Unchanged3656

joined 2 years ago
[–] Unchanged3656@infosec.pub 2 points 1 year ago (1 children)

After looking deeper into the docs they do not support and do not plan to support the Relying Party role. So it probably won't fit for this use case.

[–] Unchanged3656@infosec.pub 8 points 1 year ago (4 children)

Depending on what you are trying to do, Authelia does have OIDC in beta https://www.authelia.com/roadmap/active/openid-connect/

I use Authelia again since in beta it now supports multiple Pass/FIDO keys via the web interface, and it does work reasonably well.

[–] Unchanged3656@infosec.pub 4 points 2 years ago (1 children)

Probably more. Your app can use the local API then as well. And AWS is insanely expensive, especially if you forget to block log ingestion to Cloudwatch (ask me how I know).

[–] Unchanged3656@infosec.pub 180 points 2 years ago (47 children)

Well, how about having a local API and have no calls at all to your cloud infrastructure? Probably too easy and you cannot lock people into your ecosystem.

[–] Unchanged3656@infosec.pub 4 points 2 years ago* (last edited 2 years ago) (1 children)

Does it though? I had a similar setup in the past, but I did not feel good with it. If your first backup corrupts that corruption is then synced to your remote location. Since then I have two separate backup runs for local and remote. But restic as well with resticprofile. Remote is a SFTP server. For restic I am using the rclone backend for SFTP since I had some connection issues with the internal SFTP backend (on connection resets it would just abort and not try to reconnect, but I think it got improved since then)

view more: ‹ prev next ›