this post was submitted on 31 Oct 2023
1 points (100.0% liked)

Self-Hosted Main

504 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS
 

hello all,

Apologies if not allowed here .. been struggling to get some kind of 2FA on a self hosted server. i would like nginx proxy manager behind 2FA have tried many many docker compose files from google searches none seem to work

does anyone happen to have this kind of config ?

background: ubuntu vm is running on promox and network traffic can reach the vm from outside.

cheers

top 7 comments
sorted by: hot top controversial new old
[–] xXfreshXx@alien.top 1 points 1 year ago

Have a look on swag. It has reconfigured let's encrypt, fail2ban and Authelia config.

[–] thekrautboy@alien.top 1 points 1 year ago

I shared my very basic and easy setup with Caddy + Authelia some days ago.

If you are deadset on using NPM tho, i find that is harder to share a exact config because its UI based.

In general its a good idea to provide details of how exactly something has failed for you, instead of saying "it has not worked".

Chances are high that someone spends their time and shares and explains their NPM+Authelia config to you, and you run into the exact same problems again and "its not working".

[–] ricecake@sh.itjust.works 1 points 1 year ago

Something like vouch might be what you're looking for.

[–] arcadianarcadian@alien.top 1 points 1 year ago

NPM + Authelia.

[–] poeticmichael@alien.top 1 points 1 year ago

Do followingg: (A better formatted VERSION on Pastebin: https://pastebin.com/hHuDnPn7)

sudo mkdir -p /opt/docker/npm && sudo chown -R $USER:$USER /opt/docker/npm

  • That would be for your Nguni Proxy Manager

  • Then:

cd /opt/docker/npm

  • Then:

nano docker-compose.yml Paste the following:

version: '3.8' services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: - '80:80' - '443:443' - '81:81' environment: DB_MYSQL_HOST: "db" DB_MYSQL_PORT: 3306 DB_MYSQL_USER: "npm" DB_MYSQL_PASSWORD: “CHANGEME” DB_MYSQL_NAME: "npm" volumes: - ./data:/data - ./letsencrypt:/etc/letsencrypt depends_on: - db networks: - npm-proxy

db: image: 'jc21/mariadb-aria:latest' restart: unless-stopped environment: MYSQL_ROOT_PASSWORD: ‘SAME AS CHANGEME’ MYSQL_DATABASE: 'npm' MYSQL_USER: 'npm' MYSQL_PASSWORD: 'SAME AS CHANGEME' volumes: - ./mysql:/var/lib/mysql networks: - npm-proxy # Add the network here

networks: npm-proxy: # Define the network external: true

  • THEN: docker-compose up -d

  • GO THROUGH NPM setup by GOING to http://YourIP:81

  • NOW FOR AUTHENTIK

sudo mkdir -p /opt/docker/npm && sudo chown -R $USER:$USER /opt/docker/npm

  • Then

cd /opt/docker/npm

  • THEN

nano docker-compose.yml

  • PASTE THE FOLLOWING AND SAVE

version: "3.4"

services: postgresql: image: docker.io/library/postgres:12-alpine restart: unless-stopped healthcheck: test: ["CMD-SHELL", "pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}"] start_period: 20s interval: 30s retries: 5 timeout: 5s volumes: - database:/var/lib/postgresql/data environment: POSTGRES_PASSWORD: ${PG_PASS:?database password required} POSTGRES_USER: ${PG_USER:-authentik} POSTGRES_DB: ${PG_DB:-authentik} env_file: - .env networks: - npm-proxy redis: image: docker.io/library/redis:alpine command: --save 60 1 --loglevel warning restart: unless-stopped healthcheck: test: ["CMD-SHELL", "redis-cli ping | grep PONG"] start_period: 20s interval: 30s retries: 5 timeout: 3s volumes: - redis:/data networks: - npm-proxy server: image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2023.8.3} container_name: authentik restart: unless-stopped command: server environment: AUTHENTIK_REDIS__HOST: redis AUTHENTIK_POSTGRESQL__HOST: postgresql AUTHENTIK_POSTGRESQL__USER: ${PG_USER:-authentik} AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik} AUTHENTIK_POSTGRESQL__PASSWORD: ${PG_PASS} volumes: - ./media:/media - ./custom-templates:/templates env_file: - .env depends_on: - postgresql - redis networks: - npm-proxy worker: image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2023.8.3} restart: unless-stopped command: worker environment: AUTHENTIK_REDIS__HOST: redis AUTHENTIK_POSTGRESQL__HOST: postgresql AUTHENTIK_POSTGRESQL__USER: ${PG_USER:-authentik} AUTHENTIK_POSTGRESQL__NAME: ${PG_DB:-authentik} AUTHENTIK_POSTGRESQL__PASSWORD: ${PG_PASS} user: root volumes: - /var/run/docker.sock:/var/run/docker.sock - ./media:/media - ./certs:/certs - ./custom-templates:/templates env_file: - .env depends_on: - postgresql - redis networks: - npm-proxy

volumes: database: driver: local redis: driver: local

networks: proxy: npm-proxy: external: true

  • THEN RUN

sudo apt-get install -y pwgen

  • Next, run the following commands to generate a password and secret key and write them to your .env file:

echo "PG_PASS=$(pwgen -s 40 1)" >> .env echo "AUTHENTIK_SECRET_KEY=$(pwgen -s 50 1)" >> .env ———————

  • An .env file would have been created which you can access by typing:

nano .env (you can configure other parameters here)

Now go to NPM and forward your domain to: (authentik as IP and 9443 in port) https://authentik:9443 (remember to select https and NOT http on NPM)

  • To start the initial setup, navigate to https:///if/flow/initial-setup/
[–] ZeusRaman@alien.top 1 points 1 year ago (1 children)

Amazing !!!with help from /u/poeticmichael i have a working authentik+npm server !!! yaaay i am so excited ..now to learn authentik

cheers all

[–] poeticmichael@alien.top 1 points 1 year ago

Great to hear you have it up and running.

  • Next step I would suggest is to protect the /if/admin.

  • If you're using Cloudflare, you can setup the firewall to allow only your IP or select IP to have access to the admin portal. Otherwise, you can restrict it directly on NPM by going to the advanced tab and enter the following:

  • location /if/admin { return 404; }

  • You can always temporary remove the entry if you needed admin access to make changes or configuration.

Cheers mate!