mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-16 15:36:36 +00:00
* Add backend service configuration guide for reverse proxy trusted proxies Many self-hosted services (Jellyfin, Home Assistant, Nextcloud, Plex) require a "trusted proxies" or "known hosts" setting when behind a reverse proxy. With NetBird, the proxy's IP is a dynamic NetBird IP from 100.64.0.0/10 that can change on restart, so hardcoding it breaks. This adds a new doc page with the recommended solution (trust the full CGNAT range), per-service config examples, Docker bridge network guidance, and a warning on the reverse proxy overview page. * Update service-configuration.mdx and move/add images * Fixing typos --------- Co-authored-by: Brandon Hopkins <brandon@techhut.tv>
164 lines
9.3 KiB
Plaintext
164 lines
9.3 KiB
Plaintext
import {Note} from "@/components/mdx"
|
|
|
|
export const description =
|
|
'Configure SSO, password, and PIN authentication methods for NetBird Reverse Proxy services to control who can access your exposed applications.'
|
|
|
|
# Reverse Proxy Authentication
|
|
|
|
NetBird Reverse Proxy supports multiple authentication methods to control who can access your exposed services. You can enable one or more methods on each service, or leave a service completely public. Authentication is configured per service in the **Authentication** tab when creating or editing a service.
|
|
|
|
<p>
|
|
<img src="/docs-static/img/manage/reverse-proxy/authentication/reverse-proxy-add-service-auth.png" alt="Authentication tab showing all available authentication methods" className="imagewrapper"/>
|
|
</p>
|
|
|
|
## Authentication methods
|
|
|
|
NetBird offers three authentication methods, each suited to different access patterns. You can enable any combination of them on a single service.
|
|
|
|
### SSO (Single Sign-On)
|
|
|
|
SSO authentication requires users to authenticate through your identity provider (IdP) using OIDC before they can access the service. When a user visits the service URL, they are redirected to your IdP login page. After successful authentication, they are granted access to the service.
|
|
|
|
You can optionally restrict access to specific **distribution groups** from your IdP. When groups are configured, only users who belong to at least one of the selected groups are allowed through after authenticating.
|
|
|
|
<p>
|
|
<img src="/docs-static/img/manage/reverse-proxy/authentication/auth-sso-modal.png" alt="SSO configuration modal with group selection" className="imagewrapper"/>
|
|
</p>
|
|
|
|
**Key details:**
|
|
|
|
- Users authenticate via your existing identity provider (OIDC)
|
|
- Sessions last **24 hours** before re-authentication is required
|
|
- Optionally restrict access to specific distribution groups synced from your IdP
|
|
- When no groups are selected, any authenticated user in your organization can access the service
|
|
|
|
<Note>
|
|
**Self-hosted deployments:** SSO authentication uses whichever OIDC provider is configured in your management server. If you use the built-in embedded IdP, SSO works automatically. If you use an external identity provider (Auth0, Okta, Keycloak, etc.) without the embedded IdP, you must register the reverse proxy callback URL with your IdP before SSO will work. See the [Enable Reverse Proxy migration guide](/selfhosted/migration/enable-reverse-proxy#configure-sso-for-external-identity-providers) for step-by-step instructions.
|
|
</Note>
|
|
|
|
**Best for:** Team services where you want to leverage existing identity management, internal tools that require user-level accountability, and services where you need group-based access control.
|
|
|
|
### Password
|
|
|
|
Password authentication protects a service with a shared password that you define. When a user visits the service URL, they are prompted to enter the password before they can proceed. Passwords are securely hashed using **Argon2id** on the backend - the plaintext password is never stored.
|
|
|
|
<p>
|
|
<img src="/docs-static/img/manage/reverse-proxy/authentication/auth-password-modal.png" alt="Password configuration modal" className="imagewrapper"/>
|
|
</p>
|
|
|
|
**Key details:**
|
|
|
|
- Set a shared password when configuring the service
|
|
- Users must enter the correct password to access the service
|
|
- Passwords are hashed with Argon2id before being stored
|
|
- Sessions last **24 hours** before re-authentication is required
|
|
|
|
**Best for:** Simple shared access to internal tools, staging environments, or services shared with external partners who do not have accounts in your identity provider.
|
|
|
|
### PIN Code
|
|
|
|
PIN code authentication works similarly to password authentication but is limited to numeric input. When a user visits the service URL, they are prompted to enter the PIN code. PINs are securely hashed using **Argon2id** on the backend, just like passwords.
|
|
|
|
<p>
|
|
<img src="/docs-static/img/manage/reverse-proxy/authentication/auth-pin-modal.png" alt="PIN Code configuration modal" className="imagewrapper"/>
|
|
</p>
|
|
|
|
**Key details:**
|
|
|
|
- Set a numeric PIN code when configuring the service
|
|
- Users must enter the correct PIN to access the service
|
|
- PINs are hashed with Argon2id before being stored
|
|
- Sessions last **24 hours** before re-authentication is required
|
|
|
|
**Best for:** Quick access scenarios, kiosk-style interfaces, or situations where a simple numeric code is easier to share than a full password.
|
|
|
|
### No authentication (public access)
|
|
|
|
Services can also be configured without any authentication. When no authentication method is enabled, anyone with the service URL can access it without any restrictions.
|
|
|
|
<Note>
|
|
When you save a service with no authentication configured, the dashboard displays a warning: **"This service will be publicly accessible to everyone on the internet without any restrictions."** You must confirm before the service is saved. Make sure this is intentional before proceeding.
|
|
</Note>
|
|
|
|
<p>
|
|
<img src="/docs-static/img/manage/reverse-proxy/authentication/auth-no-auth-warning.png" alt="Warning dialog displayed when saving a service without authentication" className="imagewrapper"/>
|
|
</p>
|
|
|
|
**Best for:** Public-facing websites, APIs that handle their own authentication internally, or services that are intentionally open to the internet.
|
|
|
|
## Combining authentication methods
|
|
|
|
You can enable multiple authentication methods on a single service simultaneously. When more than one method is active, users can authenticate using **any** of the enabled methods - they choose which one to use when accessing the service.
|
|
|
|
For example, you could enable both **SSO** and **Password** on the same service. Team members who have accounts in your identity provider can authenticate with SSO, while external partners or contractors can use a shared password. This gives you flexibility without requiring everyone to be in your IdP.
|
|
|
|
Common combinations include:
|
|
|
|
| Combination | Use case |
|
|
|-------------|----------|
|
|
| **SSO + Password** | Team members use SSO; external collaborators use a shared password |
|
|
| **SSO + PIN Code** | Team members use SSO; quick access via PIN for specific scenarios |
|
|
| **Password + PIN Code** | Different shared credentials for different groups of users |
|
|
| **SSO + Password + PIN Code** | Maximum flexibility with all methods available |
|
|
|
|
## Configuring authentication
|
|
|
|
All authentication settings are managed in the **Authentication** tab of the service creation or edit modal. Navigate to **Reverse Proxy** > **Services**, then either click **Add Service** to create a new service or click an existing service to edit it.
|
|
|
|
### Setting up SSO
|
|
|
|
1. Open the service modal (create or edit).
|
|
2. Switch to the **Authentication** tab.
|
|
3. Click **SSO (Single Sign-On)**.
|
|
4. Enable SSO using the toggle.
|
|
5. Optionally, select one or more **distribution groups** to restrict access to specific users. If no groups are selected, all authenticated users in your organization can access the service.
|
|
6. Click **Save** (or **Save Changes** when editing).
|
|
|
|
<Note>
|
|
Distribution groups are synced from your identity provider. If you do not see the groups you expect, check your [IdP sync configuration](/manage/team/idp-sync) or [Single Sign-On setup](/manage/team/single-sign-on).
|
|
</Note>
|
|
|
|
### Setting up a password
|
|
|
|
1. Open the service modal (create or edit).
|
|
2. Switch to the **Authentication** tab.
|
|
3. Click **Password**.
|
|
4. Enter a password in the input field.
|
|
5. Click **Save** (or **Save Changes** when editing).
|
|
|
|
### Setting up a PIN code
|
|
|
|
1. Open the service modal (create or edit).
|
|
2. Switch to the **Authentication** tab.
|
|
3. Click **PIN Code**.
|
|
4. Enter a numeric PIN in the input field.
|
|
5. Click **Save** (or **Save Changes** when editing).
|
|
|
|
### Removing authentication
|
|
|
|
To remove an authentication method from a service:
|
|
|
|
1. Open the service modal by clicking the service in the services list.
|
|
2. Switch to the **Authentication** tab.
|
|
3. Click on the authentication method you want to remove.
|
|
4. Use the **Remove** option to disable it.
|
|
5. Click **Save Changes**.
|
|
|
|
If you remove all authentication methods, the service becomes publicly accessible. The dashboard will display a warning before saving, as described in the [No authentication](#no-authentication-public-access) section above.
|
|
|
|
## Session management
|
|
|
|
Authenticated sessions for reverse proxy services are managed using JWT (JSON Web Token) technology. Here is how sessions work:
|
|
|
|
- **Token signing:** Sessions use JWT tokens signed with **Ed25519** key pairs. Each service has its own unique key pair, ensuring that tokens for one service cannot be used to access another.
|
|
- **Session duration:** Authenticated sessions expire after **24 hours**. After expiry, users must re-authenticate using whichever method they originally used.
|
|
- **Scope:** Sessions are scoped to individual services. Authenticating with one service does not grant access to other services, even if they use the same authentication method.
|
|
|
|
## Related pages
|
|
|
|
- [Reverse Proxy Overview](/manage/reverse-proxy) - learn how the reverse proxy feature works and create your first service
|
|
- [Custom Domains](/manage/reverse-proxy/custom-domains) - configure your own domain names for reverse proxy services
|
|
- [Access Logs](/manage/reverse-proxy/access-logs) - monitor and audit traffic to your reverse proxy services
|
|
- [Single Sign-On](/manage/team/single-sign-on) - configure your identity provider for SSO across NetBird
|
|
- [Provision Users and Groups](/manage/team/idp-sync) - sync users and groups from your identity provider
|