convert pgn into webp + start hugo migration article
All checks were successful
Build Blog Docker Image / build docker (push) Successful in 1m1s

This commit is contained in:
2024-02-20 20:12:33 +01:00
parent b2a0e46d4e
commit 052a6334cb
20 changed files with 207 additions and 51 deletions

View File

@ -28,7 +28,7 @@ First of all, let's start by installing and configuring the docker. For that you
In my case I use Unraid and a template is directly available. I just have to set the port to use for the web interface.
![Unraid docker setup](img/image-1.png)
![Unraid docker setup](img/image-1.webp)
Before launching the docker we will have to make several changes to the configuration file.
@ -104,7 +104,7 @@ docker run --rm authelia/authelia:latest authelia hash-password 'yourpassword'
If this does not work you can manually create the hash using this [site](https://argon2.online) and these parameters:
![Argon2 hash generator](img/image-2.png)
![Argon2 hash generator](img/image-2.webp)
### Access control
For the access policy we will do something simple with a single role. But nothing prevents you from creating several roles with different rights and access.
@ -284,17 +284,17 @@ real_ip_recursive on;
Then you can add it in the `Advanced` tab of the desired subdomain:
![NginxProxyManager new proxy host advanced options](img/image-3.png)
![NginxProxyManager new proxy host advanced options](img/image-3.webp)
After saving, go to the address of your subdomain to verify that it works. You should arrive on the following page:
![Authelia login page](img/image-4.png)
![Authelia login page](img/image-4.webp)
You can connect with one of the credencials you created in the `users_database.yml` file. Once the connection is done, you should be redirected to the application hosted on the subdomain!
To configure/modify the double authentication method, go to the subdomain you have configured for Authelia (`ex. auth.youdomain.com`). Then select `Methods`:
![Authelia 2FA modal](img/image-5.png)
![Authelia 2FA modal](img/image-5.webp)
## Conclusion