Replies: 2 comments
-
Did you figure this out? |
Beta Was this translation helpful? Give feedback.
-
I encountered the same issue and found this discussion. I think I've managed to solve it in combination with Authelia! This is what I did:
My umami script is The result of playing around it that everything except both resources are not under login. My access_control config in Authelia looks like this:
The stuff above is saying that all internal IP's are allowed to access all subdomains. The IP's from outside my network should login when an subdomain is requested (and configured in NPM that they should login) In my case only Under advanced in NPM I'm using (as in including) the Authelia snippets to force access. I'm doing it like this:
The snippets can be found in the Authelia docs. Hope this helps a little to point you in the right direction. In my case... thanks for the idea of using Authelia to block access to the umami login page. I did not thought about that route to add security to the login page 😞 |
Beta Was this translation helpful? Give feedback.
-
I have Umami running in Docker. The admin page is behind NginX proxy manager so I can access it remotely. At the moment, if someone types umami.domainname.com, they can get to Umami's login page.
I want to force such visits to go through Authelia's 2FA.
When I activate that in Authelia and NginX proxy manager everything works fine and the visitor is forced to go through Authelia's authentication before accessing Umami's log in page. The problem is that once this starts working, visits cannot get tracked.
I've read that I need to add something that mentions the API, but I have no idea how that would work. This is an extract (sample) from the configuration.yml I have:
But it's not working (meaning visits don't get tracked).
Can someone help me with the last line of the above please? What does it need to say there?
Beta Was this translation helpful? Give feedback.
All reactions