-
-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bypass Auth for Internal Addresses #181
Comments
@jjmoffitt , not at the moment. Currently, you can setup to bypass auth for a specific URL, i.e. not based on the source of HTTP request. See I long wanted to implement a network filter as part of this plugin. Perhaps it is time 😄 |
I was able to bypass auth on the local network by using handles:
The internal network IPs will match the first handle which doesn't have the authorize policy, all the others will match the second that has. |
@CruzMarcio I also wanted to bypass auth on local network, by using handles, but I get this error: |
Can you paste your Caddyfile here? Remove the private info like addresses or keys. |
{
} (tls_config) { ...*.com {
} |
handle { Should be "authorize" not "authenticate" handle { |
It makes no difference at all. |
I just found out how to make it work.
|
I've got the authentication all setup and I am very happy with the protection it gives me. My only question is if it's possible for me to allow either an internal network to bypass the authentication or if I can somehow use certificates on my devices to auto auth? I looked through the documentation, and I saw some stuff that might be what I wanted but I wasn't sure.
Thanks!
The text was updated successfully, but these errors were encountered: