All Projects → jamescurtin → traefik-proxy

jamescurtin / traefik-proxy

Licence: other
One-step (secure) configuration for Traefik edge router.

Programming Languages

HTML
75241 projects
shell
77523 projects
go
31211 projects - #10 most used programming language
Makefile
30231 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to traefik-proxy

Authelia
The Single Sign-On Multi-Factor portal for web apps
Stars: ✭ 11,094 (+55370%)
Mutual labels:  u2f, totp, sso, traefik, two-factor-authentication, sso-authentication
rx-otp
HMAC-based (HOTP) and Time-based (TOTP) One-Time Password manager. Works with Google Authenticator for Two-Factor Authentication.
Stars: ✭ 79 (+295%)
Mutual labels:  u2f, totp, two-factor-authentication
traefik-private-plugins
Automatic patch for Traefik supporting private plugins
Stars: ✭ 21 (+5%)
Mutual labels:  traefik, traefik-v2, traefik-docker
souin
An HTTP cache system, RFC compliant, compatible with @TykTechnologies, @traefik, @caddyserver, @go-chi, @bnkamalesh, @beego, @devfeel, @labstack, @gofiber, @go-goyave, @gin-gonic, @zalando, @zeromicro, @nginx and @apache
Stars: ✭ 269 (+1245%)
Mutual labels:  traefik, traefik-v2
keymaster
Short term certificate based identity system (ssh/x509 ca + openidc)
Stars: ✭ 59 (+195%)
Mutual labels:  u2f, totp
crotp
CrOTP - One Time Passwords for Crystal
Stars: ✭ 62 (+210%)
Mutual labels:  totp, two-factor-authentication
Speakeasy
**NOT MAINTAINED** Two-factor authentication for Node.js. One-time passcode generator (HOTP/TOTP) with support for Google Authenticator.
Stars: ✭ 2,531 (+12555%)
Mutual labels:  totp, two-factor-authentication
otp-java
A small and easy-to-use one-time password generator library for Java according to RFC 4226 (HOTP) and RFC 6238 (TOTP).
Stars: ✭ 107 (+435%)
Mutual labels:  totp, two-factor-authentication
trauth
🔑 A simple Traefik ForwardAuth server for HTTP Basic SSO
Stars: ✭ 30 (+50%)
Mutual labels:  sso, traefik
XSSO
统一单点登陆验证服务
Stars: ✭ 14 (-30%)
Mutual labels:  sso, sso-authentication
crystal-two-factor-auth
Two Factor Authentication Crystal code implementing the Time-based One-time Password Algorithm
Stars: ✭ 24 (+20%)
Mutual labels:  totp, two-factor-authentication
lsso
Nginx SSO middleware for protecting your internets.
Stars: ✭ 42 (+110%)
Mutual labels:  u2f, sso
totp
Time-Based One-Time Password Code Generator
Stars: ✭ 76 (+280%)
Mutual labels:  totp, two-factor-authentication
2FAuth
A Web app to manage your Two-Factor Authentication (2FA) accounts and generate their security codes
Stars: ✭ 664 (+3220%)
Mutual labels:  totp, two-factor-authentication
infrastructure
Flux based GitOps repository for my home lab infrastructure.
Stars: ✭ 14 (-30%)
Mutual labels:  traefik, authelia
Onetimepassword
🔑 A small library for generating TOTP and HOTP one-time passwords on iOS.
Stars: ✭ 243 (+1115%)
Mutual labels:  totp, two-factor-authentication
SimpleTOTP
A highly configurable yet simple to use TOTP based two-factor authentication processing module for SimpleSAMLphp.
Stars: ✭ 16 (-20%)
Mutual labels:  totp, two-factor-authentication
Nginx Sso
SSO authentication provider for the auth_request nginx module
Stars: ✭ 195 (+875%)
Mutual labels:  totp, sso
Twofactor totp
🔑 Second factor TOTP (RFC 6238) provider for Nextcloud
Stars: ✭ 203 (+915%)
Mutual labels:  totp, two-factor-authentication
apache 2fa
Apache two-factor (2FA) authentication with Google Authenticator based on Time-based One-Time Password (TOTP) or HMAC-based one-time password (HOTP) Algorithms.
Stars: ✭ 63 (+215%)
Mutual labels:  totp, two-factor-authentication

Traefik-Proxy

One-step (secure) configuration for Traefik edge router using Authelia for authentication.

Features

Keeping in mind security first, this project ensures:

  • The Docker daemon socket is never mounted to traefik or any container with external networking (See the risks of exposing the Docker daemon)
  • HTTPS redirection is automatically configured for all routers
  • TLS is always enabled, even locally (can confidently test new services locally without needing a dev config that differs significantly from prod)
  • The Traefik dashboard is never launched in insecure mode

Other features include:

  • Self-hosted SSO authentication (Authelia), including support for security keys and one-time password generators
  • User-friendly 4XX & 5XX status pages
  • Pre-configured file provider (for shared routers and middleware) and Docker provider (for everything else)
  • Centralized configuration via environment variables and Docker secrets

Getting Started

Quickstart

$ git clone https://github.com/jamescurtin/traefik-proxy.git
$ cd traefik-proxy
$ make

Running make creates an .env file and the authelia/secrets directory. The .env file should be updated to include hostnames for additional hosts that are configured. The authelia/secrets directory contains secrets for configuring all services. The default values should be changed before deploying.

There are additional configuration files that need to be customized. All places where customization is necessary are marked with CHANGEME comments.

The command will also create the external docker network traefik. Other docker services that you plan to expose via Traefik should be added to this network.

Creating a LDAP user

The following will create a default user named changeme with the password insecure:

$ bin/add_user authelia/example.ldif

Note: When run locally (e.g. on localhost), Traefik uses a self-signed SSL certificate. Therefore, web-browser security warnings are expected and can be safely bypassed.

To explore, navigate to:

Details

By running the make command, an external Docker network, traefik, will be created, which can be used to link any Docker container to Traefik. It also checks for the existence of .env and acme/acme.json, creating them if they do not exist.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].