I wanted to figure out if there was an easier way to handle authentication and authorization. I have a bunch of services running via docker with their own authentication / authorization set up, and I wanted to simplify that.
Authelia
Authelia seemed to be a popular choice, so I decided to try it out. The examples in the documentation seemed to use Traefik which worked out pretty well since I migrated to Traefik from nginx.
Configuration
I configured Authelia based on their lite
bundle.
server:
address: 'tcp://:9091'
log:
level: 'debug'
totp:
issuer: 'authelia.com'
authentication_backend:
file:
path: '/config/users_database.yml'
access_control:
default_policy: 'deny'
rules:
- domain: 'grafana.example.com'
policy: 'one_factor'
- domain: 'public.example.com'
policy: 'bypass'
session:
cookies:
- name: 'authelia_session'
domain: 'example.com' # Should match whatever your root protected domain is
authelia_url: 'https://authelia.example.com'
expiration: '1 hour'
inactivity: '5 minutes'
redis:
host: 'authelia_redis'
port: 6380
regulation:
max_retries: 3
find_time: '2 minutes'
ban_time: '5 minutes'
storage:
local:
path: '/config/db.sqlite3'
notifier:
filesystem:
filename: '/config/notification.txt'
Authelia authenticates the endpoint grafana.example.com
and allows public
access toe public.example.com
. We also need to host the authelia
service and
I added it to my main docker compose file. I put the configuration file at
./authelia/configuration.yml
.
The next step is to add Authelia and it’s dependencies to your main docker compose file
authelia_redis:
image: 'redis:alpine'
container_name: 'authelia_redis'
command: "--port 6380"
expose:
- 6380
volumes:
- './redis:/data'
restart: 'unless-stopped'
environment:
TZ: 'America/Chicago'
authelia:
image: 'authelia/authelia'
container_name: authelia
volumes:
- './authelia:/config'
user: ${PUID}:${PGID}
expose:
- 9091
labels:
traefik.enable: 'true'
traefik.http.routers.authelia.rule: 'Host(`authelia.example.com`)'
traefik.http.routers.authelia.entrypoints: websecure
traefik.http.routers.authelia.tls.certresolver: letsencrypt
traefik.http.middlewares.authelia.forwardauth.address: 'http://authelia:9091/api/authz/forward-auth'
traefik.http.middlewares.authelia.forwardauth.trustForwardHeader: 'true'
traefik.http.middlewares.authelia.forwardauth.authResponseHeaders: 'Remote-User,Remote-Groups,Remote-Name,Remote-Email'
restart: 'unless-stopped'
environment:
TZ: 'America/Chicago'
AUTHELIA_IDENTITY_VALIDATION_RESET_PASSWORD_JWT_SECRET_FILE: '/config/secrets/JWT_SECRET'
AUTHELIA_SESSION_SECRET_FILE: '/config/secrets/SESSION_SECRET'
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: '/config/secrets/STORAGE_ENCRYPTION_KEY'
This above config is for the main Authelia service. I created the *_SECRET keys
under ./authelia/secrets/
folder. As you can notice, the labels create a new
Traefik middleware called authelia
.
To enable authentication for https://grafana.example.com
, I just had to add
the authelia@docker
middleware to the main router
labels:
traefik.enable: true
traefik.http.routers.grafana.rule: Host(`grafana.${DOMAIN}`)
traefik.http.routers.grafana.entrypoints: websecure
traefik.http.routers.grafana.tls.certresolver: letsencrypt
traefik.http.routers.grafana.middlewares: authelia@docker
Once you’ve protected your endpoints with Authelia, you can disable the in built authentication mechanism of your services.
TL;DR (auto-generated with llama3.2:1b)
The author has set up an authentication system using Authelia and Traefik (a
reverse proxy server) within a Docker container. They have configured Authelia
to authenticate the endpoints of their Grafana instance, which they also run in
a separate container. The configuration file is stored in
./authelia/configuration.yml
.
To add Authelia to their main Docker Compose file, they added two new
containers: authelia_redis
and authelia
, which are used to store and expose
the Redis database respectively. They then created a middleware called
authelia@docker
for Traefik to enable authentication for specific routes.
The author also notes that disabling built-in authentication mechanisms is possible by using the Authelia middleware with Traefik’s router, but this comes at the cost of having to manage separate configurations and secrets.