Replies: 1 comment 1 reply
-
|
@kapuett pangolin itself already is be an identity aware reverse proxy. why do you put authentik behind pangolin? is it just for tunneling reasons and to make it accessible publicly? also check this one: https://docs.goauthentik.io/install-config/reverse-proxy/ |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I am struggling with this problem:
server1is hosting different services, including Authentik (2025.10.3). All those services are reachable local only via TLS served by traefik with a wildcard domain cert*.example.com.vpsis publicly available in a different location and running Pangolin to accessserver1through newt. Pangolins traefik is configured to serve domainpangolin.gw.example.comand has a wildcard cert for*.gw.example.com.authentikwith URLhttps://authentik.gw.example.com. Target is the newt site withhttps://authentik.example.comon port 443. Setting Host and SNI Headers in Pangolinmakes the authentik dashboard reachable, but with message:
Browser devtools network tab reveals what seems to me like a wrong redirect:
I would expect
authentik.gw.example.comalso for the/apirequests instead ofauthentik.example.com. I found env varsAUTHENTIK_HOSTandAUTHENTIK_HOST_BROWSERbut they are only mentioned for outposts which I don't have.Did I forget to configure something? Is this even possible or is an outpost the right choice for this scenario?
Beta Was this translation helpful? Give feedback.
All reactions