website/docs: use new headers in docs

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
Jens Langhammer 2021-11-12 22:48:01 +01:00
parent cacb919c6f
commit 77e42d60cb
2 changed files with 28 additions and 21 deletions

View File

@ -77,10 +77,17 @@ server {
# error_page 401 =302 https://authentik.company/akprox/start?rd=$scheme://$http_host$request_uri; # error_page 401 =302 https://authentik.company/akprox/start?rd=$scheme://$http_host$request_uri;
# translate headers from the outposts back to the actual upstream # translate headers from the outposts back to the actual upstream
auth_request_set $username $upstream_http_x_auth_username; auth_request_set $authentik_username $upstream_http_x_authentik_username;
auth_request_set $email $upstream_http_X_Forwarded_Email; auth_request_set $authentik_groups $upstream_http_x_authentik_groups;
proxy_set_header X-Auth-Username $username; auth_request_set $authentik_email $upstream_http_x_authentik_email;
proxy_set_header X-Forwarded-Email $email; auth_request_set $authentik_name $upstream_http_x_authentik_name;
auth_request_set $authentik_uid $upstream_http_x_authentik_uid;
proxy_set_header X-authentik-username $authentik_username;
proxy_set_header X-authentik-groups $authentik_groups;
proxy_set_header X-authentik-email $authentik_email;
proxy_set_header X-authentik-name $authentik_name;
proxy_set_header X-authentik-uid $authentik_uid;
} }
# all requests to /akprox must be accessible without authentication # all requests to /akprox must be accessible without authentication
@ -132,7 +139,7 @@ metadata:
annotations: annotations:
nginx.ingress.kubernetes.io/auth-url: https://*external host that you configured in authentik*/akprox/auth?nginx nginx.ingress.kubernetes.io/auth-url: https://*external host that you configured in authentik*/akprox/auth?nginx
nginx.ingress.kubernetes.io/auth-signin: https://*external host that you configured in authentik*/akprox/start?rd=$escaped_request_uri nginx.ingress.kubernetes.io/auth-signin: https://*external host that you configured in authentik*/akprox/start?rd=$escaped_request_uri
nginx.ingress.kubernetes.io/auth-response-headers: X-Auth-Username,X-Forwarded-Email,X-Forwarded-Preferred-Username,X-Forwarded-User,X-Auth-Groups nginx.ingress.kubernetes.io/auth-response-headers: Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
nginx.ingress.kubernetes.io/auth-snippet: | nginx.ingress.kubernetes.io/auth-snippet: |
proxy_set_header X-Forwarded-Host $http_host; proxy_set_header X-Forwarded-Host $http_host;
``` ```
@ -159,11 +166,11 @@ http:
trustForwardHeader: true trustForwardHeader: true
authResponseHeaders: authResponseHeaders:
- Set-Cookie - Set-Cookie
- X-Auth-Username - X-authentik-username
- X-Auth-Groups - X-authentik-groups
- X-Forwarded-Email - X-authentik-email
- X-Forwarded-Preferred-Username - X-authentik-name
- X-Forwarded-User - X-authentik-uid
routers: routers:
default-router: default-router:
rule: "Host(`*external host that you configured in authentik*`)" rule: "Host(`*external host that you configured in authentik*`)"
@ -230,7 +237,7 @@ services:
traefik.http.routers.authentik.tls: true traefik.http.routers.authentik.tls: true
traefik.http.middlewares.authentik.forwardauth.address: http://authentik_proxy:9000/akprox/auth/traefik traefik.http.middlewares.authentik.forwardauth.address: http://authentik_proxy:9000/akprox/auth/traefik
traefik.http.middlewares.authentik.forwardauth.trustForwardHeader: true traefik.http.middlewares.authentik.forwardauth.trustForwardHeader: true
traefik.http.middlewares.authentik.forwardauth.authResponseHeaders: Set-Cookie,X-Auth-Username,X-Auth-Groups,X-Forwarded-Email,X-Forwarded-Preferred-Username,X-Forwarded-User traefik.http.middlewares.authentik.forwardauth.authResponseHeaders: Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
restart: unless-stopped restart: unless-stopped
whoami: whoami:
@ -259,11 +266,11 @@ spec:
trustForwardHeader: true trustForwardHeader: true
authResponseHeaders: authResponseHeaders:
- Set-Cookie - Set-Cookie
- X-Auth-Username - X-authentik-username
- X-Auth-Groups - X-authentik-groups
- X-Forwarded-Email - X-authentik-email
- X-Forwarded-Preferred-Username - X-authentik-name
- X-Forwarded-User - X-authentik-uid
``` ```
Add the following settings to your IngressRoute Add the following settings to your IngressRoute

View File

@ -5,11 +5,11 @@ title: Overview
The proxy outpost sets the following headers: The proxy outpost sets the following headers:
``` ```
X-Auth-Username: akadmin # The username of the currently logged in user X-authentik-username: akadmin # The username of the currently logged in user
X-Auth-Groups: foo|bar|baz # The groups the user is member of, separated by a pipe X-authentik-groups: foo|bar|baz # The groups the user is member of, separated by a pipe
X-Forwarded-Email: root@localhost # The email address of the currently logged in user X-authentik-email: root@localhost # The email address of the currently logged in user
X-Forwarded-Preferred-Username: akadmin # The username of the currently logged in user X-authentik-name: authentik Default Admin # Full name of the current user
X-Forwarded-User: 900347b8a29876b45ca6f75722635ecfedf0e931c6022e3a29a8aa13fb5516fb # The hashed identifier of the currently logged in user. X-authentik-uid: 900347b8a29876b45ca6f75722635ecfedf0e931c6022e3a29a8aa13fb5516fb # The hashed identifier of the currently logged in user.
``` ```
Additionally, you can set `additionalHeaders` on groups or users to set additional headers. Additionally, you can set `additionalHeaders` on groups or users to set additional headers.