Replies: 2 comments
-
Hi @ovizii, What you can do is use the headers-configuration to pass some custom headers to the upstream service. If you want to use basic auth you can theoretically do that by just setting the Unfortunately i don't have much experience with PocketID and i think PocketID doesn't even store a single password. I think it's using Passkeys exclusively. |
Beta Was this translation helpful? Give feedback.
-
Thanks for taking the time to reply. I am quite unfamiliar with the topic if authentication so I might mix some terms up very badly :-/
That is correct. Unfortunately I didn't find docs on how backrest does this, so I do not know what headers it expects. I tried passing the authorization headers through, just to see what happens.
And the result was backrest telling me:
The result is, that I disabled authentication within backrest completely as it is a single-user app and its port is not exposed s othe onyl way to access it is via traefik and pocket-id with traefik-oidc-auth protect me here so it is not important to pass on the user to backrest. |
Beta Was this translation helpful? Give feedback.
-
I am busy migrating from authentik to pocket-id. With authentik, I could pass basic auth through forward-auth to an application expecting basic auth. I am specifically looking to make backrest work - a workaround would be to completely disable auth in backrest and rely on traefik-oidc-auth + pocket-id in front of it.
I might be better off asking this question in the pocket-id space but since I know the author here is also knowledgeable about pocket-id, I'm trying my luck here first.
Here is the description on how it works with authentik: garethgeorge/backrest#129 (comment)
Not sure if this can be made to work with traefik-oidc-auth + pocket-id - I don't know enough about hte subject.
Beta Was this translation helpful? Give feedback.
All reactions