diff --git a/manuscript/docker-swarm/traefik-forward-auth/dex-static.md b/manuscript/docker-swarm/traefik-forward-auth/dex-static.md index c637106..4434fd0 100644 --- a/manuscript/docker-swarm/traefik-forward-auth/dex-static.md +++ b/manuscript/docker-swarm/traefik-forward-auth/dex-static.md @@ -1,8 +1,8 @@ --- -title: Secure Traefik using Dex +title: SSO with traefik forward auth and Dex description: Traefik forward auth needs an authentication backend, but if you don't want to use a cloud provider, you can setup your own simple backend, using Dex. --- -# Using Traefik Forward Auth with Dex (Static) +# Traefik Forward Auth for SSO with Dex (Static) [Traefik Forward Auth](/docker-swarm/traefik-forward-auth/) is incredibly useful to secure services with an additional layer of authentication, provided by an OIDC-compatible provider. The simplest possible provider is a self-hosted instance of [CoreOS's Dex](https://github.com/dexidp/dex), configured with a static username and password. This recipe will "get you started" with Traefik Forward Auth, providing a basic authentication layer. In time, you might want to migrate to a "public" provider, like [Google][tfa-google], or GitHub, or to a [KeyCloak][keycloak] installation. diff --git a/manuscript/docker-swarm/traefik-forward-auth/google.md b/manuscript/docker-swarm/traefik-forward-auth/google.md index 2876e62..51a06fe 100644 --- a/manuscript/docker-swarm/traefik-forward-auth/google.md +++ b/manuscript/docker-swarm/traefik-forward-auth/google.md @@ -1,8 +1,8 @@ --- -title: Secure Traefik with Google Auth -description: Using Traefik Forward Auth, you can selectively secure your Docker services, using Google as your authentication backend! +title: SSO with traefik forward auth with Google Oauth2 +description: Using Traefik Forward Auth, you can selectively apply SSO to your Docker services, using Google Oauth2 as your authentication backend! --- -# Traefik Forward Auth using Google +# Traefik Forward Auth using Google Oauth2 for SSO [Traefik Forward Auth][tfa] is incredibly useful to secure services with an additional layer of authentication, provided by an OIDC-compatible provider. The simplest possible provider is a self-hosted instance of [Dex][tfa-dex-static], configured with a static username and password. This is not much use if you want to provide "normies" access to your services though - a better solution would be to validate their credentials against an existing trusted public source. diff --git a/manuscript/docker-swarm/traefik-forward-auth/keycloak.md b/manuscript/docker-swarm/traefik-forward-auth/keycloak.md index 4913be5..6f1619f 100644 --- a/manuscript/docker-swarm/traefik-forward-auth/keycloak.md +++ b/manuscript/docker-swarm/traefik-forward-auth/keycloak.md @@ -1,8 +1,8 @@ --- -title: Secure Traefik using Keycloak -description: Traefik forward auth can selectively secure your Docker services against an authentication backend, and Keycloak is a perfect, self-hosted match. +title: SSO with traefik forward auth with Keycloak +description: Traefik forward auth can selectively SSO your Docker services against an authentication backend, and Keycloak is a perfect, self-hosted match. --- -# Using Traefik Forward Auth with KeyCloak +# Traefik Forward Auth with KeyCloak for SSO While the [Traefik Forward Auth](/docker-swarm/traefik-forward-auth/) recipe demonstrated a quick way to protect a set of explicitly-specified URLs using OIDC credentials from a Google account, this recipe will illustrate how to use your own KeyCloak instance to secure **any** URLs within your DNS domain. diff --git a/netlify_redirects.txt b/netlify_redirects.txt index 514d440..2636d26 100644 --- a/netlify_redirects.txt +++ b/netlify_redirects.txt @@ -15,3 +15,10 @@ https://geek-cookbook.funkypenguin.co.nz/recipies/* https://geek-cookbook.funkyp # Prefer "docker-swarm" to "ha-docker-swarm" /ha-docker-swarm/* /docker-swarm/:splat 301! +# Old backlinks which we need to redirect to working URLs +/kubernetes/start/ /kubernetes/ 301! +/kubernetes/diycluster/ /kubernetes/cluster/ 301! +/recipes/autopirate/mylarr/ recipes/autopirate/mylar/ 301! + + +