-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
website/integrations: add omada controller doc #14523
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for authentik-docs ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
✅ Deploy Preview for authentik-storybook canceled.
|
Codecov ReportAll modified and coverable lines are covered by tests ✅
✅ All tests successful. No failed tests found. Additional details and impacted files@@ Coverage Diff @@
## main #14523 +/- ##
==========================================
- Coverage 92.70% 92.69% -0.01%
==========================================
Files 809 809
Lines 41525 41529 +4
==========================================
+ Hits 38494 38497 +3
- Misses 3031 3032 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for doing this. Great work.
The default relay state is derived by decoding a combination of the **Resource ID** and **Omada ID** with a Base64 encryption tool. This section provides an example of how to do this. | ||
|
||
1. Go to https://www.base64decode.org/ | ||
2. In the **Decode from Base64 format** section, enter: `<Resouce ID>_<Omada ID>`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+r
Resource ID
authentik PR Installation instructions Instructions for docker-composeAdd the following block to your AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-46a18741ce2fe6f112fae00438a2ec65e13a7bdd
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s Afterwards, run the upgrade commands from the latest release notes. Instructions for KubernetesAdd the following block to your authentik:
outposts:
container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
image:
repository: ghcr.io/goauthentik/dev-server
tag: gh-46a18741ce2fe6f112fae00438a2ec65e13a7bdd Afterwards, run the upgrade commands from the latest release notes. |
Running into significant errors with software controller. Continuous errors about the browser being incompatible when accessing the SAML log in link. Same issue on multiple operating systems and browsers. I've contacted TPlink to request advice. |
Details
WIP - not ready for review
Adds an integration doc for omada controller and updates the integrations sidebar.
Closes #14508
If applicable
make website
)