Back to Authelia

Glitchtip

docs/content/integration/openid-connect/clients/glitchtip/index.md

4.39.193.2 KB
Original Source

Tested Versions

{{% oidc-common %}}

Assumptions

This example makes the following assumptions:

  • Application Root URL: https://glitchtip.{{< sitevar name="domain" nojs="example.com" >}}/
  • Authelia Root URL: https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/
  • Client ID: glitchtip
  • Client Secret: insecure_secret

Some of the values presented in this guide can automatically be replaced with documentation variables.

{{< sitevar-preferences >}}

Configuration

The following instructions assume you've setup a Django Admin / Super User. See the Django Admin guide for more information.

Authelia

The following YAML configuration is an example Authelia client configuration for use with Glitchtip which will operate with the application example:

yaml
identity_providers:
  oidc:
    ## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
    ## See: https://www.authelia.com/c/oidc
    clients:
      - client_id: 'glitchtip'
        client_name: 'Glitchtip'
        client_secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng'  # The digest of 'insecure_secret'.
        public: false
        authorization_policy: 'two_factor'
        require_pkce: false
        pkce_challenge_method: ''
        redirect_uris:
          - 'https://glitchtip.{{< sitevar name="domain" nojs="example.com" >}}/accounts/authelia/login/callback/'
        scopes:
          - 'openid'
          - 'email'
          - 'profile'
        response_types:
          - 'code'
        grant_types:
          - 'authorization_code'
        access_token_signed_response_alg: 'none'
        userinfo_signed_response_alg: 'none'
        token_endpoint_auth_method: 'client_secret_basic'

Application

To configure Glitchtip there is one method, using the Web GUI.

Web GUI

To configure Glitchtip to utilize Authelia as an OpenID Connect 1.0 Provider, use the following instructions:

  1. Visit https://glitchtip.{{< sitevar name="domain" nojs="example.com" >}}/admin/socialaccount/socialapp/.
  2. Click Add Social Application.
  3. Configure the following options:
    • Provider: OpenID Connect
    • Provider ID: authelia
    • Provider Name: Authelia
    • Client ID: glitchtip
    • Secret Key: insecure_secret
    • Settings: {"server_url":"https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/.well-known/openid-configuration"}
  4. Press Save at the bottom.

See Also