## Version 2024/03/14 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/authelia-location.conf.sample # Make sure that your authelia container is in the same user defined bridge network and is named authelia # Rename /config/nginx/proxy-confs/authelia.subdomain.conf.sample to /config/nginx/proxy-confs/authelia.subdomain.conf # For authelia 4.37 and below, make sure that the authelia configuration.yml has 'path: "authelia"' defined # For authelia 4.38 and above, make sure that the authelia configuration.yml has 'address: "tcp://:9091/authelia"' defined ## Send a subrequest to Authelia to verify if the user is authenticated and has permission to access the resource ## For authelia 4.37 and below, use the following line # auth_request /authelia/api/verify; ## For authelia 4.38 and above, use the following line auth_request /authelia/api/authz/auth-request; ## If the subreqest returns 200 pass to the backend, if the subrequest returns 401 redirect to the portal error_page 401 = @authelia_proxy_signin; ## Translate the user information response headers from the auth subrequest into variables auth_request_set $email $upstream_http_remote_email; auth_request_set $groups $upstream_http_remote_groups; auth_request_set $name $upstream_http_remote_name; auth_request_set $user $upstream_http_remote_user; ## Inject the user information into the request made to the actual upstream proxy_set_header Remote-Email $email; proxy_set_header Remote-Groups $groups; proxy_set_header Remote-Name $name; proxy_set_header Remote-User $user; ## Translate the Set-Cookie response header from the auth subrequest into a variable auth_request_set $set_cookie $upstream_http_set_cookie; ## Translate the Location response header from the auth subrequest into a variable auth_request_set $signin_url $upstream_http_location;