Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Feature Requests
  3. Hiding apps behind the proxy app to enable cloudron authentication

Hiding apps behind the proxy app to enable cloudron authentication

Scheduled Pinned Locked Moved Feature Requests
app proxy
13 Posts 5 Posters 148 Views 6 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V Offline
    V Offline
    vk182
    wrote last edited by
    #3

    Hello @james ! Just normal cloudron apps like Mattermost or n8n that does not integrate with cloudron authentication and does not provide SSO

    1 Reply Last reply
    1
    • jamesJ Offline
      jamesJ Offline
      james
      Staff
      wrote last edited by
      #4

      Hello @vk182
      So you would like the app proxy infront of these apps, as well as their own user management?

      1 Reply Last reply
      1
      • V Offline
        V Offline
        vk182
        wrote last edited by
        #5

        @james hey đź‘‹ yes, correct - I do not mind the apps to use their own user management but since we can not control/enforce proper rules over its secutiry we want to add proper cloudron auth on top of it. We are able to configure app proxy jsut fine, but we need a simple way to isolate these apps from the external IP so they will be accessible only via app proxy.

        1 Reply Last reply
        0
        • T Offline
          T Offline
          Teiluj
          wrote last edited by
          #6

          Unless I misunderstand @vk182's post, This seems like something that was described here, here , and here.
          As well as some old references here.

          Looks like a feature in high demand, with a fair amount of use cases...

          1 Reply Last reply
          0
          • jamesJ Offline
            jamesJ Offline
            james
            Staff
            wrote last edited by james
            #7

            Hello @vk182
            Okay, understood.

            @vk182 said in Hiding apps behind the proxy app to enable cloudron authentication:

            What would be the cleanest, most durable way to prevent external access to the target app’s subdomain, so that it is reachable only through the proxy? We are trying to avoid custom modifications or unsupported hacks that might break updates or interfere with Cloudron’s normal operation.

            Even though you have stated this.
            It would be a simple change to the app and the extra maintenance would be somewhat manageable. Depending on how many apps you want to do this with.

            I did a recent post about this, see: https://forum.cloudron.io/post/115963

            With the same approch you can edit any Cloudron app and add the proxyAuth addon.

            V 1 Reply Last reply
            0
            • robiR Offline
              robiR Offline
              robi
              wrote last edited by
              #8

              It might be simpler to add an Nginx Auth option for any app as part of the App location configuration.

              That way there's no way around the gate if configured via app subdomain and no additional proxy app is needed.

              Conscious tech

              1 Reply Last reply
              2
              • jamesJ james

                Hello @vk182
                Okay, understood.

                @vk182 said in Hiding apps behind the proxy app to enable cloudron authentication:

                What would be the cleanest, most durable way to prevent external access to the target app’s subdomain, so that it is reachable only through the proxy? We are trying to avoid custom modifications or unsupported hacks that might break updates or interfere with Cloudron’s normal operation.

                Even though you have stated this.
                It would be a simple change to the app and the extra maintenance would be somewhat manageable. Depending on how many apps you want to do this with.

                I did a recent post about this, see: https://forum.cloudron.io/post/115963

                With the same approch you can edit any Cloudron app and add the proxyAuth addon.

                V Offline
                V Offline
                vk182
                wrote last edited by
                #9

                @james thank you for the clarification and the link! Do I understand correctly, that proxyAuth add-on will respect the Access Control setting of the app and allow access only to the allowed users via their Cloudron authentication? The target app may want the extra auth then but that is fine.

                Is there a way to add proxyAuth for the existing app? I do understand that documentation says it is impossible, but what if we have quite a big data already in the app that we want to protect and we are not able to just run a fresh install?

                p.s. Just as a side note, what is the best way to isolate the particular app from the public interface? This will allow us to be able to hide any app without clear reinstall with proxyAuth. This public-interface disabling also would come handy if we wanted the app to only be allowed on the VPC interface (i.e. on our ZeroTier network, but not on the public).

                jamesJ 1 Reply Last reply
                0
                • V vk182

                  @james thank you for the clarification and the link! Do I understand correctly, that proxyAuth add-on will respect the Access Control setting of the app and allow access only to the allowed users via their Cloudron authentication? The target app may want the extra auth then but that is fine.

                  Is there a way to add proxyAuth for the existing app? I do understand that documentation says it is impossible, but what if we have quite a big data already in the app that we want to protect and we are not able to just run a fresh install?

                  p.s. Just as a side note, what is the best way to isolate the particular app from the public interface? This will allow us to be able to hide any app without clear reinstall with proxyAuth. This public-interface disabling also would come handy if we wanted the app to only be allowed on the VPC interface (i.e. on our ZeroTier network, but not on the public).

                  jamesJ Offline
                  jamesJ Offline
                  james
                  Staff
                  wrote last edited by
                  #10

                  Hello @vk182

                  @vk182 said in Hiding apps behind the proxy app to enable cloudron authentication:

                  Do I understand correctly, that proxyAuth add-on will respect the Access Control setting of the app and allow access only to the allowed users via their Cloudron authentication? The target app may want the extra auth then but that is fine.

                  You understood correctly.

                  @vk182 said in Hiding apps behind the proxy app to enable cloudron authentication:

                  Is there a way to add proxyAuth for the existing app?

                  Yes that can be done.
                  You can think of that process like an app update, that only updates the app to use the Cloudron proxyauth add-on and does nothing with the application itself.

                  @vk182 said in Hiding apps behind the proxy app to enable cloudron authentication:

                  p.s. Just as a side note, what is the best way to isolate the particular app from the public interface?

                  If you have apps, that should not be publicly accessible, you could always only allow connections from specific IP-Addresses like e.g. a VPN.

                  Example setup could look something like this:

                  • Main Cloudron server - running the VPN app and all other public apps
                  • Separate Cloudron server - named intranet running all apps that should only be accessible from whitelisted IP-Addresses like the VPN (public IP of Main Cloudron)
                  • non-public apps on this Cloudron intranet server
                  • People who should be allowed to access the intranet server get a VPN client cert
                  • The Cloudron intranet server can be connected to the Main Cloudron User Directory, thus syncing users for apps that have OIDC/LDAP
                  • For the Intranet Cloudron server, you'd have to configure the firewall on a hosting provider level to only allow access from the Public IP of the Main Cloudron

                  Thus isolating public from intranet and still maintaining the comfortable setup of Cloudron User Directory.
                  Also comes in handy if you don't want your public apps (like Website or Shop) to go offline only when you need to update/reboot the intranet server.

                  1 Reply Last reply
                  0
                  • V Offline
                    V Offline
                    vk182
                    wrote last edited by
                    #11

                    Hi @james thank you for the detailed response!

                    You can think of that process like an app update, that only updates the app to use the Cloudron proxyauth add-on and does nothing with the application itself.

                    Can you please point me to the documentation on how this can be done? I understand now that and app updates itself, isn't it?

                    If you have apps, that should not be publicly accessible, you could always only allow connections from specific IP-Addresses like e.g. a VPN.

                    Is it possible to block single app from public access within the same Cloudron instance? I do not want to overcomplicate the configuration and have nested servers...

                    1 Reply Last reply
                    1
                    • J joseph marked this topic as a regular topic
                    • J joseph moved this topic from Support
                    • J Offline
                      J Offline
                      joseph
                      Staff
                      wrote last edited by
                      #12

                      I moved this to feature request since it's not implemented yet but feel free to discuss workaround/alt solutions.

                      1 Reply Last reply
                      0
                      • robiR Offline
                        robiR Offline
                        robi
                        wrote last edited by
                        #13

                        How about just basic http auth from the Cloudron nginx config?

                        Conscious tech

                        1 Reply Last reply
                        1
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • Bookmarks
                        • Search