website/integrations: Add Provider/PowerDNS-Admin (#1826)
* docs: add integration docs for powerdns-admin * docs: add integration docs for powerdns-admin
This commit is contained in:
parent
dad8547212
commit
f1e95b8816
|
@ -0,0 +1,71 @@
|
||||||
|
---
|
||||||
|
title: PowerDNS-Admin
|
||||||
|
---
|
||||||
|
|
||||||
|
## What is PowerDNS-Admin
|
||||||
|
|
||||||
|
From https://github.com/ngoduykhanh/PowerDNS-Admin
|
||||||
|
|
||||||
|
:::note
|
||||||
|
A PowerDNS web interface with advanced features.
|
||||||
|
:::
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `pdns-admin.company` is the FQDN of the PowerDNS-Admin install.
|
||||||
|
- `authentik.company` is the FQDN of the authentik install.
|
||||||
|
|
||||||
|
Create a SAML provider with the following parameters:
|
||||||
|
|
||||||
|
- ACS URL: `https://pdns-admin.company/saml/authorized`
|
||||||
|
- Issuer: `https://authentik.company`
|
||||||
|
- Service Provider Binding: `Post`
|
||||||
|
- Audience: `pdns-admin`
|
||||||
|
- Signing Keypair: Select any certificate you have.
|
||||||
|
- Property mappings: Select all Managed mappings.
|
||||||
|
|
||||||
|
You can of course use a custom signing certificate, and adjust durations.
|
||||||
|
|
||||||
|
## PowerDNS-Admin
|
||||||
|
|
||||||
|
You need to set the following `env` Variables for Docker based installations.
|
||||||
|
|
||||||
|
Set the following values:
|
||||||
|
|
||||||
|
```env
|
||||||
|
SAML_ENABLED=True
|
||||||
|
SAML_PATH=os.path.join(os.path.dirname(file), 'saml')
|
||||||
|
SAML_METADATA_URL=https://authentik.company/api/v3/providers/saml/<provider-id>/metadata/?download
|
||||||
|
SAML_METADATA_CACHE_LIFETIME=1
|
||||||
|
SAML_LOGOUT_URL=https://authentik.company/if/session-end/<application-slug>/
|
||||||
|
SAML_SP_ENTITY_ID=pdns-admin
|
||||||
|
SAML_SP_CONTACT_NAME=me
|
||||||
|
SAML_SP_CONTACT_MAIL=me
|
||||||
|
SAML_NAMEID_FORMAT=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
|
||||||
|
SAML_ATTRIBUTE_USERNAME=http://schemas.goauthentik.io/2021/02/saml/username
|
||||||
|
SAML_ATTRIBUTE_NAME=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
||||||
|
SAML_ATTRIBUTE_EMAIL=http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
|
||||||
|
SAML_ATTRIBUTE_GROUP=http://schemas.xmlsoap.org/claims/Group
|
||||||
|
SAML_GROUP_ADMIN_NAME=<admin-group-name>
|
||||||
|
SAML_SIGN_REQUEST='False'
|
||||||
|
SAML_ASSERTION_ENCRYPTED=False
|
||||||
|
SAML_WANT_MESSAGE_SIGNED=False
|
||||||
|
SAML_CERT=/saml.crt
|
||||||
|
```
|
||||||
|
|
||||||
|
You must mount the certificate selected in authentik as a file in the Docker container. The path in the container must match the path in the env variable `SAML_CERT`.
|
||||||
|
|
||||||
|
### docker-compose
|
||||||
|
```yaml
|
||||||
|
version: '3.3'
|
||||||
|
services:
|
||||||
|
powerdns-admin:
|
||||||
|
image: ngoduykhanh/powerdns-admin:latest
|
||||||
|
restart: always
|
||||||
|
ports:
|
||||||
|
- 80:80
|
||||||
|
volumes:
|
||||||
|
- ./saml.crt:/saml.crt:ro
|
||||||
|
```
|
|
@ -41,6 +41,7 @@ module.exports = {
|
||||||
"services/onlyoffice/index",
|
"services/onlyoffice/index",
|
||||||
"services/opnsense/index",
|
"services/opnsense/index",
|
||||||
"services/portainer/index",
|
"services/portainer/index",
|
||||||
|
"services/powerdns-admin/index",
|
||||||
"services/proxmox-ve/index",
|
"services/proxmox-ve/index",
|
||||||
"services/rancher/index",
|
"services/rancher/index",
|
||||||
"services/sentry/index",
|
"services/sentry/index",
|
||||||
|
|
Reference in New Issue