website/integrations/documentation/snipe-it/index.md
A free open source IT asset/license management system.
:::caution This setup assumes you will be using HTTPS as Snipe-It dynamically generates the ACS and other settings based on the complete URL. :::
:::caution
In case something goes wrong with the configuration, you can use the URL http://inventory.company/login?nosaml to log in using the
built-in authentication.
:::
The following placeholders are used in this guide:
inventory.company is the FQDN of the snipe-it installation.authentik.company is the FQDN of the authentik installation.snipeit-user is the name of the authentik service account we will create.DC=ldap,DC=authentik,DC=io is the Base DN of the LDAP Provider (default):::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
In authentik, create a service account (under Directory/Users) for Snipe-IT to use as the LDAP Binder and take note of the password generated.
In this example, we'll use snipeit-user as the Service account's username
:::info If you didn't keep the password, you can copy it from Directory/Tokens & App password. :::
In authentik, create a LDAP Provider (under Applications/Providers) with these settings :
DC=ldap,DC=goauthentik,DC=ioauthentik Self-signed CertificateIn authentik, create an application (under Resources/Applications) with these settings :
In authentik, create an outpost (under Applications/Outposts) of type LDAP that uses the LDAP Application you created in Step 3.
Configure Snipe-IT LDAP settings by going to settings (the gear icon), and selecting LDAP
Change the following fields
ldap://authentik.companycn=snipeit-user,ou=users,dc=ldap,dc=goauthentik,dc=io<snipeit-user password from step 2>ou=users,DC=ldap,DC=goauthentik,DC=io
:::info
ou=users is the default OU for users. If you are using authentik's virtual groups, or have your users in a different organizational unit (ou), change accordingly.
::::::info authentik does not support other LDAP attributes like Employee Number, Department, etc out of the box. If you need these fields, you will need to setup custom attributes. :::
Save your config, then click on Test LDAP Synchronization. This does not import any users, just verifies everything is working and the account can search the directory.
To test your settings, enter a username and password and click Test LDAP.
You must sync your LDAP database with Snipe-IT. Go to People on the sidebar menu.
LDAP SyncCreate another application in authentik and note the slug you choose, as this will be used later. In the Admin Interface, go to Applications ->Providers. Create a SAML provider with the following parameters:
https://inventory.company/saml/acshttps://inventory.companyPosthttps://inventory.companyAfter saving your new Application and Provider, go to Applications/Providers and select your newly created Provider.
Either copy the information under SAML Metadata, or click the Download button under SAML Metadata
Configure Snipe-IT SAML settings by going to settings (the gear icon), and selecting SAML
Select File and select the file you downloaded in Step 2All other field can be left blank.