mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 01:45:54 +03:00
[GH-ISSUE #1605] Disable user authentication #1206
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#1206
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @senolcolak on GitHub (Nov 20, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1605
Is your feature request related to a problem? Please describe.
I wan't to add NPM on my own applications list, I use goauthentik for my application repository. Unfortunately NPM is using local users and is not able to provide openid auth..
Describe the solution you'd like
I wan't to disable NPM user authentication and management
Describe alternatives you've considered
I think it is possible to use the api to get authentication token, but would be better to fully disable user auth.
Additional context
if there is a workaround that you know, would be great to know
@chaptergy commented on GitHub (Nov 21, 2021):
Neither removing authentication nor using a different authentication method is currently possible. Related: https://github.com/jc21/nginx-proxy-manager/issues/437
@Hadatko commented on GitHub (Aug 25, 2023):
+1
@github-actions[bot] commented on GitHub (Mar 1, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@moutasem1989 commented on GitHub (Apr 7, 2024):
I assume to be used with Authentication service like Authentik; it Port 81 is not exposed and NPM is locked behind a proxy forward authentication?
I assume an OpenID SSO support would be much more useful
@Rihan9 commented on GitHub (Jun 27, 2024):
Hi,
I'm going to comment this just to raise the interest in it. Please, let us disable the authentication or use an header with the username at least. It should be simpler than implement OAuth
@moutasem1989 commented on GitHub (Oct 19, 2024):
I added this for services with basic HTTP authentication to disable it. I then integrated it into Authentik reverse proxy authentication and it works as expected:
Is it posible to send the correct headers with the correct values to bypass authentication on NPM admin interface?
@moutasem1989 commented on GitHub (Oct 21, 2024):
This worked with Cockpit. Here I used Authorization Headers to bypass the Login screen and used Authentik + NginX for reverse Proxy Authentication.
I am trying the same Implementation with NPM, but it is not exactly working.
@rachelf42 commented on GitHub (Jan 21, 2025):
+1
@AndreasFeldt commented on GitHub (Apr 8, 2025):
+1
@berkobob commented on GitHub (Apr 29, 2025):
+1
@French-Noodles commented on GitHub (May 13, 2025):
+1
@Jampamane commented on GitHub (Jul 2, 2025):
+1
@xXThOtWhEeLsXx commented on GitHub (Aug 12, 2025):
+1
@JimmyKmi commented on GitHub (Sep 25, 2025):
+1
@obmotum commented on GitHub (Nov 1, 2025):
+1
@GyimPet commented on GitHub (Nov 2, 2025):
+1