mirror of
https://github.com/Haxxnet/Compose-Examples
synced 2025-02-24 08:58:42 +00:00
Compare commits
No commits in common. "e442b6fa150cbec6d03d31bed3c66578c7618479" and "5ac02a8918c7c618d50f3c210190a9d66da27072" have entirely different histories.
e442b6fa15
...
5ac02a8918
@ -63,7 +63,6 @@ docker compose up
|
|||||||
|
|
||||||
### Identity Providers / Single Sign On (SSO) / 2FA
|
### Identity Providers / Single Sign On (SSO) / 2FA
|
||||||
- [Authelia](examples/authelia) - Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for reverse proxies by allowing, denying, or redirecting requests. Recommended to combine with [Traefik](examples/traefik).
|
- [Authelia](examples/authelia) - Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for reverse proxies by allowing, denying, or redirecting requests. Recommended to combine with [Traefik](examples/traefik).
|
||||||
- [lldap](examples/lldap) - lldap is a lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication. It integrates with many backends, from KeyCloak to Authelia to Nextcloud and more.
|
|
||||||
- ~~[Authentik](https://goauthentik.io/docs/providers/proxy/forward_auth#traefik)~~ - authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
|
- ~~[Authentik](https://goauthentik.io/docs/providers/proxy/forward_auth#traefik)~~ - authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
|
||||||
- ~~[Keycloak](https://github.com/keycloak/keycloak)~~ - Keycloak is an open-source Identity and Access Management (IAM) solution for modern applications and services.
|
- ~~[Keycloak](https://github.com/keycloak/keycloak)~~ - Keycloak is an open-source Identity and Access Management (IAM) solution for modern applications and services.
|
||||||
|
|
||||||
|
@ -6,19 +6,10 @@ services:
|
|||||||
hostname: adguard
|
hostname: adguard
|
||||||
image: adguard/adguardhome:latest
|
image: adguard/adguardhome:latest
|
||||||
ports:
|
ports:
|
||||||
- 3000:3000/tcp # only required during initial setup
|
- 8080:80/tcp # WEB UI
|
||||||
- 8080:80/tcp # web interface after setup
|
- 53:53/udp # DNS UDP
|
||||||
- 53:53/tcp # dns
|
- 53:53/tcp # DNS TCP
|
||||||
- 53:53/udp # dns
|
|
||||||
# - 67:67/udp # dhcp
|
|
||||||
# - 68:68/tcp # dhcp
|
|
||||||
# - 68:68/udp # dhcp
|
|
||||||
# - 784:784/udp # dns-over-quic
|
|
||||||
# - 853:853/tcp # dns over tls
|
|
||||||
# - 853:853/udp # dns over tls
|
|
||||||
# - 5443:5443/tcp # dnscrypt
|
|
||||||
# - 5443:5443/udp # dnscrypt
|
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
volumes:
|
volumes:
|
||||||
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/work:/opt/adguardhome/work
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/work:/opt/adguardhome/work
|
||||||
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/conf:/opt/adguardhome/conf
|
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/adguard-home/conf:/opt/adguardhome/conf
|
||||||
|
@ -1,8 +0,0 @@
|
|||||||
# References
|
|
||||||
|
|
||||||
- https://github.com/lldap/lldap
|
|
||||||
|
|
||||||
# Notes
|
|
||||||
|
|
||||||
An Authelia example configuration can be found:
|
|
||||||
- https://github.com/lldap/lldap/blob/main/example_configs/authelia_config.yml
|
|
@ -1,31 +0,0 @@
|
|||||||
version: '3.3'
|
|
||||||
|
|
||||||
services:
|
|
||||||
lldap:
|
|
||||||
image: nitnelave/lldap:stable
|
|
||||||
container_name: lldap
|
|
||||||
hostname: lldap
|
|
||||||
volumes:
|
|
||||||
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/lldap/data:/data # For the config file, server private key and the sqlite database.
|
|
||||||
environment:
|
|
||||||
- LLDAP_JWT_SECRET=CHANGEME
|
|
||||||
- LLDAP_LDAP_USER_PASS=CHANGEME
|
|
||||||
- LLDAP_LDAP_BASE_DN=dc=example,dc=com
|
|
||||||
- PUID=1000
|
|
||||||
- PGID=1000
|
|
||||||
- TZ=Europe/Berlin
|
|
||||||
ports:
|
|
||||||
- 3890:3890 # LDAP
|
|
||||||
- 17170:17170 # WEB UI
|
|
||||||
#networks:
|
|
||||||
# - proxy
|
|
||||||
#expose:
|
|
||||||
# - 17170
|
|
||||||
#labels:
|
|
||||||
# - traefik.enable=true
|
|
||||||
# - traefik.http.routers.lldap.rule=Host(`lldap.example.com`)
|
|
||||||
# - traefik.http.services.lldap.loadbalancer.server.port=17170
|
|
||||||
|
|
||||||
#networks:
|
|
||||||
# proxy:
|
|
||||||
# external: true
|
|
Loading…
x
Reference in New Issue
Block a user