|
|
3 months ago | |
|---|---|---|
| .. | ||
| README.md | 9d661663f3 cmd/tsidp: update README with new repo location warning | 5 months ago |
| depaware.txt | 6637003cc8 cmd/cigocacher,go.mod: add cigocacher cmd | 3 months ago |
| tsidp.go | 653d0738f9 types/netmap: remove PrivateKey from NetworkMap | 3 months ago |
| tsidp_test.go | 89fe2e1f12 cmd/tsidp: add allow-insecure-no-client-registration and JSON file migration (#16881) | 6 months ago |
| ui-edit.html | 09582bdc00 cmd/tsidp: add web UI for managing OIDC clients (#16068) | 9 months ago |
| ui-header.html | 09582bdc00 cmd/tsidp: add web UI for managing OIDC clients (#16068) | 9 months ago |
| ui-list.html | 09582bdc00 cmd/tsidp: add web UI for managing OIDC clients (#16068) | 9 months ago |
| ui-style.css | 09582bdc00 cmd/tsidp: add web UI for managing OIDC clients (#16068) | 9 months ago |
| ui.go | 09582bdc00 cmd/tsidp: add web UI for managing OIDC clients (#16068) | 9 months ago |
[!CAUTION] Development of tsidp has been moved to https://github.com/tailscale/tsidp and it is no longer maintained here. Please visit the new repository to see the latest updates, file an issue, or contribute.
tsidp - Tailscale OpenID Connect (OIDC) Identity Providertsidp is an OIDC Identity Provider (IdP) server that integrates with your Tailscale network. It allows you to use Tailscale identities for authentication in applications that support OpenID Connect, enabling single sign-on (SSO) capabilities within your tailnet.
A pre-built tsidp image exists at tailscale/tsidp:unstable.
# Clone the Tailscale repository
git clone https://github.com/tailscale/tailscale.git
cd tailscale
# Build and publish to your own registry
make publishdevtsidp REPO=ghcr.io/yourusername/tsidp TAGS=v0.0.1 PUSH=true
Replace YOUR_TAILSCALE_AUTHKEY with your Tailscale authentication key:
docker run -d \
--name tsidp \
-p 443:443 \
-e TS_AUTHKEY=YOUR_TAILSCALE_AUTHKEY \
-e TAILSCALE_USE_WIP_CODE=1 \
-v tsidp-data:/var/lib/tsidp \
ghcr.io/yourusername/tsidp:v0.0.1 \
tsidp --hostname=idp --dir=/var/lib/tsidp
docker logs tsidp
Visit https://idp.tailnet.ts.net to confirm the service is running.
Here's how to configure Proxmox to use tsidp for authentication:
In Proxmox, navigate to Datacenter > Realms > Add OpenID Connect Server
Configure the following settings:
https://idp.velociraptor.ts.nettailscale (or your preferred name)unusedunusedtruetrueemailSet up user permissions:
/ for full admin access or scope as neededThe tsidp server supports several command-line flags:
--verbose: Enable verbose logging--port: Port to listen on (default: 443)--local-port: Allow requests from localhost--use-local-tailscaled: Use local tailscaled instead of tsnet--hostname: tsnet hostname--dir: tsnet state directoryTS_AUTHKEY: Your Tailscale authentication key (required)TS_HOSTNAME: Hostname for the tsidp server (default: "idp", Docker only)TS_STATE_DIR: State directory (default: "/var/lib/tsidp", Docker only)TAILSCALE_USE_WIP_CODE: Enable work-in-progress code (default: "1")This is an experimental, work in progress, community project. For issues or questions, file issues on the GitHub repository.
BSD-3-Clause License. See LICENSE for details.