Added Tags to All Docs
This commit is contained in:
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Active Directory
|
||||
- Certificate Services
|
||||
- Authentication
|
||||
---
|
||||
|
||||
## Purpose
|
||||
This document outlines the Microsoft-recommended best practices for deploying a secure, internal-use-only, two-tier Public Key Infrastructure (PKI) using Windows Server 2022 or newer. The PKI supports securing S/MIME email, 802.1X Wi-Fi with NPS, and LDAP over SSL (LDAPS).
|
||||
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Active Directory
|
||||
- Group Policy
|
||||
- Authentication
|
||||
---
|
||||
|
||||
**Purpose**:
|
||||
To deploy a shortcut to the desktop pointing to a network share's root path. (e.g. `\\storage.bunny-lab.io`). There is a quirk with how Windows handles network shares and shortcuts and doesn't like when you point the shortcut to a root UNC path.
|
||||
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Active Directory
|
||||
- LDAP
|
||||
- Authentication
|
||||
---
|
||||
|
||||
**Purpose**: LDAP settings are used in various services from privacyIDEA to Nextcloud. This will outline the basic parameters in my homelab that are necessary to make it function.
|
||||
|
||||
| **Field** | **Value** | **Description** |
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
---
|
||||
tags:
|
||||
- Active Directory
|
||||
- Authentication
|
||||
---
|
||||
|
||||
## Purpose
|
||||
If you have a device that lost trust in the domain for some reason, and won't let you login using domain credentials, run the following command as a local administrator on the device to repair trust.
|
||||
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Authelia
|
||||
- Authentication
|
||||
- Docker
|
||||
---
|
||||
|
||||
**Purpose**: Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.
|
||||
|
||||
```yaml title="docker-compose.yml"
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Authentik
|
||||
- Authentication
|
||||
- Docker
|
||||
---
|
||||
|
||||
!!! bug
|
||||
The docker-compose version of the deployment appears bugged and has known issues, deployment via Kubernetes is required to stability and support.
|
||||
|
||||
|
||||
@@ -1,3 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Keycloak
|
||||
- Authentication
|
||||
- Docker
|
||||
---
|
||||
|
||||
**Purpose**: Keycloak is an open source identity and access management system for modern applications and services.
|
||||
|
||||
- [Original Reference Compose File](https://github.com/JamesTurland/JimsGarage/blob/main/Keycloak/docker-compose.yaml)
|
||||
|
||||
@@ -1,2 +1,10 @@
|
||||
---
|
||||
tags:
|
||||
- Keycloak
|
||||
- OAuth2
|
||||
- Authentication
|
||||
- Docker
|
||||
---
|
||||
|
||||
You can deploy Keycloak via a [docker-compose stack](../deployment.md) found within the "Containerization" section of the documentation.
|
||||
|
||||
|
||||
@@ -1,3 +1,11 @@
|
||||
---
|
||||
tags:
|
||||
- Gitea
|
||||
- Keycloak
|
||||
- OAuth2
|
||||
- Authentication
|
||||
---
|
||||
|
||||
### OAuth2 Configuration
|
||||
These are variables referenced by the associated service to connect its authentication system to [Keycloak](../deployment.md).
|
||||
|
||||
|
||||
@@ -1,3 +1,11 @@
|
||||
---
|
||||
tags:
|
||||
- Portainer
|
||||
- Keycloak
|
||||
- OAuth2
|
||||
- Authentication
|
||||
---
|
||||
|
||||
### OAuth2 Configuration
|
||||
These are variables referenced by the associated service to connect its authentication system to [Keycloak](../deployment.md).
|
||||
|
||||
|
||||
@@ -1,3 +1,9 @@
|
||||
---
|
||||
tags:
|
||||
- PrivacyIDEA
|
||||
- Authentication
|
||||
---
|
||||
|
||||
**Purpose**: privacyIDEA is a modular authentication system. Using privacyIDEA you can enhance your existing applications like local login, VPN, remote access, SSH connections, access to web sites or web portals with a second factor during authentication.
|
||||
|
||||
!!! info "Assumptions"
|
||||
|
||||
Reference in New Issue
Block a user