Why not use the excellent MiroTalk for this functionality?
charlesnw
Posts
-
Nextcloud Talk high-performance back-end -
GLPI - Asset and IT Management SoftwareAwesome! Would love to help with SSO. Any pointers where to start for hacking on that?
-
Freesend - open-source alternative to Resend - uses Amazon SESThis appears to just be an SES wrapper?
-
Comm App - Self-Hosted Alternative to Signal, Wire, WhatsApp, Telegramwhy not use element/matrix? already packaged for cloudron.
-
Password ComplexityAny update on this ? Where is the roadmap being set ? How can i help hack on this and send a PR?
-
Password policyWould it be possible to allow the policy to be set period ? That way sites with higher security requirements can meet federal / enterprise standards ?
-
Cloudron documentation outdated? Bitwarden now supports SSO@james Oh is this something that actually needs to be changed in the app json to make OIDC integration work at all?
-
Cloudron documentation outdated? Bitwarden now supports SSOI am attempting to get a brand new installation of VaultWarden working with Cloudron OIDC SSO.
I have already very carefully read over:
https://docs.cloudron.io/user-directory/#openid-connect
https://github.com/dani-garcia/vaultwarden/wiki/Enabling-SSO-support-using-OpenId-Connectto produce the below (redacted) config.json..
https://my.knownelement.com/openid/.well-known/openid-configuration/ https://my.cloudron.example/.well-known/openid-configuration https://my.cloudron.example/openid/.well-known/openid-configuration SSO_AUTHORITY : the OpenID Connect Discovery endpoint of your SSO Should not include the /.well-known/openid-configuration part and no trailing / $SSO_AUTHORITY/.well-known/openid-configuration should return the a json document: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse { "domain": "https://passwords.knownelement.com", "sends_allowed": true, "incomplete_2fa_time_limit": 3, "disable_icon_download": false, "signups_allowed": false, "signups_verify": false, "signups_verify_resend_time": 3600, "signups_verify_resend_limit": 6, "invitations_allowed": false, "emergency_access_allowed": true, "email_change_allowed": false, "password_iterations": 600000, "password_hints_allowed": false, "show_password_hint": false, "admin_token": "heavily-redacted :) ", "invitation_org_name": "KNEL Password Vault", "ip_header": "X-Forwarded-For", "icon_redirect_code": 302, "icon_cache_ttl": 2592000, "icon_cache_negttl": 259200, "icon_download_timeout": 10, "http_request_block_non_global_ips": true, "disable_2fa_remember": false, "authenticator_disable_time_drift": false, "require_device_email": false, "reload_templates": false, "log_timestamp_format": "%Y-%m-%d %H:%M:%S.%3f", "admin_session_lifetime": 20, "increase_note_size_limit": false, "dns_prefer_ipv6": false, "sso_enabled": true, "sso_only": true, "sso_signups_match_email": true, "sso_allow_unknown_email_verification": false, "sso_client_id": "redacted", "sso_client_secret": "redacted", "sso_authority": "https://my.knownelement.com", "sso_scopes": "openid email profile", "sso_pkce": true, "sso_callback_path": "https://passwords.knownelement.com/identity/connect/oidc-signin", "sso_auth_only_not_session": true, "sso_client_cache_expiration": 0, "sso_debug_tokens": false, "_enable_yubico": true, "_enable_duo": true, "_enable_smtp": true, "use_sendmail": false, "smtp_host": "mail", "smtp_security": "off", "smtp_port": 2525, "smtp_from": "passwords.app@knownelement.com", "smtp_from_name": "Vaultwarden", "smtp_username": "passwords.app@knownelement.com", "smtp_password": "redacted", "smtp_auth_mechanism": "Plain", "smtp_timeout": 15, "smtp_embed_images": true, "smtp_accept_invalid_certs": true, "smtp_accept_invalid_hostnames": true, "_enable_email_2fa": false, "email_token_size": 6, "email_expiration_time": 600, "email_attempts_limit": 3, "email_2fa_enforce_on_verified_invite": false, "email_2fa_auto_fallback": false }I suppose I can increase logging to see if that helps.
Vaultwarden keeps asking for a master password, even though I've disabled that and set sso only.
-
CIS Benchmark ComplianceAs I have said, I'm deploying a FLO stack (with Cloudron at the core) into a startup that I'm building (as CIO/CTO). We have to be CMMC compliant. Making sure Cloudron works on a 100% compliant base system is the first milestone. While you may not consider them issues, they do need to be addressed to be compliant. That's "my problem". If a fully compliant base system causes an issue in Cloudron , that's "our problem".

While you, and many Cloudron users may not care about CMMC/HIPPA/SOC/PCI compliance, I (and my board) do. I'm also building a small side business which will sell Cloudron as a service (pre setup/configured, all applications have admin password changed, admin passwords stored in Bitwarden) (the new Bitwarden SSO makes that possible without bootstrapping issues) and it will have CMMC/SOC/PCI/HIPPA compliance (at the higher tier).
-
CIS Benchmark ComplianceAs I mentioned, I'll be applying Ansible playbooks to bring the base system to 100% compliance.
I never said these were Cloudron issues. I said that I would be testing Cloudron on a 100% compliant base system and fixing anything that is broken. I don't expect any issues. Because, as you mentioned, these are all base system config tweaks.
Cloudron runs everything 100% in Docker images.
Where I suspect change may be needed, is at the Cloudron container level when I start scanning everything with Trivy.
Do you use hardened Docker base images?
-
CIS Benchmark ComplianceI have uploaded it here: https://staticbits.reachableceo.com/CloudronWazuhReport-2025-30-12.csv
-
CIS Benchmark ComplianceIs there a way to upload a text file to the forum? I have a csv of the wazuh report exported.
-
CIS Benchmark ComplianceI’ll see about getting the full list exported to a text file and posted.
-
CIS Benchmark ComplianceThis is the out of the box results on a fully patched/updated Cloudron per Wazuh (as of about 90 seconds ago).

I will be deploying a test instance of Cloudron on a VM with a set of CIS/NIST ansible playbooks to get the node to 100% compliance and see if anything breaks.
-
NTP configuration in UIAny possibility of getting NTP configuration (via API/GUI) into Cloudron 10 roadmap?
-
Logging - targets, retention etcOh also, ideally, syslog configuration settings should be possible in GUI/API. I believe that anything done in the GUI is also available via API? I think the GUI uses the API behind the scenes?
-
Logging - targets, retention etcAny update on logging configuration? Can we get this on the roadmap for Cloudron 10?
Would love to see more enterprise/compliance focused features in Cloudron 10. Happy to help implement. I've been going through the Cloudron github in anticipation of sending pull requests.
Right now I'm working on configuring all CIS benchmarks and passing CMMC with Cloudron, so that's taken time away from my packaging of ~50 new applications for Cloudron (I can't use the applications in an un-certified environment). I'll spin up a dedicated topic on Ansible/CIS/CMMC compliance shortly.
I am working on packaging up a very large number of applications for Cloudron this week/by end of January (finally) so I'll post updates in that topic soon.
-
Where should I share my Work In Progress on app packaging ?Hello everyone. I've been busy with the physical facility buildout of my business. That has now wrapped up (I have one more weekend of punchlist work). Anyway, I am now packaging up the things from my list! Using a combination of claud/gemini.
See the git repo here : https://git.knownelement.com/KNEL/KNELProductionContainers/src/branch/integration/
-
Dolibarr OIDCDid not work. I made the
/app/data/dolibarr
directory identical to a working instance. I restarted the instance that I can't login to as admin and get exact same error. Any way to increase the logging?
-
Access consume folder from scanner/networkSeems it’s something that can be set in the config but warns against doing so if running in docker
https://docs.paperless-ngx.com/configuration/#PAPERLESS_CONSUMPTION_DIR