Compare commits

...

5 Commits

Author SHA1 Message Date
LRVT
e442b6fa15
Update docker-compose.yml
add missing network definitions
2023-03-31 21:35:50 +02:00
LRVT
9c8974d13a
Update README.md 2023-03-31 21:26:43 +02:00
LRVT
9f35960b84 add lldap to readme 2023-03-31 21:23:24 +02:00
LRVT
f5a0d99a7c add lldap and fix /issues/14 2023-03-31 21:17:53 +02:00
LRVT
7a21c4c5e7 add missing port mappings and fix /issues/15 2023-03-31 21:11:19 +02:00
4 changed files with 53 additions and 4 deletions

View File

@ -63,6 +63,7 @@ docker compose up
### Identity Providers / Single Sign On (SSO) / 2FA
- [Authelia](examples/authelia) - Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for reverse proxies by allowing, denying, or redirecting requests. Recommended to combine with [Traefik](examples/traefik).
- [lldap](examples/lldap) - lldap is a lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication. It integrates with many backends, from KeyCloak to Authelia to Nextcloud and more.
- ~~[Authentik](https://goauthentik.io/docs/providers/proxy/forward_auth#traefik)~~ - authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
- ~~[Keycloak](https://github.com/keycloak/keycloak)~~ - Keycloak is an open-source Identity and Access Management (IAM) solution for modern applications and services.

View File

@ -6,10 +6,19 @@ services:
hostname: adguard
image: adguard/adguardhome:latest
ports:
- 8080:80/tcp # WEB UI
- 53:53/udp # DNS UDP
- 53:53/tcp # DNS TCP
- 3000:3000/tcp # only required during initial setup
- 8080:80/tcp # web interface after setup
- 53:53/tcp # dns
- 53:53/udp # dns
# - 67:67/udp # dhcp
# - 68:68/tcp # dhcp
# - 68:68/udp # dhcp
# - 784:784/udp # dns-over-quic
# - 853:853/tcp # dns over tls
# - 853:853/udp # dns over tls
# - 5443:5443/tcp # dnscrypt
# - 5443:5443/udp # dnscrypt
restart: unless-stopped
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/work:/opt/adguardhome/work
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/conf:/opt/adguardhome/conf
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/conf:/opt/adguardhome/conf

8
examples/lldap/README.md Normal file
View File

@ -0,0 +1,8 @@
# References
- https://github.com/lldap/lldap
# Notes
An Authelia example configuration can be found:
- https://github.com/lldap/lldap/blob/main/example_configs/authelia_config.yml

View File

@ -0,0 +1,31 @@
version: '3.3'
services:
lldap:
image: nitnelave/lldap:stable
container_name: lldap
hostname: lldap
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/lldap/data:/data # For the config file, server private key and the sqlite database.
environment:
- LLDAP_JWT_SECRET=CHANGEME
- LLDAP_LDAP_USER_PASS=CHANGEME
- LLDAP_LDAP_BASE_DN=dc=example,dc=com
- PUID=1000
- PGID=1000
- TZ=Europe/Berlin
ports:
- 3890:3890 # LDAP
- 17170:17170 # WEB UI
#networks:
# - proxy
#expose:
# - 17170
#labels:
# - traefik.enable=true
# - traefik.http.routers.lldap.rule=Host(`lldap.example.com`)
# - traefik.http.services.lldap.loadbalancer.server.port=17170
#networks:
# proxy:
# external: true