From d69ebbfd2467a78bb4268f71d93c396cca0bd05c Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Fri, 31 Jan 2025 20:57:51 +0100
Subject: [PATCH 01/12] initial release
---
.../integrations/services/beszel/index.mdx | 94 +++++++++++++++++++
website/sidebarsIntegrations.js | 1 +
2 files changed, 95 insertions(+)
create mode 100644 website/integrations/services/beszel/index.mdx
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
new file mode 100644
index 000000000000..8d6785bec743
--- /dev/null
+++ b/website/integrations/services/beszel/index.mdx
@@ -0,0 +1,94 @@
+---
+title: Integrate with Beszel
+sidebar_label: Beszel
+---
+
+# Integrate With Beszel
+
+Support level: Community
+
+## What is Beszel
+
+> Beszel is a lightweight server monitoring platform that provides Docker statistics, historical data, and configurable alerts.
+> It features a user-friendly web interface, supports multi-user management, OAuth authentication, and offers a REST API for integration with other applications.
+> Designed for simplicity, Beszel is easy to set up and operates efficiently without requiring public internet exposure.
+>
+> -- https://beszel.dev/
+>
+> This guide explains how to configure Beszel to use authentik as the OAuth provider for logging in to the Web GUI.
+
+## Preparation
+
+The following placeholders are used in this guide:
+
+- `beszel.company` is the FQDN of the Beszel installation.
+- `authentik.company` is the FQDN of the authentik installation.
+
+:::note
+This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application.
+:::
+
+## authentik configuration
+
+Start the wizard for adding a new application.
+
+**1. Application:**
+
+- Name: `Beszel`
+- Slug: `beszel`
+
+**2. Choose a Provider**
+
+Select `OAuth2/OpenID Provider`
+
+**3. Configure Provider**
+
+Select implicit or explicit authorization flow as desired.
+
+Take note of the Client ID and Client Secret, you'll need to give them to Beszel later.
+
+- Redirect URIs/Origins (RegEx): `https://_beszel.company_/api/oauth2-redirect`
+- Signing Key: Select any available signing keys.
+
+Leave the rest as default values.
+
+## Beszel configuration
+
+1. Sign in to Beszel with a browser of your choice and access the system setting by using this URL https://_beszel.company_/_/#/settings.
+
+2. Disable **Hide collection create and edit controls** and click **Save changes**.
+
+3. Open the **users** submenu by clicking the **Collections** icon in the left menu or by accessing this URL: https://beszel.company/_/#/collections?collection=pb_users_auth.
+
+4. Click the gear icon next to **users**, then select the **Options** tab.
+
+5. Enable **OAuth2** by toggling the corresponding switch.
+
+6. Click **+ Add provider** and select **OpenID Connect**.
+
+7. Enter the following details from the authentik provider:
+ - Set **Client ID** to _client-id_
+ - Set **Client secret** to _client-secret_
+ - Set **Display name** to **authentik**
+ - Set **Auth URL** to https://_authentik.company_/application/o/authorize/
+ - Set **Token URL** to https://_authentik.company_/application/o/token/
+ - Set **User info URL** to https://_authentik.company_/application/o/userinfo/
+
+## Test the login
+
+- Open your web browser and go to: https://_beszel.company_.
+- Click **authentik** to log in.
+- You should be redirected to authentik (following the login flow you configured). After logging in, authentik will redirect you back to https://_beszel.company_.
+- If you successfully return to the Beszel WebGUI, the login is working correctly.
+
+## User Creation
+
+1. Manually Creating Users:
+ - Users are not created automatically when logging in with authentik. The owner must manually create each user in Beszel.
+ - To create users, go to the System Settings where you configured OpenID Connect.
+ - The URL for user creation is: https://_beszel.company_/_/#/collections?collection=pb_users_auth.
+ - Click **+ New record** and enter the user's **email** (must match the authentik email address).
+
+2. Automatically Creating Users:
+ - Set the following environment variable: **USER_CREATION=true**
+ - Depending on your deployment method, you can set this as a Docker environment variable or in the systemd service file.
diff --git a/website/sidebarsIntegrations.js b/website/sidebarsIntegrations.js
index cd1637da15a1..dcb0ce2d5ca0 100644
--- a/website/sidebarsIntegrations.js
+++ b/website/sidebarsIntegrations.js
@@ -144,6 +144,7 @@ module.exports = {
type: "category",
label: "Monitoring",
items: [
+ "services/beszel/index",
"services/chronograf/index",
"services/gatus/index",
"services/glitchtip/index",
From 849a3190b90bdbbba376ce7ede79fc04997c0e4c Mon Sep 17 00:00:00 2001
From: nicedevil007
Date: Fri, 31 Jan 2025 20:12:05 +0000
Subject: [PATCH 02/12] Ready for PR
---
authentik/lib/sync/outgoing/models.py | 6 +++---
website/integrations/services/beszel/index.mdx | 5 +++--
2 files changed, 6 insertions(+), 5 deletions(-)
diff --git a/authentik/lib/sync/outgoing/models.py b/authentik/lib/sync/outgoing/models.py
index 72657c3302ec..e46fb529f7d1 100644
--- a/authentik/lib/sync/outgoing/models.py
+++ b/authentik/lib/sync/outgoing/models.py
@@ -22,9 +22,9 @@ class OutgoingSyncProvider(Model):
class Meta:
abstract = True
- def client_for_model[T: User | Group](
- self, model: type[T]
- ) -> BaseOutgoingSyncClient[T, Any, Any, Self]:
+ def client_for_model[
+ T: User | Group
+ ](self, model: type[T]) -> BaseOutgoingSyncClient[T, Any, Any, Self]:
raise NotImplementedError
def get_object_qs[T: User | Group](self, type: type[T]) -> QuerySet[T]:
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 8d6785bec743..ccc133b906ca 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -54,7 +54,7 @@ Leave the rest as default values.
## Beszel configuration
-1. Sign in to Beszel with a browser of your choice and access the system setting by using this URL https://_beszel.company_/_/#/settings.
+1. Sign in to Beszel with a browser of your choice and access the system setting by using this URL https://_beszel.company_/\_/#/settings.
2. Disable **Hide collection create and edit controls** and click **Save changes**.
@@ -84,9 +84,10 @@ Leave the rest as default values.
## User Creation
1. Manually Creating Users:
+
- Users are not created automatically when logging in with authentik. The owner must manually create each user in Beszel.
- To create users, go to the System Settings where you configured OpenID Connect.
- - The URL for user creation is: https://_beszel.company_/_/#/collections?collection=pb_users_auth.
+ - The URL for user creation is: https://_beszel.company_/\_/#/collections?collection=pb_users_auth.
- Click **+ New record** and enter the user's **email** (must match the authentik email address).
2. Automatically Creating Users:
From 9d1da7b71fdcd01964d642320d90542d1e131edf Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Fri, 31 Jan 2025 21:22:05 +0100
Subject: [PATCH 03/12] never changed this?
Used these commands after fresh git pull:
make lint-fix && npx prettier --write ./website/integrations/services/beszel/index.mdx && make website
Signed-off-by: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
---
authentik/lib/sync/outgoing/models.py | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/authentik/lib/sync/outgoing/models.py b/authentik/lib/sync/outgoing/models.py
index e46fb529f7d1..72657c3302ec 100644
--- a/authentik/lib/sync/outgoing/models.py
+++ b/authentik/lib/sync/outgoing/models.py
@@ -22,9 +22,9 @@ class OutgoingSyncProvider(Model):
class Meta:
abstract = True
- def client_for_model[
- T: User | Group
- ](self, model: type[T]) -> BaseOutgoingSyncClient[T, Any, Any, Self]:
+ def client_for_model[T: User | Group](
+ self, model: type[T]
+ ) -> BaseOutgoingSyncClient[T, Any, Any, Self]:
raise NotImplementedError
def get_object_qs[T: User | Group](self, type: type[T]) -> QuerySet[T]:
From d24553ef0082a71d57f1bc741169897e540f5b25 Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Sun, 2 Feb 2025 09:14:54 +0100
Subject: [PATCH 04/12] reference to PocketBase
As @4d62 suggestet, here is the much simpler version as it uses 1:1 settings from PocketBase
---
.../integrations/services/beszel/index.mdx | 57 +++----------------
1 file changed, 7 insertions(+), 50 deletions(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index ccc133b906ca..2bd344a37c9d 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -19,66 +19,23 @@ sidebar_label: Beszel
## Preparation
-The following placeholders are used in this guide:
+Since Beszel uses PocketBase as its backend, you only need to replace the PocketBase placeholders with the placeholders found on this page.
+You can find the PocketBase documentation here: https://docs.goauthentik.io/integrations/services/pocketbase/.
- `beszel.company` is the FQDN of the Beszel installation.
- `authentik.company` is the FQDN of the authentik installation.
+- `Beszel` is the Name of the authentik application.
+- `beszel` is the Slug of the authentik application.
:::note
This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application.
:::
-## authentik configuration
-
-Start the wizard for adding a new application.
-
-**1. Application:**
-
-- Name: `Beszel`
-- Slug: `beszel`
-
-**2. Choose a Provider**
-
-Select `OAuth2/OpenID Provider`
-
-**3. Configure Provider**
-
-Select implicit or explicit authorization flow as desired.
-
-Take note of the Client ID and Client Secret, you'll need to give them to Beszel later.
-
-- Redirect URIs/Origins (RegEx): `https://_beszel.company_/api/oauth2-redirect`
-- Signing Key: Select any available signing keys.
-
-Leave the rest as default values.
-
-## Beszel configuration
-
-1. Sign in to Beszel with a browser of your choice and access the system setting by using this URL https://_beszel.company_/\_/#/settings.
-
-2. Disable **Hide collection create and edit controls** and click **Save changes**.
-
-3. Open the **users** submenu by clicking the **Collections** icon in the left menu or by accessing this URL: https://beszel.company/_/#/collections?collection=pb_users_auth.
-
-4. Click the gear icon next to **users**, then select the **Options** tab.
-
-5. Enable **OAuth2** by toggling the corresponding switch.
-
-6. Click **+ Add provider** and select **OpenID Connect**.
-
-7. Enter the following details from the authentik provider:
- - Set **Client ID** to _client-id_
- - Set **Client secret** to _client-secret_
- - Set **Display name** to **authentik**
- - Set **Auth URL** to https://_authentik.company_/application/o/authorize/
- - Set **Token URL** to https://_authentik.company_/application/o/token/
- - Set **User info URL** to https://_authentik.company_/application/o/userinfo/
-
## Test the login
-- Open your web browser and go to: https://_beszel.company_.
+- Open your web browser and go to: https://beszel.company.
- Click **authentik** to log in.
-- You should be redirected to authentik (following the login flow you configured). After logging in, authentik will redirect you back to https://_beszel.company_.
+- You should be redirected to authentik (following the login flow you configured). After logging in, authentik will redirect you back to https://beszel.company.
- If you successfully return to the Beszel WebGUI, the login is working correctly.
## User Creation
@@ -87,7 +44,7 @@ Leave the rest as default values.
- Users are not created automatically when logging in with authentik. The owner must manually create each user in Beszel.
- To create users, go to the System Settings where you configured OpenID Connect.
- - The URL for user creation is: https://_beszel.company_/\_/#/collections?collection=pb_users_auth.
+ - The URL for user creation is: https://beszel.company>/\_/#/collections?collection=pb_users_auth.
- Click **+ New record** and enter the user's **email** (must match the authentik email address).
2. Automatically Creating Users:
From b82097f1499284c1795f0c512f3bc1460972e449 Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Thu, 6 Mar 2025 07:10:12 +0100
Subject: [PATCH 05/12] index.mdx aktualisieren
Co-authored-by: Tana M Berry
Signed-off-by: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
---
website/integrations/services/beszel/index.mdx | 1 -
1 file changed, 1 deletion(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 2bd344a37c9d..92f2fe05e77e 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -20,7 +20,6 @@ sidebar_label: Beszel
## Preparation
Since Beszel uses PocketBase as its backend, you only need to replace the PocketBase placeholders with the placeholders found on this page.
-You can find the PocketBase documentation here: https://docs.goauthentik.io/integrations/services/pocketbase/.
- `beszel.company` is the FQDN of the Beszel installation.
- `authentik.company` is the FQDN of the authentik installation.
From 76d045fda846e6c9b1155b0e33351fa6b89a7995 Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Thu, 6 Mar 2025 07:10:25 +0100
Subject: [PATCH 06/12] index.mdx aktualisieren
Co-authored-by: Tana M Berry
Signed-off-by: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
---
website/integrations/services/beszel/index.mdx | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 92f2fe05e77e..20249f7001bf 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -30,6 +30,11 @@ Since Beszel uses PocketBase as its backend, you only need to replace the Pocket
This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application.
:::
+## authentik configuration
+
+Since Beszel uses PocketBase as its backend, when you integrate Beszel you can follow the exact same steps used to configure authentik as you did with PocketBase; you only need to replace the PocketBase placeholders with the placeholder FDQNs found above.
+
+You can find the PocketBase documentation here: https://docs.goauthentik.io/integrations/services/pocketbase/.
## Test the login
- Open your web browser and go to: https://beszel.company.
From 2d90c9476b88e818fd734a370ca6555933d6d4c6 Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Thu, 6 Mar 2025 07:10:36 +0100
Subject: [PATCH 07/12] index.mdx aktualisieren
Co-authored-by: Tana M Berry
Signed-off-by: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
---
website/integrations/services/beszel/index.mdx | 1 -
1 file changed, 1 deletion(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 20249f7001bf..9b320cc10757 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -19,7 +19,6 @@ sidebar_label: Beszel
## Preparation
-Since Beszel uses PocketBase as its backend, you only need to replace the PocketBase placeholders with the placeholders found on this page.
- `beszel.company` is the FQDN of the Beszel installation.
- `authentik.company` is the FQDN of the authentik installation.
From 8d231df5e73687e481078c7f855148a248a53958 Mon Sep 17 00:00:00 2001
From: Tana M Berry
Date: Fri, 14 Mar 2025 19:36:07 +0100
Subject: [PATCH 08/12] add full instructions
---
.../integrations/services/beszel/index.mdx | 24 +++++++++++++++----
1 file changed, 19 insertions(+), 5 deletions(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 9b320cc10757..6e9e318abc9a 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -19,21 +19,35 @@ sidebar_label: Beszel
## Preparation
-
- `beszel.company` is the FQDN of the Beszel installation.
- `authentik.company` is the FQDN of the authentik installation.
-- `Beszel` is the Name of the authentik application.
-- `beszel` is the Slug of the authentik application.
:::note
+
This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application.
+
:::
## authentik configuration
-Since Beszel uses PocketBase as its backend, when you integrate Beszel you can follow the exact same steps used to configure authentik as you did with PocketBase; you only need to replace the PocketBase placeholders with the placeholder FDQNs found above.
+The steps to configure authentik include creating an application and provider pair in authentik, obtaining the Client ID, Client Secret, and slug values, setting the redirect URI, and selecting a signing key.
+
+1. Log in to authentik as an admin, and open the authentik Admin interface.
+2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair.
+- **Application**: provide a descriptive name ()`Beszel`), a slug (`bezsel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
+- **Choose a Provider type**: OAuth2/OpenID
+- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and any required configurations.
+ - Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later.
+ - Set a `Strict` redirect URI to `https://pgadmin.company/oauth2/authorize`.
+ - Select any available signing key.
+- **Configure Bindings** _(optional):_ you can create a [binding](https://docs.goauthentik.io/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user’s \***\*My applications** \*_page_.\*
+
+3. Click **Submit** to save the new application and provider.
+
+:::note
+Beszel uses PocketBase as its server backend, and when you install Beszel you automatically get Pocketbase as part of Beszel, so you do not need to separately integrate Pocketbase. You can find the PocketBase integration guide here: https://docs.goauthentik.io/integrations/services/pocketbase/.
+:::
-You can find the PocketBase documentation here: https://docs.goauthentik.io/integrations/services/pocketbase/.
## Test the login
- Open your web browser and go to: https://beszel.company.
From 8a4ea85d363251213f3b305d0a2fbed1045c2e1b Mon Sep 17 00:00:00 2001
From: Tana M Berry
Date: Fri, 14 Mar 2025 19:43:15 +0100
Subject: [PATCH 09/12] add Beszel config
---
website/integrations/services/beszel/index.mdx | 17 +++++++++++++++++
1 file changed, 17 insertions(+)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 6e9e318abc9a..ed11dae92536 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -34,6 +34,7 @@ The steps to configure authentik include creating an application and provider pa
1. Log in to authentik as an admin, and open the authentik Admin interface.
2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair.
+
- **Application**: provide a descriptive name ()`Beszel`), a slug (`bezsel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
- **Choose a Provider type**: OAuth2/OpenID
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and any required configurations.
@@ -48,6 +49,22 @@ The steps to configure authentik include creating an application and provider pa
Beszel uses PocketBase as its server backend, and when you install Beszel you automatically get Pocketbase as part of Beszel, so you do not need to separately integrate Pocketbase. You can find the PocketBase integration guide here: https://docs.goauthentik.io/integrations/services/pocketbase/.
:::
+## Beszel configuration
+
+1. Sign in to Beszel and access the superusers dashboard by navigating to https://beszel.company/\_/#/settings.
+2. Toggle off **Hide collection create and edit controls**," then click the **Save changes** button.
+3. Open the **users** collection by clicking the **Collections** icon on the sidebar or head to https://beszel.company/\_/#/collections?collection=pb_users_auth.
+4. Click the gear icon next to the collection's name, then select the **Options** tab in the popup on the right.
+5. Enable the **OAuth2** authentication method by clicking the **OAuth2** tab and toggling **Enable**.
+6. Click **+ Add provider**, then select **OpenID Connect**.
+7. Enter the following details from the authentik provider:
+ - Set **Client ID** to the Client ID copied from authentik.
+ - Set **Client secret** to the Client Secret copied from authentik.
+ - Set **Display name** to `authentik`.
+ - Set **Auth URL** to https://authentik.company/application/o/authorize/.
+ - Set **Token URL** to https://authentik.company/application/o/token/.
+ - Make sure **Fetch user info from** is set to `User info URL`, then set **User info URL** to https://authentik.company/application/o/userinfo/
+
## Test the login
- Open your web browser and go to: https://beszel.company.
From 0ab0cd57c4f715bcdb029718b96db01d1a7ac6e3 Mon Sep 17 00:00:00 2001
From: Tana M Berry
Date: Fri, 14 Mar 2025 16:35:25 -0500
Subject: [PATCH 10/12] Update website/integrations/services/beszel/index.mdx
Signed-off-by: Tana M Berry
---
website/integrations/services/beszel/index.mdx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index ed11dae92536..09f57acd150e 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -35,7 +35,7 @@ The steps to configure authentik include creating an application and provider pa
1. Log in to authentik as an admin, and open the authentik Admin interface.
2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair.
-- **Application**: provide a descriptive name ()`Beszel`), a slug (`bezsel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
+- **Application**: provide a descriptive name ()`Beszel`), a slug (`beszel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
- **Choose a Provider type**: OAuth2/OpenID
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and any required configurations.
- Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later.
From 82eadd46db52882d6e8e227220b383206e97f622 Mon Sep 17 00:00:00 2001
From: Tana M Berry
Date: Fri, 14 Mar 2025 16:38:34 -0500
Subject: [PATCH 11/12] Update website/integrations/services/beszel/index.mdx
Signed-off-by: Tana M Berry
---
website/integrations/services/beszel/index.mdx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index 09f57acd150e..e477293a0b50 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -35,7 +35,7 @@ The steps to configure authentik include creating an application and provider pa
1. Log in to authentik as an admin, and open the authentik Admin interface.
2. Navigate to **Applications** > **Applications** and click **Create with Provider** to create an application and provider pair.
-- **Application**: provide a descriptive name ()`Beszel`), a slug (`beszel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
+- **Application**: provide a descriptive name (`Beszel`), a slug (`beszel`), an optional group for the type of application, the policy engine mode, and optional UI settings.
- **Choose a Provider type**: OAuth2/OpenID
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and any required configurations.
- Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later.
From bcaea2e92e06c1f45894f791ab61a90a030437c2 Mon Sep 17 00:00:00 2001
From: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
Date: Fri, 14 Mar 2025 23:44:08 +0100
Subject: [PATCH 12/12] correct redirect URI
Signed-off-by: NiceDevil <17103076+nicedevil007@users.noreply.github.com>
---
website/integrations/services/beszel/index.mdx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/website/integrations/services/beszel/index.mdx b/website/integrations/services/beszel/index.mdx
index e477293a0b50..ea2a1ce21ff3 100644
--- a/website/integrations/services/beszel/index.mdx
+++ b/website/integrations/services/beszel/index.mdx
@@ -39,7 +39,7 @@ The steps to configure authentik include creating an application and provider pa
- **Choose a Provider type**: OAuth2/OpenID
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and any required configurations.
- Note the **Client ID**, **Client Secret**, and **slug** values because they will be required later.
- - Set a `Strict` redirect URI to `https://pgadmin.company/oauth2/authorize`.
+ - Set a `Strict` redirect URI to https://beszel.company/api/oauth2-redirect.
- Select any available signing key.
- **Configure Bindings** _(optional):_ you can create a [binding](https://docs.goauthentik.io/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user’s \***\*My applications** \*_page_.\*