Advanced Search
Search Results
8 total results found
SSH Agent for Passphrase Management
SSH Agent is a background process that keeps your keys unlocked during your session. Start the agent and add keys: eval "$(ssh-agent -s)" ssh-add ~/.ssh/id_rsa_work ssh-add ~/.ssh/id_rsa_personal Per each key added to ssh you will need to type a phras...
Disable Password Login
Once we have ssh key setup we can disable password login on servers once keys are set up. This way our server and services are more secure. SSH to server Edit sshd_config file sudo nano /etc/ssh/sshd_config Set Authentication to No PasswordAuthent...
Authentik Passwordless Login
Passwordless Login in Authentik allows us to login using passkey instead of password. This option provides higher security and faster authentication. At the moment Passwordless Authentication only supposts WebAuth devicees (tokens, yubkey, 1password passkey)....
Authentik OAuth/ OIDC Setup - Portainer
Authentik uses many ways to connect to services, one being OAuth or Open ID Connect. This method is widely used on many services, such as Portainer. Please follow Authentik and Portainer documentation Portainer OAuth Setup Documentation Authentik Portaine...
Authentik Docker Compose Install
Authentik is an open-source Identity Provider (IdP) that helps you manage authentication and authorization across your apps and infrastructure. It supports: Single Sign-On (SSO) via OAuth2, OpenID Connect, SAML LDAP & SCIM integration Multi-factor authent...
Authentik OAuth/ OIDC Setup - Home Assistnat
Authentik uses many ways to connect to services, one being OAuth or Open ID Connect. This method is widely used on many services, such as Home Assistant. Home Assistant doesn't have native Open ID Connection, so we will need to use HACS for setup Please follo...
Managing Multiple SSH Keys
If you use different keys for different servers or services (e.g., GitHub, work, personal), here’s how to keep it organized. Using different keys for different services makes things way more organized and secure. This way if one key gets compromised, you only ...
SSH Key Authentication Create and Share
Why SSH Keys are Important? SSH keys use asymmetric encryption—a public key is placed on the server, and a private key stays on your device. Benefits over Passwords Security: Keys are far more resistant to brute-force attacks than passwords Convenience: ...