Authelia + LLDAP + Traefik ForwardAuth Setup guide
This quick guide should take you through the steps necessary to setup Authelia as your forwardAuth for Traefik. We’ll be using LLDAP as the backend for Authelia since it’s lightweight and simple enough for most users.
Setup LLDAP
-
Follow the easy steps included in the Installation Notes for LLDAP. Change
dc=example,dc=comto your domain, e.g.dc=MYDOMAIN,dc=netand then change your password. -
Once in
LLDAP, create a user inside thelldap_password_managergroup and change your defaultadminpassword. Thatlldap_password_manageruser will be used to bind toAuthelia. Here I’ve created a user calledmanager, but you can use anything -
Create an
admingroup and addUserto it. We will allow users of this group to access the site with Authelia later in the guide. Don’t confuse with the pre-configured grouplldap_admin, which should not be used to addUser
Setup Authelia
- The setup for Authelia is very specific and the logs won’t tell you where you’ve messed up, but there’s precise steps used to integrate
LLDAPintoAuthelia.
# All configuration options should be put under this. Supports all upstream optionsauthelia: session: # Be sure to change this to your domain. You can also define multiple domains cookies: - domain: example.com authelia_url: https://auth.example.com authentication_backend: # lldap setup # https://github.com/lldap/lldap/blob/main/example_configs/authelia_config.yml ldap: implementation: lldap address: ldap://lldap-ldap.lldap.svc.cluster.local:3890 base_dn: dc=example,dc=com user: uid=manager,ou=people,dc=example,dc=com # user with lldap_password_manager group # above user password in plain text password: somepassword notifier: # smtp setup (example is gmail) smtp: address: submission://smtp.gmail.com:587 # gmail email address (username) username: email@gmail.com # use a google app password if using gmail password: somepassword # email address to show as sender sender: no-reply@example.com tls: server_name: smtp.gmail.com minimum_version: TLS1.2 skip_verify: false access_control: default_policy: 'deny' rules: # basic rule for one factor (username/password) login for users in the admin group - domain: - "*.example.com" - example.com policy: one_factor subject: "group:admin"Please see Authelia Rules for more advanced rules.
Setup Authelia Ingress
- Make sure you’re using the same domain as the
Default Redirection URLabove, so for me that’sauth.mydomain.com
ingress: main: enabled: true integrations: certManager: enabled: true certificateIssuer: domain-0-le-prod hosts: - host: auth.example.comTraefik ForwardAuth Setup
- This part is straight forward as long as you have a working
Traefikinstall.
middlewares: forwardAuth: - name: auth address: http://authelia.authelia.svc.cluster.local:9091/api/verify?rd=https://auth.example.com/ authResponseHeaders: - Remote-User - Remote-Group - Remote-Name - Remote-Email trustForwardHeader: trueAdding the forwardauth to your Apps
The last step is adding the forwardauth along with the standard ingress settings for your app, for more info on setting ingress see the ClusterIssuer Guide.
- In this example we use the same name as above, or
auth.
ingress: main: enabled: true integrations: traefik: enabled: true middlewares: - name: auth namespace: traefik certManager: enabled: true certificateIssuer: domain-0-le-prod hosts: - host: radarr.example.comNginx-Ingress Annotations
- These annotations need to be added to each chart you want to use auth with:
annotations: nginx.ingress.kubernetes.io/auth-method: 'GET' nginx.ingress.kubernetes.io/auth-url: 'http://authelia.authelia.svc.cluster.local:9091/api/verify' nginx.ingress.kubernetes.io/auth-signin: 'https://auth.${DOMAIN_0}?rm=$request_method' nginx.ingress.kubernetes.io/auth-response-headers: 'Remote-User,Remote-Name,Remote-Groups,Remote-Email'References
The origin material for this guide is available on the LLDAP Github. While further information on Authelia can be found on their Github and website.
Support
If you have any issues with following this guide, we can be reached using Discord for real-time feedback and support.