
|
|
enabled: true
|
|
implementation: 'custom'
|
|
address: 'ldap://lldap:3890'
|
|
base_dn: 'DC=moll,DC=re'
|
|
additional_users_dn: 'OU=people'
|
|
users_filter: "(&({username_attribute}={input})(objectClass=person))"
|
|
additional_groups_dn: 'OU=groups'
|
|
groups_filter: "(member={dn})"
|
|
|
|
## The username of the admin user.
|
|
user: 'uid=authelia,ou=people,dc=moll,dc=re'
|
|
password:
|
|
# ## Disables this secret and leaves configuring it entirely up to you.
|
|
# disabled: false
|
|
|
|
# ## The secret name. The ~ name is special as it is the secret we generate either automatically or via the
|
|
# ## secret_value option below.
|
|
# secret_name: ~
|
|
|
|
# ## The value of a generated secret when using the ~ secret_name.
|
|
# value: ''
|
|
|
|
# ## The path to the secret. If it has a '/' prefix it's assumed to be an absolute path within the pod. Otherwise
|
|
# ## it uses the format '{mountPath}/{secret_name}/{path}' where '{mountPath}' refers to the 'secret.mountPath'
|
|
# ## value, '{secret_name}' is the secret_name above, and '{path}' is this value.
|
|
path: 'authentication.ldap.password.txt'
|
|
secret_name: authelia-ldap
|
|
|
|
attributes:
|
|
display_name: displayName
|
|
username: uid
|
|
group_name: cn
|
|
mail: mail
|
|
file:
|
|
enabled: false
|
|
|
|
|
|
session:
|
|
inactivity: '2d'
|
|
expiration: '7d'
|
|
remember_me: '1M'
|
|
cookies:
|
|
- name: authelia_session
|
|
domain: auth.kluster.moll.re
|
|
encryption_key:
|
|
secret_name: authelia-internal
|
|
|
|
|
|
storage:
|
|
encryption_key:
|
|
secret_name: authelia-internal
|
|
|
|
local:
|
|
enabled: true
|
|
file: /config/db.sqlite3
|
|
|
|
|
|
identity_validation:
|
|
reset_password:
|
|
secret:
|
|
secret_name: authelia-internal
|
|
path: 'identity_validation.reset_password.jwt.hmac.key'
|
|
|
|
|
|
identity_providers:
|
|
oidc:
|
|
enabled: true
|
|
hmac_secret:
|
|
secret_name: authelia-internal
|
|
path: 'identity_providers.oidc.hmac.key'
|
|
|
|
# lifespans:
|
|
# access_token: '1 hour'
|
|
# authorize_code: '1 minute'
|
|
# id_token: '1 hour'
|
|
# refresh_token: '1 hour and 30 minutes'
|
|
|
|
jwks:
|
|
- algorithm: 'RS256'
|
|
key:
|
|
path: '/secrets/authelia-internal/oidc.jwks.key'
|
|
|
|
cors:
|
|
allowed_origins_from_client_redirect_uris: true
|
|
|
|
clients:
|
|
- client_id: 'grafana'
|
|
client_name: 'Grafana'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.grafana'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
require_pkce: true
|
|
pkce_challenge_method: 'S256'
|
|
redirect_uris:
|
|
- 'https://grafana.kluster.moll.re/login/generic_oauth'
|
|
scopes:
|
|
- 'openid'
|
|
- 'profile'
|
|
- 'groups'
|
|
- 'email'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_post'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'recipes'
|
|
client_name: 'Recipes'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.recipes'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
require_pkce: true
|
|
pkce_challenge_method: 'S256'
|
|
redirect_uris:
|
|
- 'https://recipes.kluster.moll.re/login'
|
|
scopes:
|
|
- 'openid'
|
|
- 'email'
|
|
- 'profile'
|
|
- 'groups'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_basic'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'gitea'
|
|
client_name: 'Gitea'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.gitea'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://git.kluster.moll.re/user/oauth2/authelia/callback'
|
|
scopes:
|
|
- 'openid'
|
|
- 'email'
|
|
- 'profile'
|
|
- 'groups'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_basic'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'argocd'
|
|
client_name: 'Argo CD'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.argocd'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://argocd.kluster.moll.re/auth/callback'
|
|
scopes:
|
|
- 'openid'
|
|
- 'groups'
|
|
- 'email'
|
|
- 'profile'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_post'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'paperless'
|
|
client_name: 'Paperless'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.paperless'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://paperless.kluster.moll.re/accounts/oidc/authelia/login/callback/'
|
|
scopes:
|
|
- 'openid'
|
|
- 'profile'
|
|
- 'email'
|
|
- 'groups'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_basic'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'linkding'
|
|
client_name: 'LinkDing'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.linkding'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://linkding.kluster.moll.re/oidc/callback/'
|
|
scopes:
|
|
- 'openid'
|
|
- 'groups'
|
|
- 'email'
|
|
- 'profile'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_post'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'todos'
|
|
client_name: 'Todos'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.todos'
|
|
public: false
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://todos.kluster.moll.re/auth/openid/authelia'
|
|
scopes:
|
|
- 'openid'
|
|
- 'groups'
|
|
- 'email'
|
|
- 'profile'
|
|
userinfo_signed_response_alg: 'none'
|
|
token_endpoint_auth_method: 'client_secret_basic'
|
|
consent_mode: 'implicit'
|
|
- client_id: 'kitchenowl'
|
|
client_name: 'KitchenOwl'
|
|
client_secret:
|
|
path: '/secrets/authelia-oidc/client.kitchenowl'
|
|
public: false
|
|
token_endpoint_auth_method: 'client_secret_post'
|
|
authorization_policy: 'one_factor'
|
|
redirect_uris:
|
|
- 'https://kitchen.kluster.moll.re/signin/redirect'
|
|
- kitchenowl:///signin/redirect
|
|
# mobile app as well
|
|
scopes:
|
|
- openid
|
|
- email
|
|
- profile
|
|
|
|
|
|
# notifier
|
|
# is set through a secret
|
|
|
|
|
|
persistence:
|
|
enabled: true
|
|
storageClass: 'nfs-client'
|
|
|
|
|
|
secret:
|
|
mountPath: '/secrets'
|
|
additionalSecrets:
|
|
# the oidc client secrets referenced in the oidc config
|
|
authelia-oidc: {}
|
|
authelia-internal: {}
|
|
authelia-ldap: {}
|
|
authelia-smtp: {}
|