mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #313] Two-Factor Auth #279
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#279
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @meichthys on GitHub (Mar 2, 2020).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/313
Two-Factor authorization would be a very welcomed feature in my book.
To be able to log into nginx-proxy-manager via 2FA as well as being able to provide 2FA for access to hosts - this would vastly improve the security of less secure or non-secure applications hiding behind the nginx proxy.
Something like Authelia should provide a good starting point.
@arejaytee commented on GitHub (Mar 8, 2020):
+1 on this or implementing https://github.com/jc21/nginx-proxy-manager/issues/137
@Rami-Pastrami commented on GitHub (Mar 21, 2020):
Noting https://github.com/authelia/authelia for being maintained actively currently, and having more features
@KamistixX commented on GitHub (Apr 15, 2020):
Authelia integration would be a massive feature
@james-d-elliott commented on GitHub (May 1, 2020):
One of the maintainers of Authelia here. We'd be willing to do some form of collab to help with this. Particularly with the access to the hosts section as that is the easiest part. I also think this would actually address a few of your issues all at once (I'll try to compile a list later and the reasons why).
Ideally if we did it I think the ideal place to do it is in the access tab as an alternate provider to the HTTP basic auth. Also it shouldn't be limited to Authelia in my opinion, people should be able to configure all aspects of the ngx_http_auth_request_module.
Authelia docs.
@KittyKatt commented on GitHub (May 7, 2020):
This would actually bring me back to nginx-proxy-manager over some other solution as there's no other solution with as easy of a point and click interface as this, but vanilla nginx supports this with Authelia's guide so I've been sticking with that.
@Rami-Pastrami commented on GitHub (May 20, 2020):
TBH I would even be happy for a guide to add Authelia to NginxProxyManager
@lazee486 commented on GitHub (May 30, 2020):
+1 I opened a request for voucher-proxy or keycloak before I found this one, but any route he goes with I'd be willing to try :) his interface is one of the best I've found for homelab!
@zero77 commented on GitHub (Nov 25, 2020):
Google provide a 2FA module that can be integrated with protocols like SSH and OpenVPN.
https://github.com/google/google-authenticator-libpam
@joe307bad commented on GitHub (Dec 6, 2020):
Keycloak works with
nginx-proxy-manager!@joe307bad commented on GitHub (Dec 6, 2020):
Here is also a good tutorial on getting
nginx-proxy-managersecured with Authelia.@jeremy-chua commented on GitHub (May 22, 2021):
IMHO, integration with most IdP will address this. SAML2 will be a common use case.
I'm using Azure AD for my hosted applications. MFA can be configured in Azure AD. I believe it will be similar for all IdP.
@apainter2 commented on GitHub (May 27, 2021):
I too would love to see NPM support Google Authenticator/2FA.
Especially as I have NPM internet facing on a hosted VPS.
@kennylajara commented on GitHub (Jun 21, 2021):
Is possible to make use of this Authenticator API implementation to easily integrate:
https://github.com/infiniteloopltd/AuthenticatorAPI.com
@meichthys commented on GitHub (Mar 12, 2022):
@kennylajara could you share how you implemented this?
@rickgitdone commented on GitHub (May 19, 2023):
I also found this on git .. allows 2FA for any Web App.. Integration with any of these into one is a goal I am looking for ...
https://github.com/Arno0x/TwoFactorAuth
@LiaraAlis commented on GitHub (Aug 15, 2023):
I think this is a very important feature. From my point of view this feature should be prioritized higher.
@anasnaguib commented on GitHub (Aug 15, 2023):
I think this is a very important feature. hope it can be added soon.
@CrooLyyCheck commented on GitHub (Oct 3, 2023):
Also access list is good place to implement 2fa auth thru simple page instead HTTP auth form
@github-actions[bot] commented on GitHub (May 24, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@timnolte commented on GitHub (May 24, 2024):
If 2FA can't be done then implementing OpenID Connect for SSO authentication would be the next best thing.
@james-d-elliott commented on GitHub (May 24, 2024):
It can technically already be integrated for backend apps already, just not the NPM frontend. I think having both would be a good addition however, and fully support the idea of OpenID Connect 1.0, in a lot of ways I prefer it. Me and the other Authelia devs would welcome a collaboration on this as well.
@woliver99 commented on GitHub (Jul 28, 2024):
+1 I would like to see this implemented
@lazee486 commented on GitHub (Aug 10, 2024):
having to restrict the ip range that can access port 81 works, the number of homelabbers or people who spin this up on vps...a bit better security for the management interface would be good,
@jhedfors commented on GitHub (Feb 1, 2025):
+1 for implementation of basic 2FA would be awesome!
@ISnotes commented on GitHub (Feb 8, 2025):
+1
@theJoshMuller commented on GitHub (Mar 14, 2025):
+1 Another vote for 2FA / TOTP
@WorstPIlot commented on GitHub (Mar 29, 2025):
@VslVictor7 commented on GitHub (Apr 8, 2025):
+1
@hdm-benni commented on GitHub (May 5, 2025):
+1
@Anatr0p commented on GitHub (Jul 28, 2025):
+1
@SocketSomeone commented on GitHub (Jul 29, 2025):
+1
@VslVictor7 commented on GitHub (Jul 29, 2025):
Honestly at this point its just really sad. Nginx is a service that needs good protection. This should be addressed
@james-d-elliott commented on GitHub (Jul 30, 2025):
I think an entirely practical solution that's relatively easy to implement for the developers, and likely sufficient for most users is to allow them to easily disable auth and include an authentication snippet for the admin UI for example via
auth_requestsimilar to the below examples:authelia-location.conf
authelia-authrequest.conf
proxy.conf
example usage (see the nextcloud example)
The advantage is that you can delegate auth rather than having to implement it directly.
@acutbal commented on GitHub (Aug 17, 2025):
Another +1 vote for 2FA / TOTP...
Regards.
@dmbuil commented on GitHub (Sep 3, 2025):
+1
@ArkhLink commented on GitHub (Sep 19, 2025):
+1
@kverstoep commented on GitHub (Oct 18, 2025):
+1
@kpleines commented on GitHub (Feb 9, 2026):
+1
@jc21 commented on GitHub (Feb 11, 2026):
This is done as of v2.13.6