Has anyone tried to configure authelia or authentik with a local nfty server, do you know any way to protect the web interface?

  • epsiblivion@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    if you’re using swag, you can just add to the ntfy container label, swag=enable if swag has auto-proxy enabled.

    • querylab@alien.topOPB
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      I don’t know what swag is, I currently use authelia with nginx proxy manager and it is impossible to use it with a local ntfy server, I have tried a thousand ways and ntfy https://ntfy.sh/ is not viable without a dashbord web interface protected by a user and pass

      • epsiblivion@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        you have to set the setting to make it reverse proxy aware. swag is a nginx based reverse proxy with a lot of builtin configs for various services and customizations.

        if you really don’t want anyone to access your topics, you can set default permissions to none and then manually allow per topic for each user (selfhosted ntfy)

        • querylab@alien.topOPB
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 months ago

          So I ask is there any way to password protect the ntfy dashboard on the server?

          • querylab@alien.topOPB
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            in fact i run ntfy server on docker on a vps tied with a cronjob but it scares me to think that anyone can manipulate and see my complete dashboard.

            • mztiq@alien.topB
              link
              fedilink
              English
              arrow-up
              1
              ·
              11 months ago

              Then use it through a VPN (e.g. WireGuard), that’s how I do it. Only expose services to the internet if you really have to.

              • querylab@alien.topOPB
                link
                fedilink
                English
                arrow-up
                1
                ·
                11 months ago

                I have it also in a vpn wireguard and I do portforwarding from a local machine using a vps bridge but the point is not that the point is that lan or wan should have an authentication panel is basic in any web application I do not understand how ntfy has not done that yet.

  • GregPL151@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    For sure set the authentication inside NTFY itself. In terms of protecting NTFY with Authelia that is what I did to allow iOS app to receive notifications and being able to see the messages in the app.

    Add below in Authelia configuration.yml

    - domain: ‘ntfy.example.com

    resources:

    - ‘^/yourtopic/json\?poll=1&’

    methods:

    - GET

    policy: bypass

    change domain to your NTFY hostname and ‘yourtopic’ to your topic name.

    I have a default config that protects everything else and bypass only this one so if you try to access your NTFY URL in the browser it will ask you to authenticate, but the iOS app will be able to do get the message from your NTFY server bypassing Authelia. Obviously, the topic itself requires built-in NTFY authentication so no one without the credentials cannot get the messages and no one can push new messages as well.

    Not sure how it would work with Android but you can protect your NTFY instance with Authelia and then see in nginx logs what URIs Android app is trying to reach and figure out what is required to get it work. Hope that helps a bit ;)

    • nicnic2001@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      So do you add ‘ntfy.example.com’ in your one/two_factor policies? And then a separate ‘ntfy.example.com’ with the resource regex for bypass policy?

      For example:

          - domain:
            - ntfy.example.com
            policy: two_factor
            subject:
            - ["group:admins"]
          
          - domain:
            - ntfy.example.com
            methods:
            - GET
            resources: '^/test([/?].*)?$'
            policy: bypass