Replies: 1 comment 4 replies
-
Before I say anything else, please don't mark this as an answer! I'm sure somebody else has a better idea... That's a good question -- if there is a way to make this work, then it is probably an approach that is specific to your IDP (so either Authelia or something similar). I don't think there is much that can be done on the copyparty side, assuming you specifically want to connect using an IDP account. However, one thing that should work currently, is to define a regular user in the copyparty config, while also using IDP at the same time. If you then allow users to connect "more directly" (meaning not through Authelia) in some way, perhaps with a separate subdomain in the reverse-proxy config, then they can authenticate with this copyparty-defined user. I'm sorry that my limited knowledge about IDP's such as Authelia makes this a bit fuzzy... So let's see if anyone else has a better answer :-) But I really like the idea of adding a warning-banner in the connect-page when IDP is enabled, so thank you for that! |
Beta Was this translation helpful? Give feedback.
-
I setup this awesome project with SSO with authelia and works great so far.
the only problem with that is that some functions dont work anymore or requirue workarounds of course.
to access everything programmaticly i just set for specific IPs the authelia rule to one_factor and use the Proxy-Authorization header without problem.
but as soon as i for example want to mount the webdav on windows or lets say any tool that dont give you an option to set special headers your screwed.
hopefully i missed something or some genius had found a solution for this :) And also maybe something that could be mentioned on the connect site as a disclaimer or so when using SSO :)
Beta Was this translation helpful? Give feedback.
All reactions