<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[proxyAuth addon]]></title><description><![CDATA[<p dir="auto">Back in the day, we had an "oauth proxy" for apps that didn't support any authentication to put up an auth wall. This was brought up <a href="https://forum.cloudron.io/topic/1451/alternative-to-oauth-proxy">https://forum.cloudron.io/topic/1451/alternative-to-oauth-proxy</a> . We removed that proxy when we removed OAuth support altogether.</p>
<p dir="auto">Recently, there is a bunch of apps that require an auth wall including:</p>
<ul>
<li>Prometheus server/alert manager</li>
<li>Cloud torrent</li>
<li>Transmission</li>
<li>Apps like surfer</li>
<li>Many of our internal apps</li>
</ul>
<p dir="auto">I have put in this "proxy auth" feature in Cloudron 6. Just have to add it to addons in the manifest like:</p>
<pre><code>"addons": {
    "proxyAuth": {}
}
</code></pre>
<p dir="auto">Just like the <code>ldap</code> addon, user can then select which users/groups can authenticate. If the manifest also has <code>optionalSso</code>, then user can choose to let the app have no auth wall altogether.</p>
<p dir="auto">When using this feature, two routes are "reserved" - <code>/login</code> and <code>/logout</code>. Some benefits of having this on the platform side (as opposed in the app are):</p>
<ul>
<li>2FA login</li>
<li>Session management in the user's profile page. i.e can logout from apps etc</li>
<li>Easier for us to maintain this feature. Currently, this feature has already been re-implemented in the apps using 3 different stacks - nginx/apache/node...</li>
</ul>
<p dir="auto">I took a lot of inspiration from <a href="https://github.com/andygock/auth-server" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/andygock/auth-server</a> and <a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a>'s transmission code. So, big thanks to them!</p>
]]></description><link>https://forum.cloudron.io/topic/3682/proxyauth-addon</link><generator>RSS for Node</generator><lastBuildDate>Sat, 07 Mar 2026 15:00:33 GMT</lastBuildDate><atom:link href="https://forum.cloudron.io/topic/3682.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 11 Nov 2020 17:44:22 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to proxyAuth addon on Mon, 18 Apr 2022 16:39:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> I think we can add Firefly III to the list of apps that use this authentication strategy.</p>
]]></description><link>https://forum.cloudron.io/post/46311</link><guid isPermaLink="true">https://forum.cloudron.io/post/46311</guid><dc:creator><![CDATA[infogulch]]></dc:creator><pubDate>Mon, 18 Apr 2022 16:39:17 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Sat, 20 Feb 2021 01:14:52 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/infogulch" aria-label="Profile: infogulch">@<bdi>infogulch</bdi></a> That's totally true, but it assumes that apps are built with Cloudron specifically (or something similar) in mind. It's not the case for most Cloudron apps at the moment</p>
]]></description><link>https://forum.cloudron.io/post/26204</link><guid isPermaLink="true">https://forum.cloudron.io/post/26204</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Sat, 20 Feb 2021 01:14:52 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Sat, 20 Feb 2021 00:57:35 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> said in <a href="/post/26142">proxyAuth addon</a>:</p>
<blockquote>
<blockquote>
<p dir="auto">It's by far the easiest auth system to implement first if you write something custom.</p>
</blockquote>
<p dir="auto">I don't think it is.</p>
</blockquote>
<p dir="auto">I'm just saying that if you can build your app assuming it's behind an authenticating reverse-proxy, it frees you from a LOT of work designing a system to authenticate the user with credentials or whatever. It's just <code>username = request.Headers["X-Forwarded-User"]</code>, done. No validation, no encryption, no hmac, no password hashing function, no password storage, no password resets, etc etc etc</p>
]]></description><link>https://forum.cloudron.io/post/26203</link><guid isPermaLink="true">https://forum.cloudron.io/post/26203</guid><dc:creator><![CDATA[infogulch]]></dc:creator><pubDate>Sat, 20 Feb 2021 00:57:35 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Sat, 20 Feb 2021 00:37:39 GMT]]></title><description><![CDATA[<p dir="auto">I did some searching ("reverse proxy authentication", "header proxy auth"). I offer these examples for your consideration:</p>
<ul>
<li><a href="https://docs.kanboard.org/en/latest/admin_guide/reverse_proxy_authentication.html" target="_blank" rel="noopener noreferrer nofollow ugc">open source Kanban project management software Kanboard</a>
<ul>
<li>REMOTE_USER</li>
</ul>
</li>
<li><a href="https://plugins.jenkins.io/reverse-proxy-auth-plugin/" target="_blank" rel="noopener noreferrer nofollow ugc">Jenkins</a>
<ul>
<li>X-Forwarded-User</li>
</ul>
</li>
<li><a href="https://docs.docker.com/registry/recipes/nginx/" target="_blank" rel="noopener noreferrer nofollow ugc">Docker suggesting using it to secure access to a registry</a> (Not sure how applicable this one is.)</li>
<li>Microsoft recently published some docs on how to <a href="https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-headers" target="_blank" rel="noopener noreferrer nofollow ugc">configure Azure AD to do proxy auth</a>, as well as <a href="https://microsoft.github.io/reverse-proxy/articles/authn-authz.html" target="_blank" rel="noopener noreferrer nofollow ugc">another article</a></li>
<li><a href="https://www.authelia.com/docs/deployment/supported-proxies/nginx.html" target="_blank" rel="noopener noreferrer nofollow ugc">Authelia</a> (?)</li>
<li>Some Oracle enterprise apps</li>
<li>Some stack overflow questions in this area:
<ul>
<li><a href="https://stackoverflow.com/questions/33368653/how-do-i-set-remote-user-in-a-http-header" target="_blank" rel="noopener noreferrer nofollow ugc">https://stackoverflow.com/questions/33368653/how-do-i-set-remote-user-in-a-http-header</a></li>
<li><a href="https://serverfault.com/questions/180726/remote-user-through-apache-reverse-proxy" target="_blank" rel="noopener noreferrer nofollow ugc">https://serverfault.com/questions/180726/remote-user-through-apache-reverse-proxy</a></li>
</ul>
</li>
</ul>
<p dir="auto">Perhaps this solution is more common in enterprise apps. Probably for the security reasons I mentioned before.</p>
<p dir="auto">There's also <a href="https://tools.ietf.org/html/rfc7615" target="_blank" rel="noopener noreferrer nofollow ugc">RFC 7615</a> / <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Proxy-Authenticate" target="_blank" rel="noopener noreferrer nofollow ugc">Proxy-Authenticate on MDN</a> which seems related.</p>
<p dir="auto">Thoughts?</p>
<p dir="auto">Edit also:</p>
<ul>
<li><a href="https://galaxyproject.org/admin/config/apache-external-user-auth/" target="_blank" rel="noopener noreferrer nofollow ugc">Galaxy Project</a> (?)</li>
<li><a href="https://odoo-community.org/shop/product/authenticate-via-http-remote-user-539#attr=8170" target="_blank" rel="noopener noreferrer nofollow ugc">odoo community</a> (?)</li>
<li><a href="https://wiki.shibboleth.net/confluence/display/SHIB2/NativeSPAttributeAccess" target="_blank" rel="noopener noreferrer nofollow ugc">shibboleth</a> (?)</li>
</ul>
]]></description><link>https://forum.cloudron.io/post/26196</link><guid isPermaLink="true">https://forum.cloudron.io/post/26196</guid><dc:creator><![CDATA[infogulch]]></dc:creator><pubDate>Sat, 20 Feb 2021 00:37:39 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Fri, 19 Feb 2021 09:21:10 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/infogulch" aria-label="Profile: infogulch">@<bdi>infogulch</bdi></a> said in <a href="/post/26139">proxyAuth addon</a>:</p>
<blockquote>
<p dir="auto">It's by far the easiest auth system to implement first if you write something custom.</p>
</blockquote>
<p dir="auto">I don't think it is.</p>
<p dir="auto">Cloudron used to have something very similar (in usage, if not technologically), using OAuth. They decided to drop it, because almost no apps supported it.</p>
<p dir="auto">What you are describing would be indeed quite interesting, but more or less custom to cloudron : i think this would be even more difficult to convince upstream devs to implement, because it's so custom.</p>
<p dir="auto">Do you know of any apps that currently support a similar thing ?</p>
]]></description><link>https://forum.cloudron.io/post/26142</link><guid isPermaLink="true">https://forum.cloudron.io/post/26142</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Fri, 19 Feb 2021 09:21:10 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Fri, 19 Feb 2021 04:58:58 GMT]]></title><description><![CDATA[<p dir="auto">I think it would be nice if more apps supported the option to switch to proxyAuth+<code>X-REMOTE-USER</code>-based authentication for multi-user apps. I prefer proxy-based auth for a couple reasons:</p>
<ul>
<li>I don't trust the login page and password handling to apps. Even if they auth via ldap -- they're still touching the password. Proxy auth eliminates this problem altogether, since they only receive the attestation of the user's identity (the header), no secrets, no cookies. I trust the proxy's auth login page way more.</li>
<li>Ideally the app is never even accessible to the outside world until you're logged in. Apps often have vulnerabilities that can expose data even if you're not logged in. By putting the app behind an authenticating proxy, one can shield it from general internet access, narrowing the scope of attackers from "everyone that can access my ip" to "users on my cloudron" -- a large improvement.</li>
<li>It's by far the easiest auth system to implement first if you write something custom.</li>
</ul>
<p dir="auto">Of course, all apps may not support this yet, and sometimes you <em>do</em> want a public-facing service, and some apps could never work like this (bitwarden), etc, hence "optional".</p>
]]></description><link>https://forum.cloudron.io/post/26139</link><guid isPermaLink="true">https://forum.cloudron.io/post/26139</guid><dc:creator><![CDATA[infogulch]]></dc:creator><pubDate>Fri, 19 Feb 2021 04:58:58 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Fri, 05 Feb 2021 12:46:29 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> <a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> Thanks for your replies. Since Shaarli is designed as a single-user application, I don't see much chances of getting LDAP integration implemented for the public page.<br />
But you're of course right, that my proposal for the Shaarli public page is a bit "hacky". It was rather meant as an example of what a dynamic proxyAuth-option could be used for. My thought was, that others might have a need for such an option in similar situations as well.</p>
]]></description><link>https://forum.cloudron.io/post/24957</link><guid isPermaLink="true">https://forum.cloudron.io/post/24957</guid><dc:creator><![CDATA[hendrikvl]]></dc:creator><pubDate>Fri, 05 Feb 2021 12:46:29 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 04 Feb 2021 16:04:25 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> This plugin works amazing on my alpha build of code-server. Works like a treat.</p>
]]></description><link>https://forum.cloudron.io/post/24896</link><guid isPermaLink="true">https://forum.cloudron.io/post/24896</guid><dc:creator><![CDATA[murgero]]></dc:creator><pubDate>Thu, 04 Feb 2021 16:04:25 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Wed, 03 Feb 2021 17:58:47 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/hendrikvl" aria-label="Profile: hendrikvl">@<bdi>hendrikvl</bdi></a> Currently, proxyAuth is designed for cases where the app has no user management at all. I think if an app already has user support like shaarli, it's best to ask the upstream project to password protect the public page as <a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> suggests. BTW, if you post a request upstream, please do post the link here.</p>
]]></description><link>https://forum.cloudron.io/post/24801</link><guid isPermaLink="true">https://forum.cloudron.io/post/24801</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Wed, 03 Feb 2021 17:58:47 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Wed, 03 Feb 2021 13:59:54 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/hendrikvl" aria-label="Profile: hendrikvl">@<bdi>hendrikvl</bdi></a> I don't use Shaarli, so I don't know about it very well, but in my opinion, the clean way to do this would be to request the upstream project (Shaarli) to allow an option to protect stuff behind its own auth wall, and have 2 types of users, normal &amp; admin. It seems "hacky" to me to solve this usecase with Cloudron's proxyAuth</p>
]]></description><link>https://forum.cloudron.io/post/24774</link><guid isPermaLink="true">https://forum.cloudron.io/post/24774</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Wed, 03 Feb 2021 13:59:54 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Wed, 03 Feb 2021 13:45:57 GMT]]></title><description><![CDATA[<p dir="auto">I have a question regarding the proxyAuth addon: If I understand it correctly, it has to added to the manifest file and therefore is only suitable for custom apps. How about an option to enable it for apps that have built-in authentication as well?</p>
<p dir="auto">In my case, I would like to hide the public site of an Shaarli-instance behind the proxyAuth login. Such that authenticated users can browse the public page and I can additionally login using the builtin auth as admin.<br />
I know, that this usecase is somewhat specific and customary, but it is just meant as an example of possible use cases for an proxyAuth-option with the standard apps.</p>
]]></description><link>https://forum.cloudron.io/post/24772</link><guid isPermaLink="true">https://forum.cloudron.io/post/24772</guid><dc:creator><![CDATA[hendrikvl]]></dc:creator><pubDate>Wed, 03 Feb 2021 13:45:57 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Wed, 27 Jan 2021 17:29:26 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/saikarthik" aria-label="Profile: saikarthik">@<bdi>saikarthik</bdi></a> Girish answered here : <a href="https://forum.cloudron.io/post/23886">https://forum.cloudron.io/post/23886</a></p>
<blockquote>
<p dir="auto">Yes, proxyAuth exclusion is implemented. I only implemented a simple approach with a ! pattern for now (not an array).</p>
</blockquote>
]]></description><link>https://forum.cloudron.io/post/24164</link><guid isPermaLink="true">https://forum.cloudron.io/post/24164</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Wed, 27 Jan 2021 17:29:26 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Wed, 27 Jan 2021 17:27:58 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> Hi Girish, what is the status of this? selectively exposing certain paths to public?</p>
]]></description><link>https://forum.cloudron.io/post/24163</link><guid isPermaLink="true">https://forum.cloudron.io/post/24163</guid><dc:creator><![CDATA[saikarthik]]></dc:creator><pubDate>Wed, 27 Jan 2021 17:27:58 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Tue, 12 Jan 2021 22:19:44 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> Currently <s>I have an app that this does not work on - is there something special I need to do in the app beyond adding the addon to the addon list?</s></p>
<p dir="auto">Edit: I am blind I swear - just formatted the JSON incorrectly for the manifest.</p>
]]></description><link>https://forum.cloudron.io/post/23298</link><guid isPermaLink="true">https://forum.cloudron.io/post/23298</guid><dc:creator><![CDATA[murgero]]></dc:creator><pubDate>Tue, 12 Jan 2021 22:19:44 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 17 Dec 2020 15:11:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> great point. I can copy what they do.</p>
]]></description><link>https://forum.cloudron.io/post/21876</link><guid isPermaLink="true">https://forum.cloudron.io/post/21876</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Thu, 17 Dec 2020 15:11:17 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 17 Dec 2020 09:03:02 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> It works for .gitignore files <img src="https://forum.cloudron.io/assets/plugins/nodebb-plugin-emoji/emoji/android/1f937.png?v=c3aa4c12b7e" class="not-responsive emoji emoji-android emoji--shrug" style="height:23px;width:auto;vertical-align:middle" title=":shrug:" alt="🤷" /></p>
]]></description><link>https://forum.cloudron.io/post/21846</link><guid isPermaLink="true">https://forum.cloudron.io/post/21846</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Thu, 17 Dec 2020 09:03:02 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 17 Dec 2020 03:40:11 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/jimcavoli" aria-label="Profile: jimcavoli">@<bdi>jimcavoli</bdi></a> won't having it plural cause some confusing semantics if you mix ! and no ! paths ? Let me think <img src="https://forum.cloudron.io/assets/plugins/nodebb-plugin-emoji/emoji/android/1f914.png?v=c3aa4c12b7e" class="not-responsive emoji emoji-android emoji--thinking_face" style="height:23px;width:auto;vertical-align:middle" title="🤔" alt="🤔" /></p>
]]></description><link>https://forum.cloudron.io/post/21828</link><guid isPermaLink="true">https://forum.cloudron.io/post/21828</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Thu, 17 Dec 2020 03:40:11 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 17 Dec 2020 03:32:04 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> Yeah, that would be enough for n8n I think, though if we're going to go that route, I think making paths an array of either path(s) and/or <code>!</code> paths makes the most sense in general (at least somehow providing for the option of multiple excluded paths)</p>
]]></description><link>https://forum.cloudron.io/post/21825</link><guid isPermaLink="true">https://forum.cloudron.io/post/21825</guid><dc:creator><![CDATA[jimcavoli]]></dc:creator><pubDate>Thu, 17 Dec 2020 03:32:04 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Thu, 17 Dec 2020 02:24:47 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/jimcavoli" aria-label="Profile: jimcavoli">@<bdi>jimcavoli</bdi></a> Shall I go with <code>path: "!/webhooks"</code> for now? Will this be enough for n8n ?</p>
]]></description><link>https://forum.cloudron.io/post/21819</link><guid isPermaLink="true">https://forum.cloudron.io/post/21819</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Thu, 17 Dec 2020 02:24:47 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Mon, 14 Dec 2020 18:18:57 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/nj" aria-label="Profile: nj">@<bdi>nj</bdi></a> I have logged it here - <a href="https://git.cloudron.io/cloudron/box/-/issues/748" target="_blank" rel="noopener noreferrer nofollow ugc">https://git.cloudron.io/cloudron/box/-/issues/748</a> . As <a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a>  said, it wasn't implemented as part of the first iteration of proxyAuth.</p>
]]></description><link>https://forum.cloudron.io/post/21619</link><guid isPermaLink="true">https://forum.cloudron.io/post/21619</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Mon, 14 Dec 2020 18:18:57 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Mon, 14 Dec 2020 13:27:49 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/nj" aria-label="Profile: nj">@<bdi>nj</bdi></a> I don't think this is implemented either:</p>
<blockquote>
<ul>
<li>Session management in the user's profile page. i.e can logout from apps etc</li>
</ul>
</blockquote>
<p dir="auto">I think <a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> just meant that it would be possible to implement this in the future, not that it would be in the first version of proxyAuth.</p>
]]></description><link>https://forum.cloudron.io/post/21595</link><guid isPermaLink="true">https://forum.cloudron.io/post/21595</guid><dc:creator><![CDATA[mehdi]]></dc:creator><pubDate>Mon, 14 Dec 2020 13:27:49 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Mon, 14 Dec 2020 13:24:10 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> I don't see the 2FA code prompt on the login page of Simple Torrent. Am I missing something?</p>
<blockquote>
<p dir="auto">Some benefits of having this on the platform side (as opposed in the app are):</p>
<ul>
<li>2FA login</li>
</ul>
</blockquote>
]]></description><link>https://forum.cloudron.io/post/21594</link><guid isPermaLink="true">https://forum.cloudron.io/post/21594</guid><dc:creator><![CDATA[nj]]></dc:creator><pubDate>Mon, 14 Dec 2020 13:24:10 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Mon, 14 Dec 2020 03:38:27 GMT]]></title><description><![CDATA[<p dir="auto">Agree on the default behavior - I imagine it's unlikely that anything more specific than path-level exceptions are unlikely. Perhaps as an extension to the solution that <a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a>  suggests, we could extend the existing format of:</p>
<pre><code class="language-json">{
  "proxyAuth": {
    "path": "/admin" 
  }
}
</code></pre>
<p dir="auto">To take exceptions:</p>
<pre><code class="language-json">{
  "proxyAuth": {
    "path": "/admin" ,
    "exclude": [
      "/webhook",
      "/
    ]
  }
}
</code></pre>
<p dir="auto">Or with probably over-the-top features, make everything a map of path and exception(s):</p>
<pre><code class="language-json">{
  "proxyAuth": {
    "paths": {
      "/" : [
        "/webhook",
        "/public"
      ],
      "/admin": []
    }
  }
}
</code></pre>
<p dir="auto">Honestly, I appreciate the minimal-first approach, and I think the middle option of adding a (understood to be auto-wildcarded) array of exclusions is the easier next step. I can't imagine anything that would need the super-complex variant would be something that would or should rely on such a mechanism to secure it.</p>
]]></description><link>https://forum.cloudron.io/post/21581</link><guid isPermaLink="true">https://forum.cloudron.io/post/21581</guid><dc:creator><![CDATA[jimcavoli]]></dc:creator><pubDate>Mon, 14 Dec 2020 03:38:27 GMT</pubDate></item><item><title><![CDATA[Reply to proxyAuth addon on Mon, 14 Dec 2020 02:10:49 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/mehdi" aria-label="Profile: mehdi">@<bdi>mehdi</bdi></a> I like this solution and its flexibility. It could also be backwards compatible with the currently version - if no paths are specified, everything is auth'ed.</p>
]]></description><link>https://forum.cloudron.io/post/21578</link><guid isPermaLink="true">https://forum.cloudron.io/post/21578</guid><dc:creator><![CDATA[thetomester13]]></dc:creator><pubDate>Mon, 14 Dec 2020 02:10:49 GMT</pubDate></item></channel></rss>