4.0 KiB
title | description | summary | date | draft | images | weight | toc | support | seo | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Synology DSM | Integrating Synology DSM with the Authelia OpenID Connect 1.0 Provider. | 2022-10-18T21:22:13+11:00 | false | 620 | true |
|
|
Tested Versions
- Authelia
- Synology DSM
- v7.1
- v7.2
{{% oidc-common %}}
Specific Notes
{{< callout context="caution" title="Important Note" icon="outline/alert-triangle" >}}
Synology DSM does not support automatically creating users via OpenID Connect 1.0. It is therefore
recommended that you ensure Authelia and Synology DSM share an LDAP server (for DSM v7.1).
With DSM v7.2+ you have the possibility to also use local DSM accounts (see Account type
below) and do not need to set
up a shared LDAP.
{{< /callout >}}
Assumptions
This example makes the following assumptions:
- Application Root URL:
https://dsm.{{< sitevar name="domain" nojs="example.com" >}}/
- Authelia Root URL:
https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/
- Client ID:
synology-dsm
- Client Secret:
insecure_secret
Some of the values presented in this guide can automatically be replaced with documentation variables.
{{< sitevar-preferences >}}
Configuration
Authelia
The following YAML configuration is an example Authelia client configuration for use with Synology DSM which will operate with the application example:
identity_providers:
oidc:
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
## See: https://www.authelia.com/c/oidc
clients:
- client_id: 'synology-dsm'
client_name: 'Synology DSM'
client_secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
public: false
authorization_policy: 'two_factor'
redirect_uris:
- 'https://dsm.{{< sitevar name="domain" nojs="example.com" >}}'
scopes:
- 'openid'
- 'profile'
- 'groups'
- 'email'
userinfo_signed_response_alg: 'none'
token_endpoint_auth_method: 'client_secret_post'
Application
To configure Synology DSM to utilize Authelia as an OpenID Connect 1.0 Provider:
- Go to DSM.
- Go to
Control Panel
. - Go To
Domain/LDAP
. - Go to
SSO Client
. - Check the
Enable OpenID Connect SSO service
checkbox in theOpenID Connect SSO Service
section. - Configure the following values:
- Profile:
OIDC
- Account type:
Domain/LDAP/local
(Note: Account type is supported DSM v7.2+) - Name:
Authelia
- Well Known URL:
https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/.well-known/openid-configuration
- Application ID:
synology-dsm
- Application Key:
insecure_secret
- Redirect URL:
https://dsm.{{< sitevar name="domain" nojs="example.com" >}}
- Authorisation Scope:
openid profile groups email
- Username Claim:
preferred_username
- Save the settings.
{{< figure src="client.png" alt="Synology" width="736" >}}