mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #801] SSO with Keycloak #678
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#678
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mprajescu on GitHub (Jan 5, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/801
Is it possible to add Single Sign On capabilities to the Nginx Proxy Manager proxy hosts instead of only relying on manual user authentication setup under access lists?
Meaning that when a user accesses a server setup on a proxy host, will get redirected to keycloak for authentication.
The Nginx server can be set up with Lua as described in the post link I've shared below:
https://developers.redhat.com/blog/2018/10/08/configuring-nginx-keycloak-oauth-oidc/
@GlibTongue commented on GitHub (Jan 10, 2021):
See pr #753 perhaps this might help.
@mprajescu commented on GitHub (Jan 11, 2021):
Thank you @GlibTongue. This might help. How can I implement this without having to run a different docker build? I think it's better to wait until this is merged into the main project. I don't mind the 300ms increase per host because at the moment I only run around 25 hosts, but I could see how this would get problematic once you get more hosts. I think it would be ready for the main project with a disclaimer that there is increased reload time once ODIC is enabled and configured.
@GlibTongue commented on GitHub (Jan 12, 2021):
Yes, it is better to wait for it to be merged with main build as you might have trouble migrating back, though not that hard as you would just have to remove some rows in database.
Regarding the time increases, it solely depends on the person enabling this, if it is worth it or not. I personally am not using it as I have no need for it.
If you read the reply bottom down, Jamie mentioned not merging due to increasing time load, so I am guessing as long as its not solved it will stay as it is.
@chaptergy commented on GitHub (May 12, 2021):
Duplicate of https://github.com/jc21/nginx-proxy-manager/issues/437