59

I have a suite of services exposed using a reverse proxy (npm) protected with passwords, but I'm always a bit nervous that username/passwords aren't enough -- is there a way to set up 2FA either on Nginx Proxy Manager side or on, e.g., the 'arr suite of apps?

top 26 comments
sorted by: hot top controversial new old
[-] dotslashme@infosec.pub 25 points 1 year ago

You could look into apps like authelia, keycloak, authentic, etc.

[-] Gutless2615@ttrpg.network 10 points 1 year ago

authelia

Ah that sounds like exactly what I'm looking for, actually. Thanks. Any tutorial you have that you can recommend?

[-] wedge_film@lemmy.dbzer0.com 9 points 1 year ago

I usually recommend this one. There's a section for NPM you'll find useful.

[-] Gutless2615@ttrpg.network 4 points 1 year ago

Dope, thanks

[-] kzs@feddit.ch 3 points 1 year ago

Yeah, I think Ibracorp is great, found it useful in some detail questions Let me however recommend this link from Smart Home Beginner: I set up my server based on this one, with Authelia and Duo for 2FA

[-] FancyGUI@lemmy.fancywhale.ca 5 points 1 year ago

Yep! Authentik is my choice there, and it works flawlessly for my use-cases. The only thing that keeps me on my toes is still the celery dependency on redis that makes it not HA. They're working on it and making me happy :)

[-] vDzn34WWr2@programming.dev 3 points 1 year ago
[-] Zikeji@programming.dev 3 points 1 year ago

Highly available. For example, being able to run multiple instances of it and if one server goes down the other picks up slack.

[-] FancyGUI@lemmy.fancywhale.ca 2 points 1 year ago

HighAvailability

[-] Lem453@lemmy.ca 3 points 1 year ago

This is the way, look up techno Tim's "ssl everywhere" video to get traefik with wildcard ssl for Internet facing and local services then set up authentik and you will have a solid setup that will last for years with a solid foundation.

[-] kratoz29@lemmy.world 2 points 1 year ago

I have a Synology NAS (my humble server) would that work with it too??? For example the DSM page (which I don't have exposed).

[-] Pfosten@feddit.de 2 points 1 year ago

Synology's DSM has built-in MFA support, though it also has some features for external identity management. I don't think Keycloak and so on would be compatible though.

[-] kratoz29@lemmy.world 1 points 1 year ago

Yeah you are right, they already support 2FA.

[-] mhzawadi@lemmy.horwood.cloud 2 points 1 year ago

I use keycloak for all by services that dont have any 2FA, I use an oauth proxy to front the service

[-] American_Jesus@lemm.ee 9 points 1 year ago

linuxserver.io have a templates for Authelia and Authentik on nginx

https://github.com/linuxserver/reverse-proxy-confs

[-] Gutless2615@ttrpg.network 3 points 1 year ago

Incredible. Thanks that makes this all much easier.

[-] eximo@lemmy.ml 5 points 1 year ago

Some systems support MFA eg vaultwarden. For that I use the built in MFA with Yubikeys.

For things that are not MFA supported but I need them to be open I put them behind Authelia and Nginx Proxy Manager.

Authelia config makes sense now. It was confusing at first however the custom config required on NPM still confuses me.

Anything else stays off the internet and I can access via vpn back into my LAN.

[-] rarkgrames@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

Not sure if it fits your requirements exactly but I just put a service behind TwinGate and it works well for my usage case. I can allow my wife secure access to services she needs to access from anywhere securely - she just opens the app to connect and she can access what she needs.

I haven’t but you can enable 2FA, as well as restricting based on things like hardware, OS and whether a device has biometrics.

[-] betternotbigger@lemmy.world 3 points 1 year ago

If you're comfortable with using Cloudflare, you can use their zero trust tunneling and setup an application layer that adds auth to those services. I have mine protected by my GitHub login.

[-] Gutless2615@ttrpg.network 3 points 1 year ago

Oh interesting. I'm using zero trust tunneling already to get through my ISP network chicanery. How would that work? Do yo uhave any tutorials you can recommend?

[-] betternotbigger@lemmy.world 4 points 1 year ago

cloudflare dash

You can secure your tunnels using the Access menu and then adding an application. It should be somewhat straight-forward but you're basically looking to create an access policy and then adding the rules you want. For example a simple one is to add an allow rule for certain emails. When you enter your email an access code will be sent to you before you can access the application resource. That's just one of many ways to secure it using their application config and access policies.

[-] kratoz29@lemmy.world 1 points 1 year ago

I used to expose my Vaultwarden instance with it, but I think it didn't work with the protected CF login.

[-] betternotbigger@lemmy.world 1 points 1 year ago

Likely because the apps need access to the host and the policies were likely blocking it since it's non-interactive.

[-] wedge_film@lemmy.dbzer0.com 2 points 1 year ago

I used to run Authelia with NPM. It supports TOTP as second factor.

It is! I know that Mastodon and Lemmy support it. I cannot speak for any of the others though.

this post was submitted on 25 Jul 2023
59 points (96.8% liked)

Selfhosted

40443 readers
697 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS