thecomputerguy7

joined 11 months ago
[–] [email protected] 1 points 10 months ago

I was actually looking at Keycloak myself due to needing something more “professional looking” and something more “enterprise-y” which translates to our security guy hearing more about keycloak than authentik. They all should work somewhat the same though, and have the same end functionality.

I’m not sure of the technical stuff, but I believe you could use something like Oauth2 Proxy in front of your services, but that may or may not be more trouble than it’s worth, assuming it works the way I think it does. I could be wrong.

[–] [email protected] 1 points 10 months ago (1 children)

Does this work with SSH keys?

[–] [email protected] 1 points 11 months ago

I really appreciate you mentioning this as I’m looking for something small and light for work as well. We have a hundred or so Pi’s that are critical enough to need management and monitoring, but not critical enough to actually spend money on a RMM or something from one of the big guys.

Right now I’m setting up ansible and getting everything in place, but I’d love something that is more agent based and not just a reoccurring script.

[–] [email protected] 1 points 11 months ago (2 children)

There was TacticalRMM but there was some controversy around a crypto miner baked into a private installer. Thought of trying it in my isolated network, but can’t decide how I feel about it.