website/integrations: jellyfin: add OIDC configuration#9538
website/integrations: jellyfin: add OIDC configuration#9538tanberry merged 10 commits intogoauthentik:mainfrom
Conversation
✅ Deploy Preview for authentik-docs ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
✅ Deploy Preview for authentik-storybook ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #9538 +/- ##
=======================================
Coverage 92.64% 92.64%
=======================================
Files 713 713
Lines 34889 34894 +5
=======================================
+ Hits 32322 32327 +5
Misses 2567 2567
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
tanberry
left a comment
There was a problem hiding this comment.
Thanks so much @Redlonghead for this contribution. I made a few edits (sorry you got caught up in a change we are making t our Style Guide; we use bold text for UI elements) but after those are done, let's merge!
| 2. Logout, and login with a LDAP user. Username **must** be used, logging in with email will not work. | ||
|
|
||
| ## authentik Configuration | ||
| ### Authentik Configuration |
There was a problem hiding this comment.
| ### Authentik Configuration | |
| ### authentik Configuration |
There was a problem hiding this comment.
:-) Our product name is actually lower-case, authentik.
There was a problem hiding this comment.
Interesting, I just noticed that!
|
|
||
| To use the role claim within Jellyfin we will have to add a custom property. This is not needed but does allow admins to be set for SSO users automatically. It can also deny access if they don't have a role, but this should be done though Authentik instead. | ||
|
|
||
| 1. Go to _Customization_ then _Property Mappings_ |
There was a problem hiding this comment.
| 1. Go to _Customization_ then _Property Mappings_ | |
| 1. In the Admin interface, go to **Customization -> Property Mappings**. |
|
|
||
| ## OIDC Configuration | ||
|
|
||
| ### authentik Configuration |
There was a problem hiding this comment.
Consider switching the order of authentik and Jellyfin (on line 136) so they match the order in the LDAP section above... This would also help lessen the initial confusion of having two H3s that both say "authentik configuration". ;)
* main: website/docs: update 2024.6 release notes with latest changes (#10174) core: fix error when raising SkipObject in mapping (#10153) website/docs: 2024.6 release notes: add note about group names (#10170) website/docs: update 2024.6 release notes with latest changes (#10167) core: bump twilio from 9.1.1 to 9.2.0 (#10162) web: bump chromedriver from 126.0.1 to 126.0.2 in /tests/wdio (#10161) web: bump the wdio group in /tests/wdio with 4 updates (#10160) website/integrations: jellyfin: add OIDC configuration (#9538) website/docs: Describe where to apply the auto setup env vars (#9863) website/integrations: gitlab: better service description (#9923) web: fix docker build for non-release versions (#10154) root: makefile: add codespell to make-website (#10116)
Details
I added the OIDC configuration for Jellyfin so others would more likely see that they can do this option for SSO.
Checklist
ak test authentik/)make lint-fix)If an API change has been made
make gen-build)If changes to the frontend have been made
make web)If applicable
make website)