Reverse-Proxy (old version): Difference between revisions
(→Update) |
m (Tropaion moved page Reverse-Proxy to Reverse-Proxy (old version)) |
||
(9 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
|RAM = 1024MB | |RAM = 1024MB | ||
|Cores = 1 | |Cores = 1 | ||
|Files = [[configuration.yml]]<br>[[users_database.yml]]<br>[[authelia_portal.conf]]<br>[[protected_endpoint.conf]] | |Files = [[configuration.yml]]<br>[[users_database.yml]]<br>[[authelia_portal.conf]]<br>[[protected_endpoint.conf]]<br>[[UpdateAuthelia.sh]] | ||
}} | }} | ||
<p>The ReverseProxy is reachable under <syntaxhighlight lang="Bash" inline>192.168.88.3</syntaxhighlight> which is located in the ServerVLAN.</p> | <p>The ReverseProxy is reachable under <syntaxhighlight lang="Bash" inline>192.168.88.3</syntaxhighlight> which is located in the ServerVLAN.</p> | ||
Line 17: | Line 17: | ||
=== Nginx Proxy Manager === | === Nginx Proxy Manager === | ||
<p>Download installation script and run it</p> | <p>Download installation script and run it</p> | ||
<syntaxhighlight lang="console" | <syntaxhighlight lang="console"> | ||
wget --no-cache -qO - https://raw.githubusercontent.com/ej52/proxmox/main/lxc/nginx-proxy-manager/setup.sh | sh | |||
wget https://raw.githubusercontent.com/ | |||
</syntaxhighlight> | </syntaxhighlight> | ||
<p>After installation, the webinterface should be reachable, standard login is</p> | <p>After installation, the webinterface should be reachable, standard login is</p> | ||
Line 31: | Line 29: | ||
<p>Update NPM with following command</p> | <p>Update NPM with following command</p> | ||
<syntaxhighlight lang="console"> | <syntaxhighlight lang="console"> | ||
wget --no-cache -qO - https://raw.githubusercontent.com/ | wget --no-cache -qO - https://raw.githubusercontent.com/ej52/proxmox/main/lxc/nginx-proxy-manager/setup.sh | sh | ||
</syntaxhighlight> | </syntaxhighlight> | ||
Line 57: | Line 55: | ||
</syntaxhighlight> | </syntaxhighlight> | ||
<p>Open Redis Config and set passphrase for redis server, which is needed in the authelia configuration file. Find <code># requirepass</code> in line | <p>Open Redis Config and set passphrase for redis server, which is needed in the authelia configuration file. Find <code># requirepass</code> in line 790 and change it <code>requirepass "my_redis_password"</code></p> | ||
<syntaxhighlight lang="console" line> | <syntaxhighlight lang="console" line> | ||
nano /etc/redis/redis.conf | nano /etc/redis/redis.conf | ||
Line 75: | Line 73: | ||
=== Installation === | === Installation === | ||
<p>Download and | <p>Download and install package file:</p> | ||
<syntaxhighlight lang="console" line> | <syntaxhighlight lang="console" line> | ||
wget https://github.com/authelia/authelia/releases/download/v4.36.3/authelia_v4.36.3_amd64.deb | |||
apt install ./authelia_v4.36.3_amd64.deb | |||
</syntaxhighlight> | </syntaxhighlight> | ||
==== configuration.yml ==== | ==== configuration.yml ==== | ||
<p> | <p>Edit onfiguration file, modify and paste [[configuration.yml]]</p> | ||
<syntaxhighlight lang="console"> | <syntaxhighlight lang="console"> | ||
nano /etc/authelia/configuration.yml | nano /etc/authelia/configuration.yml |
Latest revision as of 20:47, 11 February 2023
IP: | 192.168.88.3 |
---|---|
MAC: | 56:59:71:B1:85:BC |
OS: | Debian Bullseye |
---|---|
Files: | configuration.yml users_database.yml authelia_portal.conf protected_endpoint.conf UpdateAuthelia.sh |
RAM: | 1024MB |
Cores: | 1 |
Privileged: | No |
The ReverseProxy is reachable under 192.168.88.3
which is located in the ServerVLAN.
Every incoming packages from outside are forwarded to this IP.
The ReverseProxy also forces outside connections to use HTTPS/SSL and will provide a SSL-Certificate.
Basic Setup
Nginx Proxy Manager
Download installation script and run it
wget --no-cache -qO - https://raw.githubusercontent.com/ej52/proxmox/main/lxc/nginx-proxy-manager/setup.sh | sh
After installation, the webinterface should be reachable, standard login is
Email: admin@example.com
Password: changeme
Update
Update NPM with following command
wget --no-cache -qO - https://raw.githubusercontent.com/ej52/proxmox/main/lxc/nginx-proxy-manager/setup.sh | sh
Authelia
For security reasons and convenience, the login portal Authelia will be installed.
Redis-Server
Install Redis with the following command:
apt install redis-server
After installing Redis, start redis service and enable it to start after system reboot with the following command:
systemctl start redis-server
systemctl enable redis-server
Verify the status of the redis server:
systemctl status redis-server
By default, Redis listening on the localhost on port 6379. You can check it with the following command:
ps -ef | grep redis
Open Redis Config and set passphrase for redis server, which is needed in the authelia configuration file. Find # requirepass
in line 790 and change it requirepass "my_redis_password"
nano /etc/redis/redis.conf
Restart redis to apply config
systemctl restart redis
Test if passphrase is working correctly and exit
redis-cli
AUTH yourpassword
exit
Installation
Download and install package file:
wget https://github.com/authelia/authelia/releases/download/v4.36.3/authelia_v4.36.3_amd64.deb
apt install ./authelia_v4.36.3_amd64.deb
configuration.yml
Edit onfiguration file, modify and paste configuration.yml
nano /etc/authelia/configuration.yml
Restrict permissions for the configuration file
chmod 0600 /etc/authelia/configuration.yml
users_database.yml
Create users_database, modify and paste users_database.yml
nano /etc/authelia/users_database.yml
Password hash can be generated with following command
/usr/bin/authelia hash-password 'yourpassword' -i1 -k32 -l16 -m256 -p8
Restrict permissions for the users_database
chmod 0600 /etc/authelia/users_database.yml
Start authelia and check status
systemctl start authelia
systemctl status authelia
Enable authelia at boot
systemctl enable authelia
Update
To update authelia, I made an bash script: UpdateAuthelia.sh
Configure Nginx Proxy Manager
Create Proxy-Host for Authelia:
- auth.flowerhouse.at -> Scheme: http, Forward IP: 192.168.88.3, Port: 9091
- Chache Assests: On, Block Common Exploits: On
- At the advanced tab add content of file authelia_portal.conf
To enable the login portal for a host, go to the advanced tab and add the contenct of protected_endpoint.conf
- Line 3, 33 and 34 needs to be edited
Sources
- Nginx Proxy Manager (ReverseProxy)
- Nginx Proxy Manager Install Script
- Authelia GitHub (Login-Portal)
- Set up Authelia with Nginx Proxy Manager