'excurity" urls fixed + language switcher
This commit is contained in:
		@@ -29,6 +29,11 @@ export default defineAppConfig({
 | 
				
			|||||||
    image: '/img/social.png',
 | 
					    image: '/img/social.png',
 | 
				
			||||||
    socials: {
 | 
					    socials: {
 | 
				
			||||||
      github:'',
 | 
					      github:'',
 | 
				
			||||||
 | 
					      Language: {
 | 
				
			||||||
 | 
					        label: '🇫🇷',
 | 
				
			||||||
 | 
					        icon:'material-symbols:language-french', 
 | 
				
			||||||
 | 
					        href: 'https:/docu.djeex.fr/fr/',
 | 
				
			||||||
 | 
					      },
 | 
				
			||||||
      Gitea: {
 | 
					      Gitea: {
 | 
				
			||||||
        label: 'Gitea',
 | 
					        label: 'Gitea',
 | 
				
			||||||
        icon: 'cib:gitea',
 | 
					        icon: 'cib:gitea',
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -13,6 +13,9 @@ main:
 | 
				
			|||||||
cta:
 | 
					cta:
 | 
				
			||||||
  - Access the Docs
 | 
					  - Access the Docs
 | 
				
			||||||
  - /about/welcome
 | 
					  - /about/welcome
 | 
				
			||||||
 | 
					secondary:
 | 
				
			||||||
 | 
					  - 🇫🇷 →
 | 
				
			||||||
 | 
					  - https://docu.djeex.fr/fr/
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#title
 | 
					#title
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -76,21 +76,21 @@ Security
 | 
				
			|||||||
  #title
 | 
					  #title
 | 
				
			||||||
  __VPN__
 | 
					  __VPN__
 | 
				
			||||||
  #description
 | 
					  #description
 | 
				
			||||||
  [Install and deploy Wireguard](/serveex/securite/wireguard)
 | 
					  [Install and deploy Wireguard](/serveex/security/wireguard)
 | 
				
			||||||
  ::
 | 
					  ::
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
  ::card{icon=noto:key}
 | 
					  ::card{icon=noto:key}
 | 
				
			||||||
  #title
 | 
					  #title
 | 
				
			||||||
  __SSO & MFA__
 | 
					  __SSO & MFA__
 | 
				
			||||||
  #description
 | 
					  #description
 | 
				
			||||||
  [Install and deploy Authentik](/serveex/securite/authentik)
 | 
					  [Install and deploy Authentik](/serveex/security/authentik)
 | 
				
			||||||
  ::
 | 
					  ::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  ::card{icon=logos:cloudflare-icon}
 | 
					  ::card{icon=logos:cloudflare-icon}
 | 
				
			||||||
  #title
 | 
					  #title
 | 
				
			||||||
  __Zero Trust__
 | 
					  __Zero Trust__
 | 
				
			||||||
  #description
 | 
					  #description
 | 
				
			||||||
  [Install and deploy Cloudflared](/serveex/securite/cloudflare)
 | 
					  [Install and deploy Cloudflared](/serveex/security/cloudflare)
 | 
				
			||||||
  ::
 | 
					  ::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,7 +20,7 @@ main:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- SWAG is only useful for exposing your services to the internet—i.e., accessing them via a public URL like `https://service.mydomain.com`. If you don’t want to expose your services and prefer to always use a VPN to connect remotely, you can go [here instead](/serveex/securite/wireguard).
 | 
					- SWAG is only useful for exposing your services to the internet—i.e., accessing them via a public URL like `https://service.mydomain.com`. If you don’t want to expose your services and prefer to always use a VPN to connect remotely, you can go [here instead](/serveex/security/wireguard).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -265,14 +265,14 @@ server {
 | 
				
			|||||||
---
 | 
					---
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Prerequisite:__ <br/><br/>
 | 
					📋 __Prerequisite:__ <br/><br/>
 | 
				
			||||||
We assume that you have created a subdomain like `dockge.mydomain.com` in your [DNS zone](/general/dns), with a `CNAME` pointing to `mydomain.com` and — unless you're using [Cloudflare Zero Trust](/serveex/securite/cloudflare) — that you've forwarded port `443` from your router to the server's `443` in [your NAT rules](/general/nat).
 | 
					We assume that you have created a subdomain like `dockge.mydomain.com` in your [DNS zone](/general/dns), with a `CNAME` pointing to `mydomain.com` and — unless you're using [Cloudflare Zero Trust](/serveex/security/cloudflare) — that you've forwarded port `443` from your router to the server's `443` in [your NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Now it's time to expose Dockge on the internet so you can access and manage your containers remotely. We assume you've set up the subdomain `dockge.mydomain.com` with a `CNAME` pointing to `mydomain.com`.
 | 
					Now it's time to expose Dockge on the internet so you can access and manage your containers remotely. We assume you've set up the subdomain `dockge.mydomain.com` with a `CNAME` pointing to `mydomain.com`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Dockge does not support multi-factor authentication. Exposing it online could compromise all connected machines. Only do this if you're using an MFA solution like [Authentik](/serveex/securite/authentik/). Otherwise, don’t expose it with SWAG — use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- Dockge does not support multi-factor authentication. Exposing it online could compromise all connected machines. Only do this if you're using an MFA solution like [Authentik](/serveex/security/authentik/). Otherwise, don’t expose it with SWAG — use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -197,7 +197,7 @@ To use Authentik outside your local network, you must expose it.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Prerequisites:__  <br/><br/>
 | 
					📋 __Prerequisites:__  <br/><br/>
 | 
				
			||||||
We assume you have already created a subdomain like `auth.mydomain.com` in your [DNS zone](/general/dns), with a CNAME pointing to `mydomain.com`. Also, unless you're using [Cloudflare Zero Trust](/serveex/securite/cloudflare), you must have already forwarded port `443` from your router to port `443` of your server in your [NAT rules](/general/nat).
 | 
					We assume you have already created a subdomain like `auth.mydomain.com` in your [DNS zone](/general/dns), with a CNAME pointing to `mydomain.com`. Also, unless you're using [Cloudflare Zero Trust](/serveex/security/cloudflare), you must have already forwarded port `443` from your router to port `443` of your server in your [NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Open the `authentik-server.conf` file:
 | 
					Open the `authentik-server.conf` file:
 | 
				
			||||||
@@ -363,7 +363,7 @@ Your new architecture looks like this:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
## Protecting a Remote Server Service
 | 
					## Protecting a Remote Server Service
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
For a [native application](/serveex/securite/authentik/#protecting-a-native-app) (via OAuth 2.0 or other), nothing changes.
 | 
					For a [native application](/serveex/security/authentik/#protecting-a-native-app) (via OAuth 2.0 or other), nothing changes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
For a non-native app behind a reverse proxy, you must deploy an __Outpost__. An Outpost is a container acting as a local proxy — it's the target of your app's auth requests and the only one authorized to communicate with your Authentik API.
 | 
					For a non-native app behind a reverse proxy, you must deploy an __Outpost__. An Outpost is a container acting as a local proxy — it's the target of your app's auth requests and the only one authorized to communicate with your Authentik API.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -373,13 +373,13 @@ Prerequisites:
 | 
				
			|||||||
- If the app has no native integration, use a compatible reverse proxy. We will use [SWAG](/serveex/core/swag) here.
 | 
					- If the app has no native integration, use a compatible reverse proxy. We will use [SWAG](/serveex/core/swag) here.
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
This container will forward requests to your main [Authentik](/serveex/securite/authentik#authentik) instance over the internet (or your local network). The server will perform checks and respond to the Outpost, which will allow or block access accordingly.
 | 
					This container will forward requests to your main [Authentik](/serveex/security/authentik#authentik) instance over the internet (or your local network). The server will perform checks and respond to the Outpost, which will allow or block access accordingly.
 | 
				
			||||||
 | 
					
 | 
				
			||||||

 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Configuring Authentik
 | 
					### Configuring Authentik
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Create your [providers and applications](/serveex/securite/authentik/#protecting-a-native-app) as shown earlier.
 | 
					Create your [providers and applications](/serveex/security/authentik/#protecting-a-native-app) as shown earlier.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Then, in the admin panel, go to _Applications > Outposts_, and create a new outpost.
 | 
					Then, in the admin panel, go to _Applications > Outposts_, and create a new outpost.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -547,7 +547,7 @@ proxy_pass http://$upstream_authentik:9000;
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
Save and exit with `Esc`, then `:x` and `Enter`.
 | 
					Save and exit with `Esc`, then `:x` and `Enter`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Then configure the applications to protect as you did on your main server, whether they are [native](/serveex/securite/authentik/#protecting-a-native-app) or protected via [reverse proxy](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					Then configure the applications to protect as you did on your main server, whether they are [native](/serveex/security/authentik/#protecting-a-native-app) or protected via [reverse proxy](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Migrating an Authentik Database
 | 
					## Migrating an Authentik Database
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
@@ -21,7 +21,7 @@ main:
 | 
				
			|||||||
---
 | 
					---
 | 
				
			||||||
The _Zero Trust_ architecture is the practice of designing systems based on the principle of __"never trust, always verify"__, as opposed to the traditional principle of __"trust, but verify"__. This concept has become increasingly popular recently due to the growing number of attacks targeting user data. It’s a broad concept, but we’ll focus on how to apply _Zero Trust_ to the web services we host.
 | 
					The _Zero Trust_ architecture is the practice of designing systems based on the principle of __"never trust, always verify"__, as opposed to the traditional principle of __"trust, but verify"__. This concept has become increasingly popular recently due to the growing number of attacks targeting user data. It’s a broad concept, but we’ll focus on how to apply _Zero Trust_ to the web services we host.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
_Cloudflare tunnels_ offer a simple way to implement _Zero Trust_, using [SWAG](/serveex/core/swag) and [Authentik](/serveex/securite/authentik).
 | 
					_Cloudflare tunnels_ offer a simple way to implement _Zero Trust_, using [SWAG](/serveex/core/swag) and [Authentik](/serveex/security/authentik).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Simply put, Cloudflare Tunnels allow you to:
 | 
					Simply put, Cloudflare Tunnels allow you to:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -68,12 +68,12 @@ You can now access the tool via `http://yourserverip:3200`.
 | 
				
			|||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Before you begin:__ 
 | 
					📋 __Before you begin:__ 
 | 
				
			||||||
<br/><br/>
 | 
					<br/><br/>
 | 
				
			||||||
We assume you have the subdomain `stats.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/general/dns). And of course, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), port `443` of your router should point to port `443` of your server via [NAT rules](/general/nat).
 | 
					We assume you have the subdomain `stats.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/general/dns). And of course, [unless you're using Cloudflare Zero Trust](/serveex/security/cloudflare), port `443` of your router should point to port `443` of your server via [NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Uptime-Kuma does not use multi-factor authentication. Exposing Uptime-Kuma on the internet could compromise the machines it monitors. Only do this if you're using an MFA system like [Authentik](/serveex/securite/authentik/). Otherwise, don’t expose it with SWAG; use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- Uptime-Kuma does not use multi-factor authentication. Exposing Uptime-Kuma on the internet could compromise the machines it monitors. Only do this if you're using an MFA system like [Authentik](/serveex/security/authentik/). Otherwise, don’t expose it with SWAG; use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -177,7 +177,7 @@ You can protect this app with Authentik by opening `stats.subdomain.conf` and un
 | 
				
			|||||||
`include /config/nginx/authentik-server.conf;`  
 | 
					`include /config/nginx/authentik-server.conf;`  
 | 
				
			||||||
and  
 | 
					and  
 | 
				
			||||||
`include /config/nginx/authentik-location.conf;`.  
 | 
					`include /config/nginx/authentik-location.conf;`.  
 | 
				
			||||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy). If you want the public stats page to be accessible without authentication:
 | 
					Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy). If you want the public stats page to be accessible without authentication:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- Edit the Uptime-Kuma provider
 | 
					- Edit the Uptime-Kuma provider
 | 
				
			||||||
- In *Advanced Protocol Settings > Authenticated Paths*, enter:
 | 
					- In *Advanced Protocol Settings > Authenticated Paths*, enter:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -72,7 +72,7 @@ Deploy the container and go to `http://yourserverip:9135`. Voilà, your Dozzle w
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Dozzle does not use multi-factor authentication. Exposing Dozzle to the internet could compromise the connected machines. Only do this if you use a multi-factor authentication system like [Authentik](/serveex/securite/authentik/). Otherwise, do not expose it with SWAG and instead use a VPN like [Wireguard](/serveex/securite/wireguard).
 | 
					- Dozzle does not use multi-factor authentication. Exposing Dozzle to the internet could compromise the connected machines. Only do this if you use a multi-factor authentication system like [Authentik](/serveex/security/authentik/). Otherwise, do not expose it with SWAG and instead use a VPN like [Wireguard](/serveex/security/wireguard).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -81,7 +81,7 @@ You may want to access Dozzle remotely and on all your devices. To do so, we’l
 | 
				
			|||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Before you begin:__
 | 
					📋 __Before you begin:__
 | 
				
			||||||
<br/><br/>
 | 
					<br/><br/>
 | 
				
			||||||
We assume you have created a subdomain like `dozzle.mydomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `mydomain.com` and that, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), you’ve redirected port `443` from your router to port `443` on your server in your [NAT rules](/general/nat).
 | 
					We assume you have created a subdomain like `dozzle.mydomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `mydomain.com` and that, [unless you're using Cloudflare Zero Trust](/serveex/security/cloudflare), you’ve redirected port `443` from your router to port `443` on your server in your [NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Go to Dockge and edit the SWAG compose file to add Dozzle’s network:
 | 
					Go to Dockge and edit the SWAG compose file to add Dozzle’s network:
 | 
				
			||||||
@@ -177,5 +177,5 @@ Press `Esc`, then save and exit by typing `:x` and pressing `Enter`.
 | 
				
			|||||||
And there you go, Dozzle is now exposed!
 | 
					And there you go, Dozzle is now exposed!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can protect this app with Authentik by opening `dozzle.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ You can protect this app with Authentik by opening `dozzle.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
@@ -91,14 +91,14 @@ Deploy the container and go to `http://yourserverip:3225`. Log in with the accou
 | 
				
			|||||||
---
 | 
					---
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 **Prerequisites:**  
 | 
					📋 **Prerequisites:**  
 | 
				
			||||||
We assume that you've already created a subdomain like `speedtest.yourdomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `yourdomain.com`, and [unless you’re using Cloudflare Zero Trust](/serveex/securite/cloudflare), you've also forwarded port `443` from your router to port `443` of your server in your [NAT rules](/general/nat).
 | 
					We assume that you've already created a subdomain like `speedtest.yourdomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `yourdomain.com`, and [unless you’re using Cloudflare Zero Trust](/serveex/security/cloudflare), you've also forwarded port `443` from your router to port `443` of your server in your [NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Now we want to expose Speedtest Tracker to the internet so you can access it remotely. We assume you've set up the DNS `CNAME` for `speedtest.yourdomain.com` pointing to `yourdomain.com`.
 | 
					Now we want to expose Speedtest Tracker to the internet so you can access it remotely. We assume you've set up the DNS `CNAME` for `speedtest.yourdomain.com` pointing to `yourdomain.com`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Speedtest Tracker does not use multi-factor authentication. Exposing it on the internet could compromise connected devices. Do so only if you use a multi-factor system like [Authentik](/serveex/securite/authentik/). Otherwise, avoid using SWAG and prefer a VPN like [Wireguard](/serveex/securite/wireguard).
 | 
					- Speedtest Tracker does not use multi-factor authentication. Exposing it on the internet could compromise connected devices. Do so only if you use a multi-factor system like [Authentik](/serveex/security/authentik/). Otherwise, avoid using SWAG and prefer a VPN like [Wireguard](/serveex/security/wireguard).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -192,5 +192,5 @@ Wait a moment, then visit `https://speedtest.yourdomain.com` in your browser —
 | 
				
			|||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can protect this app with Authentik by opening `speedtest.subdomain.conf` and uncommenting  
 | 
					✨ You can protect this app with Authentik by opening `speedtest.subdomain.conf` and uncommenting  
 | 
				
			||||||
`include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`.  
 | 
					`include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`.  
 | 
				
			||||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
@@ -148,7 +148,7 @@ Deploy the stack on the remote server. Data will begin flowing into the web UI a
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Beszel does not support multi-factor authentication. Exposing it on the internet could compromise connected machines. Only do this if you're using a system like [Authentik](/serveex/securite/authentik/). Otherwise, do not expose with SWAG—use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- Beszel does not support multi-factor authentication. Exposing it on the internet could compromise connected machines. Only do this if you're using a system like [Authentik](/serveex/security/authentik/). Otherwise, do not expose with SWAG—use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -247,5 +247,5 @@ Press `Esc`, type `:x`, and hit `Enter` to save and exit.
 | 
				
			|||||||
That’s it—Beszel is now exposed!
 | 
					That’s it—Beszel is now exposed!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can protect this app with Authentik by opening `beszel.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ You can protect this app with Authentik by opening `beszel.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -85,7 +85,7 @@ Deploy the container and go to `http://yourserverip:8095`. Just follow the steps
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- UpSnap does not support multi-factor authentication. Exposing it on the internet could compromise connected machines. Do this only if you're using a multi-factor authentication system like [Authentik](/serveex/securite/authentik/). Otherwise, avoid exposing it with SWAG and use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- UpSnap does not support multi-factor authentication. Exposing it on the internet could compromise connected machines. Do this only if you're using a multi-factor authentication system like [Authentik](/serveex/security/authentik/). Otherwise, avoid exposing it with SWAG and use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -190,5 +190,5 @@ Press `Escape`, then save and exit by typing `:x` and pressing `Enter`.
 | 
				
			|||||||
And that’s it — you’ve exposed UpSnap!
 | 
					And that’s it — you’ve exposed UpSnap!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can protect this app with Authentik by opening `upsnap.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ You can protect this app with Authentik by opening `upsnap.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -175,7 +175,7 @@ However, you may want to expose Tautulli so you can view stats from a simple URL
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- We assume you have the subdomain `tautulli.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/general/dns). And of course, [unless you use Cloudflare Zero Trust](/serveex/securite/cloudflare), your box's port `443` must be forwarded to your server's port `443` in [NAT rules](/general/nat).
 | 
					- We assume you have the subdomain `tautulli.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/general/dns). And of course, [unless you use Cloudflare Zero Trust](/serveex/security/cloudflare), your box's port `443` must be forwarded to your server's port `443` in [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -298,7 +298,7 @@ server {
 | 
				
			|||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can protect this app with Authentik by removing the `#` before `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ You can protect this app with Authentik by removing the `#` before `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Press `Esc` then save and quit by typing `:x`
 | 
					Press `Esc` then save and quit by typing `:x`
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -209,7 +209,7 @@ When adding a download, remember to select the proper directory so Plex can sync
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- Qbittorrent does not support multi-factor authentication. Exposing it to the internet may put your system at risk. Only do this if you use MFA via [Authentik](/serveex/securite/authentik/). Otherwise, don’t expose it with SWAG—use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- Qbittorrent does not support multi-factor authentication. Exposing it to the internet may put your system at risk. Only do this if you use MFA via [Authentik](/serveex/security/authentik/). Otherwise, don’t expose it with SWAG—use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -311,7 +311,7 @@ server {
 | 
				
			|||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ You can secure this app with Authentik by uncommenting the `authentik-server.conf` and `authentik-location.conf` lines. Don’t forget to [create an app and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ You can secure this app with Authentik by uncommenting the `authentik-server.conf` and `authentik-location.conf` lines. Don’t forget to [create an app and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Press `Esc`, type `:x` to save and quit.
 | 
					Press `Esc`, type `:x` to save and quit.
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -385,7 +385,7 @@ It can be useful to expose Overseerr if you want to send requests from outside y
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- We assume you have the subdomain `films.mydomain.com` with a `CNAME` pointing to `films.fr` in your [DNS zone](/general/dns). And that [unless you’re using Cloudflare Zero Trust](/serveex/securite/cloudflare), port `443` on your router is forwarded to port `443` on your server via [NAT rules](/general/nat).
 | 
					- We assume you have the subdomain `films.mydomain.com` with a `CNAME` pointing to `films.fr` in your [DNS zone](/general/dns). And that [unless you’re using Cloudflare Zero Trust](/serveex/security/cloudflare), port `443` on your router is forwarded to port `443` on your server via [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -59,7 +59,7 @@ The main benefit of this setup is being able to access Immich remotely on all yo
 | 
				
			|||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Before you begin:__ 
 | 
					📋 __Before you begin:__ 
 | 
				
			||||||
<br/><br/>
 | 
					<br/><br/>
 | 
				
			||||||
We assume that you have a subdomain `immich.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns). Also, unless you're using [Cloudflare Zero Trust](/serveex/securite/cloudflare), make sure port `443` on your router is forwarded to port `443` on your server via [NAT rules](/general/nat).
 | 
					We assume that you have a subdomain `immich.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns). Also, unless you're using [Cloudflare Zero Trust](/serveex/security/cloudflare), make sure port `443` on your router is forwarded to port `443` on your server via [NAT rules](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
In Dockge, open the SWAG stack and edit the compose file to add Immich's network:
 | 
					In Dockge, open the SWAG stack and edit the compose file to add Immich's network:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -89,7 +89,7 @@ The goal of this setup is to access Nextcloud remotely from all your devices. We
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- We assume you have a subdomain `nextcloud.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns). And unless you’re using [Cloudflare Zero Trust](/serveex/securite/cloudflare), port `443` on your router must be forwarded to port `443` on your server using [NAT rules](/general/nat).
 | 
					- We assume you have a subdomain `nextcloud.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns). And unless you’re using [Cloudflare Zero Trust](/serveex/security/cloudflare), port `443` on your router must be forwarded to port `443` on your server using [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -59,7 +59,7 @@ Deploy the container and go to `http://yourserverip:8010`. That’s it—your Fi
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="warning"}
 | 
					::alert{type="warning"}
 | 
				
			||||||
:::list{type="warning"}
 | 
					:::list{type="warning"}
 | 
				
			||||||
- File Browser does not support multi-factor authentication. Exposing it publicly could put your systems at risk. Only do this if you’re using a secure authentication solution like [Authentik](/serveex/securite/authentik/). Otherwise, do not expose it with SWAG—use a VPN like [Wireguard](/serveex/securite/wireguard) instead.
 | 
					- File Browser does not support multi-factor authentication. Exposing it publicly could put your systems at risk. Only do this if you’re using a secure authentication solution like [Authentik](/serveex/security/authentik/). Otherwise, do not expose it with SWAG—use a VPN like [Wireguard](/serveex/security/wireguard) instead.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -160,5 +160,5 @@ Press `Esc`, then save and exit with `:x` followed by `Enter`.
 | 
				
			|||||||
That’s it—File Browser is now exposed!
 | 
					That’s it—File Browser is now exposed!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ __Tip:__ You can protect this app with Authentik by opening `files.subdomain.conf` and uncommenting `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ __Tip:__ You can protect this app with Authentik by opening `files.subdomain.conf` and uncommenting `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
@@ -81,7 +81,7 @@ Tout l'intérêt d'une telle solution, c'est de pouvoir y accéder à distance e
 | 
				
			|||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
📋 __Au préalable :__ 
 | 
					📋 __Au préalable :__ 
 | 
				
			||||||
<br/><br/>
 | 
					<br/><br/>
 | 
				
			||||||
Nous partons du principe que vous avez le sous-domaine `pingvin.mondomaine.fr` avec un `CNAME` qui pointe vers `mondomaine.fr` dans votre [zone DNS](/general/dns). Et que bien sûr, [à moins que vous utilisiez Cloudflare Zero Trust](/serveex/securite/cloudflare), le port `443` de votre box pointe bien sur le port `443` de votre serveur via [les règles NAT](/general/nat).
 | 
					Nous partons du principe que vous avez le sous-domaine `pingvin.mondomaine.fr` avec un `CNAME` qui pointe vers `mondomaine.fr` dans votre [zone DNS](/general/dns). Et que bien sûr, [à moins que vous utilisiez Cloudflare Zero Trust](/serveex/security/cloudflare), le port `443` de votre box pointe bien sur le port `443` de votre serveur via [les règles NAT](/general/nat).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Dans Dockge, rendez-vous dans la stack de SWAG et éditez le compose en ajoutant le réseau de pingvin :
 | 
					Dans Dockge, rendez-vous dans la stack de SWAG et éditez le compose en ajoutant le réseau de pingvin :
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -122,7 +122,7 @@ The whole point of such a solution is to access it remotely from any device. To
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- __Preliminary:__ We assume you’ve created a subdomain like `code.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns), and—unless you're using [Cloudflare Zero Trust](/serveex/securite/cloudflare)—that you’ve forwarded port `443` from your router to port `443` on your server using [NAT rules](/general/nat).
 | 
					- __Preliminary:__ We assume you’ve created a subdomain like `code.yourdomain.com` with a `CNAME` pointing to `yourdomain.com` in your [DNS zone](/general/dns), and—unless you're using [Cloudflare Zero Trust](/serveex/security/cloudflare)—that you’ve forwarded port `443` from your router to port `443` on your server using [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -219,5 +219,5 @@ Press `Esc`, then save and exit by typing `:x` and pressing `Enter`.
 | 
				
			|||||||
That’s it — code-server is now exposed!
 | 
					That’s it — code-server is now exposed!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ __Tip:__ You can protect this app with Authentik by opening `code.subdomain.conf` and uncommenting the lines `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ __Tip:__ You can protect this app with Authentik by opening `code.subdomain.conf` and uncommenting the lines `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
@@ -74,7 +74,7 @@ The benefit of this setup is being able to access it remotely from any of your d
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- __Prerequisite:__ We assume you have created a subdomain such as `gitea.yourdomain.com` in your [DNS zone](/general/dns) with `CNAME` pointing to `yourdomain.com`, and [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), you have already forwarded port `443` from your router to your server’s port `443` in the [NAT rules](/general/nat).
 | 
					- __Prerequisite:__ We assume you have created a subdomain such as `gitea.yourdomain.com` in your [DNS zone](/general/dns) with `CNAME` pointing to `yourdomain.com`, and [unless you're using Cloudflare Zero Trust](/serveex/security/cloudflare), you have already forwarded port `443` from your router to your server’s port `443` in the [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -58,7 +58,7 @@ You might want to access it remotely on all your devices. To do that, we'll expo
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
::alert{type="info"}
 | 
					::alert{type="info"}
 | 
				
			||||||
:::list{type="info"}
 | 
					:::list{type="info"}
 | 
				
			||||||
- __Pre-requisite:__ We assume you’ve created a subdomain like `tools.yourdomain.com` in your [DNS zone](/general/dns) with `CNAME` set to `yourdomain.com`. Also, unless you’re using [Cloudflare Zero Trust](/serveex/securite/cloudflare), make sure you’ve already forwarded port `443` from your router to port `443` on your server in the [NAT rules](/general/nat).
 | 
					- __Pre-requisite:__ We assume you’ve created a subdomain like `tools.yourdomain.com` in your [DNS zone](/general/dns) with `CNAME` set to `yourdomain.com`. Also, unless you’re using [Cloudflare Zero Trust](/serveex/security/cloudflare), make sure you’ve already forwarded port `443` from your router to port `443` on your server in the [NAT rules](/general/nat).
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -162,5 +162,5 @@ Press `Esc`, then save and exit by typing `:x` and pressing `Enter`.
 | 
				
			|||||||
And that’s it — IT Tools is now exposed!
 | 
					And that’s it — IT Tools is now exposed!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ __Tip:__ You can secure this app with Authentik by opening `tools.subdomain.conf` and uncommenting the lines `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and a provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ __Tip:__ You can secure this app with Authentik by opening `tools.subdomain.conf` and uncommenting the lines `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and a provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
@@ -231,7 +231,7 @@ server {
 | 
				
			|||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ __Tip:__ 
 | 
					✨ __Tip:__ 
 | 
				
			||||||
<br/><br/>
 | 
					<br/><br/>
 | 
				
			||||||
You can protect this app with Authentik by opening `adguard.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/securite/authentik/#protéger-une-app-par-reverse-proxy). You’ll need to exclude the URL `https://adguard.mydomain.com/dns-query` from authentication:
 | 
					You can protect this app with Authentik by opening `adguard.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/security/authentik/#protéger-une-app-par-reverse-proxy). You’ll need to exclude the URL `https://adguard.mydomain.com/dns-query` from authentication:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- Edit the AdGuard provider
 | 
					- Edit the AdGuard provider
 | 
				
			||||||
- Under *Advanced Protocol Settings > Authenticated Paths*, enter `^/dns-query`
 | 
					- Under *Advanced Protocol Settings > Authenticated Paths*, enter `^/dns-query`
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -240,5 +240,5 @@ And there you go — Vaultwarden is now exposed! Visit `vault.yourdomain.com` to
 | 
				
			|||||||
Don't forget to install Bitwarden browser extensions (they work with Vaultwarden) for [Chrome](https://chromewebstore.google.com/detail/gestionnaire-de-mots-de-p/nngceckbapebfimnlniiiahkandclblb) and [Firefox](https://addons.mozilla.org/fr/firefox/addon/bitwarden-password-manager/), as well as [iOS](https://apps.apple.com/fr/app/bitwarden/id1137397744) and [Android](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden&hl=fr) apps to sync your passwords.
 | 
					Don't forget to install Bitwarden browser extensions (they work with Vaultwarden) for [Chrome](https://chromewebstore.google.com/detail/gestionnaire-de-mots-de-p/nngceckbapebfimnlniiiahkandclblb) and [Firefox](https://addons.mozilla.org/fr/firefox/addon/bitwarden-password-manager/), as well as [iOS](https://apps.apple.com/fr/app/bitwarden/id1137397744) and [Android](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden&hl=fr) apps to sync your passwords.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
::alert{type="success"}
 | 
					::alert{type="success"}
 | 
				
			||||||
✨ __Tip:__ You can protect this app with Authentik by opening `tools.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don't forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
					✨ __Tip:__ You can protect this app with Authentik by opening `tools.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don't forget to [create an application and provider in Authentik](/serveex/security/authentik#protecting-an-app-via-reverse-proxy).
 | 
				
			||||||
::
 | 
					::
 | 
				
			||||||
		Reference in New Issue
	
	Block a user