[GH-ISSUE #1605] Disable user authentication #1206

Open
opened 2026-02-26 06:36:12 +03:00 by kerem · 16 comments
Owner

Originally created by @senolcolak on GitHub (Nov 20, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1605

Is your feature request related to a problem? Please describe.
I wan't to add NPM on my own applications list, I use goauthentik for my application repository. Unfortunately NPM is using local users and is not able to provide openid auth..

Describe the solution you'd like
I wan't to disable NPM user authentication and management

Describe alternatives you've considered
I think it is possible to use the api to get authentication token, but would be better to fully disable user auth.

Additional context
if there is a workaround that you know, would be great to know

Originally created by @senolcolak on GitHub (Nov 20, 2021). Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1605 **Is your feature request related to a problem? Please describe.** I wan't to add NPM on my own applications list, I use goauthentik for my application repository. Unfortunately NPM is using local users and is not able to provide openid auth.. **Describe the solution you'd like** I wan't to disable NPM user authentication and management **Describe alternatives you've considered** I think it is possible to use the api to get authentication token, but would be better to fully disable user auth. **Additional context** if there is a workaround that you know, would be great to know
Author
Owner

@chaptergy commented on GitHub (Nov 21, 2021):

Neither removing authentication nor using a different authentication method is currently possible. Related: https://github.com/jc21/nginx-proxy-manager/issues/437

<!-- gh-comment-id:974898919 --> @chaptergy commented on GitHub (Nov 21, 2021): Neither removing authentication nor using a different authentication method is currently possible. Related: https://github.com/jc21/nginx-proxy-manager/issues/437
Author
Owner

@Hadatko commented on GitHub (Aug 25, 2023):

+1

<!-- gh-comment-id:1692825635 --> @Hadatko commented on GitHub (Aug 25, 2023): +1
Author
Owner

@github-actions[bot] commented on GitHub (Mar 1, 2024):

Issue is now considered stale. If you want to keep it open, please comment 👍

<!-- gh-comment-id:1972305788 --> @github-actions[bot] commented on GitHub (Mar 1, 2024): Issue is now considered stale. If you want to keep it open, please comment :+1:
Author
Owner

@moutasem1989 commented on GitHub (Apr 7, 2024):

Issue is now considered stale. If you want to keep it open, please comment 👍

I assume to be used with Authentication service like Authentik; it Port 81 is not exposed and NPM is locked behind a proxy forward authentication?

I assume an OpenID SSO support would be much more useful

<!-- gh-comment-id:2041590224 --> @moutasem1989 commented on GitHub (Apr 7, 2024): > Issue is now considered stale. If you want to keep it open, please comment 👍 I assume to be used with Authentication service like Authentik; it Port 81 is not exposed and NPM is locked behind a proxy forward authentication? I assume an OpenID SSO support would be much more useful
Author
Owner

@Rihan9 commented on GitHub (Jun 27, 2024):

Hi,
I'm going to comment this just to raise the interest in it. Please, let us disable the authentication or use an header with the username at least. It should be simpler than implement OAuth

<!-- gh-comment-id:2194079840 --> @Rihan9 commented on GitHub (Jun 27, 2024): Hi, I'm going to comment this just to raise the interest in it. Please, let us disable the authentication or use an header with the username at least. It should be simpler than implement OAuth
Author
Owner

@moutasem1989 commented on GitHub (Oct 19, 2024):

I added this for services with basic HTTP authentication to disable it. I then integrated it into Authentik reverse proxy authentication and it works as expected:

location / {
    proxy_pass http://app_with_basic_http_authentication:port;
    proxy_set_header Authorization "Basic wersdfxcvetc";     #base64 of username:password
    proxy_pass_header Authorization;
}

Is it posible to send the correct headers with the correct values to bypass authentication on NPM admin interface?

<!-- gh-comment-id:2424120379 --> @moutasem1989 commented on GitHub (Oct 19, 2024): I added this for services with basic HTTP authentication to disable it. I then integrated it into Authentik reverse proxy authentication and it works as expected: ``` location / { proxy_pass http://app_with_basic_http_authentication:port; proxy_set_header Authorization "Basic wersdfxcvetc"; #base64 of username:password proxy_pass_header Authorization; } ``` Is it posible to send the correct headers with the correct values to bypass authentication on NPM admin interface?
Author
Owner

@moutasem1989 commented on GitHub (Oct 21, 2024):

This worked with Cockpit. Here I used Authorization Headers to bypass the Login screen and used Authentik + NginX for reverse Proxy Authentication.
I am trying the same Implementation with NPM, but it is not exactly working.

<!-- gh-comment-id:2425874001 --> @moutasem1989 commented on GitHub (Oct 21, 2024): This worked with Cockpit. [Here](https://github.com/NginxProxyManager/nginx-proxy-manager/discussions/4092) I used Authorization Headers to bypass the Login screen and used Authentik + NginX for reverse Proxy Authentication. I am trying the same Implementation with NPM, but it is not exactly working.
Author
Owner

@rachelf42 commented on GitHub (Jan 21, 2025):

+1

<!-- gh-comment-id:2603949666 --> @rachelf42 commented on GitHub (Jan 21, 2025): +1
Author
Owner

@AndreasFeldt commented on GitHub (Apr 8, 2025):

+1

<!-- gh-comment-id:2787163043 --> @AndreasFeldt commented on GitHub (Apr 8, 2025): +1
Author
Owner

@berkobob commented on GitHub (Apr 29, 2025):

+1

<!-- gh-comment-id:2838923234 --> @berkobob commented on GitHub (Apr 29, 2025): +1
Author
Owner

@French-Noodles commented on GitHub (May 13, 2025):

+1

<!-- gh-comment-id:2876529168 --> @French-Noodles commented on GitHub (May 13, 2025): +1
Author
Owner

@Jampamane commented on GitHub (Jul 2, 2025):

+1

<!-- gh-comment-id:3028596478 --> @Jampamane commented on GitHub (Jul 2, 2025): +1
Author
Owner

@xXThOtWhEeLsXx commented on GitHub (Aug 12, 2025):

+1

<!-- gh-comment-id:3180683652 --> @xXThOtWhEeLsXx commented on GitHub (Aug 12, 2025): +1
Author
Owner

@JimmyKmi commented on GitHub (Sep 25, 2025):

+1

<!-- gh-comment-id:3335202571 --> @JimmyKmi commented on GitHub (Sep 25, 2025): +1
Author
Owner

@obmotum commented on GitHub (Nov 1, 2025):

+1

<!-- gh-comment-id:3476664147 --> @obmotum commented on GitHub (Nov 1, 2025): +1
Author
Owner

@GyimPet commented on GitHub (Nov 2, 2025):

+1

<!-- gh-comment-id:3478491498 --> @GyimPet commented on GitHub (Nov 2, 2025): +1
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/nginx-proxy-manager-NginxProxyManager#1206
No description provided.