notquitenothing

joined 3 months ago
[–] notquitenothing@sh.itjust.works 1 points 6 days ago* (last edited 6 days ago)

VoidAuth currently only supports 2FA through passkeys, and specifically requests 2FA passkeys from passkey providers. I may look into password + passkey but for now the only way to guarantee 2FA login is to make your account passkey-only. This is currently being tracked here: https://github.com/voidauth/voidauth/issues/106

[–] notquitenothing@sh.itjust.works 5 points 1 week ago (1 children)

I have never used Smallstep, but based on the documentation it looks like a native+id_token client. If you can get an error message or debug trace, you can sent it to me or open a GitHub issue and I will take a look at it πŸ™‚

😹 Let me know how it goes! If you have any trouble setting it up feel free to ping me, or open an issue on GitHub

 

VoidAuth is Single Sign-On for Your Self-Hosted Universe! πŸˆβ€β¬›πŸ”’

This is a smaller release; new features include adding a prompt for passkey creation when a user logs in with a password on a new device, account management options on the Profile Settings page, and a Sent Mail admin page where you can see what notifications the VoidAuth server has sent. Here is the changelog:

Features πŸš€

  • Sent Mail admin page πŸ“€
  • User Passkey and Password Account Management πŸ§‘β€πŸ’Ό
  • User Account Management: Delete Account 😡
  • Passkey Prompt After First Login πŸ”‘β“

On a personal note, thank you to the Fediverse community for taking an interest in this project. It is encouraging when you comment on a post, star on GitHub, open an issue, or otherwise engage. I created VoidAuth for my own use, but I really hope to be able to give back and make it into something useful to others.

Also I am accepting the part of myself that enjoys emojis, I don't care that it makes me look like an AI. Look out if I start using em-dashes though...

collapsed inline mediaMarge Simpson saying 'I just think they're neat.' while holding an emoji

 

VoidAuth is a self-hosted Single Sign-On solution that aims to be easy to setup and use while feeling seamless to your users. Release v1.1.0 brings a few new features I have been working on and am excited about:

  • Passkey-only Users, the option on sign-up to use a passkey instead of a password.
  • Admin Notification Emails, so admins know when they have new tasks such as user registrations to approve.
  • Approval Emails for New Users, so new users awaiting approval know when they have been.
  • DEFAULT_REDIRECT back to your main page for invitations, logouts, etc.
  • and more!
[–] notquitenothing@sh.itjust.works 14 points 1 month ago (2 children)

You can try VoidAuth, it is kinda similar to Authelia+lldap. I am the developer and I created it because I wasn’t satisfied with Authelia’s user management. If you decide you want to try it and run into any issues or questions I will try to help :)

[–] notquitenothing@sh.itjust.works 2 points 1 month ago* (last edited 1 month ago)

I don’t think you could do that directly in the Caddyfile, but you can create those groups/policies inside VoidAuth and assign them to users there.

The steps would be to (in VoidAuth) create the access group/policy, create the ProxyAuth Domain (protected.example.com/*) with the allowed group(s), make sure the user(s) have that group, then in Caddy add the forward_auth directive to the same route you want to protect.

Then when you go to access that route in a browser it will redirect you to VoidAuth login, or if you pass an Authentication header with Basic Auth (like when using an API) it will use that.

[–] notquitenothing@sh.itjust.works 13 points 1 month ago* (last edited 1 month ago) (2 children)

Developer of VoidAuth here, you could give that a try! If you have any issues or questions I can help :) VoidAuth

It does support basic_auth to ProxyAuth protected domains, so you can set up a user for that purpose. Docs for that are here: ProxyAuth

You can do this with VoidAuth as well, by setting the DB_NAME variable

[–] notquitenothing@sh.itjust.works 5 points 2 months ago (2 children)

VoidAuth is simpler to setup/use than Authentik for sure, but of course Authentik has more features. They both support proxy-auth, OIDC, and have user management UIs so in that way they are similar. I like VoidAuth for its simplicity but you can always run both and decide, if you have any questions about setup I will try to answer!

If you run into any issue during setup let me know! I am still working on the documentation so hopefully it is somewhat understandable πŸ˜†

[–] notquitenothing@sh.itjust.works 13 points 2 months ago (5 children)

I will make an issue for adding SQLite support, it has been on my mind for the same reasons. I would say don’t let the Postgres requirement stop you from trying it out. Modern hardware really doesn’t mind having multiple containerized postgresdb instances running, it can be very lightweight when idle.

I would not recommend using VoidAuth to anyone who needs to be any kind of security compliant. I am not a security professional and am using packages for the OIDC and other security heavy-lifting. I can recommend VoidAuth for those just looking for a simple but good looking auth app for securing their own selfhosted apps and resources.

 

A new open-source Single Sign-On (SSO) provider designed to simplify user and access management.

Features:

  • πŸ™‹β€β™‚οΈ User Management
  • 🌐 OpenID Connect (OIDC) Provider
  • πŸ”€ Proxy ForwardAuth Domains
  • πŸ“§ User Registration and Invitations
  • πŸ”‘ Passkey Support
  • πŸ” Secure Password Reset with Email Verification
  • 🎨 Custom Branding Options

Screenshot of the login portal:

collapsed inline media

view more: next β€Ί