Identity Management¶
This guide covers deploying identity and secrets management using Authentik and VaultWarden.
Components¶
| Service | Purpose |
|---|---|
| Authentik | Identity provider, SSO, user management |
| VaultWarden | Password and secrets management |
Prerequisites¶
- CICD Mothership operational
- DNS management access
- Reverse proxy configured
DNS Configuration¶
Register the services with your DNS provider:
| Record | Type | Value |
|---|---|---|
authentik.yourdomain.com | A | Your public IP |
vaultwarden.yourdomain.com | A | Your public IP |
Reverse Proxy Setup¶
Configure Caddy routing in OPNsense:
Authentik Route¶
VaultWarden Route¶
Installation¶
Deploy Identity VM¶
From the tappaas-cicd VM:
This creates a VM with both Authentik and VaultWarden pre-configured.
Firewall Rules¶
Create firewall rules in OPNsense:
| Source | Destination | Port | Protocol | Action |
|---|---|---|---|---|
| Caddy | identity.mgmt.internal | 80 | TCP | Allow |
| Caddy | identity.mgmt.internal | 8080 | TCP | Allow |
Authentik Configuration¶
Initial Setup¶
Access Authentik at https://authentik.yourdomain.com/if/flow/initial-setup/
- Create the admin account
- Set a strong password
- Complete the setup wizard
Configure Applications¶
For each TAPPaaS service requiring authentication:
- Navigate to Applications → Applications
- Click Create
- Configure the application settings
- Set up the appropriate provider (OAuth2, SAML, etc.)
User Management¶
Create users and groups:
- Navigate to Directory → Users
- Create users as needed
- Assign to appropriate groups
VaultWarden Configuration¶
Initial Access¶
Access VaultWarden at https://vaultwarden.yourdomain.com
Create Admin Account¶
- Register a new account
- Set a strong master password
- Enable admin features if needed
Organization Setup¶
For team usage:
- Create an organization
- Invite team members
- Set up shared collections
Integration¶
Authentik + VaultWarden SSO¶
Configure VaultWarden to use Authentik for SSO:
- In Authentik, create an OAuth2 provider for VaultWarden
- Configure VaultWarden's SSO settings
- Test the authentication flow
Service Integration¶
Connect other TAPPaaS services to Authentik:
# Example: n8n OAuth configuration
N8N_AUTH_OAUTH2_CLIENT_ID: "your-client-id"
N8N_AUTH_OAUTH2_CLIENT_SECRET: "your-client-secret"
N8N_AUTH_OAUTH2_AUTHORIZE_URL: "https://authentik.yourdomain.com/application/o/authorize/"
N8N_AUTH_OAUTH2_ACCESS_TOKEN_URL: "https://authentik.yourdomain.com/application/o/token/"
Backup¶
Both services store critical data - ensure backups are configured:
Authentik Backup¶
Authentik data is stored in PostgreSQL. The PBS backup includes the VM's database.
VaultWarden Backup¶
VaultWarden stores data in SQLite. Additional export is recommended:
Verification¶
Test the identity system:
# Check Authentik health
curl -f https://authentik.yourdomain.com/-/health/ready/
# Check VaultWarden health
curl -f https://vaultwarden.yourdomain.com/alive
Security Recommendations¶
- Enable MFA for all admin accounts
- Use strong, unique passwords
- Regularly audit user access
- Keep services updated
- Monitor authentication logs
Next Steps¶
Complete the foundation with Security hardening.