Skip to content

Traefik ForwardAuth middleware server to verify JWT assertions from Cloudflare Access.

License

Notifications You must be signed in to change notification settings

aperim/traefik-forwardauth-cloudflare-teams

 
 

Repository files navigation

Traefik ForwardAuth server for Cloudflare Teams/Access

GitHub release (latest SemVer including pre-releases) GitHub GitHub Workflow Status

A really simple Docker container that runs a Flask server to validate the Cf-Access-Jwt-Assertion header from Cloudflare Access for authenticating requests using Traefik's ForwardAuth middleware.

Getting started

You'll need two pieces of information:

  • Your Cloudflare Teams domain. E.g.: test.cloudflareaccess.com
  • Your Access application's audience tag (AUD).

Configure a ForwardAuth middleware address: http://traefik-forwardauth-cloudflare-teams:8000/auth/{AUD} (replace {AUD} with your audience tag).

The same container can be reused for multiple Access applications as long as they all use the same teams domain (since the audience tag is configured per-middleware).

Build the image

docker build .

docker-compose example

services:
  traefik:
    image: "traefik:2"
    ports: ["443:443"]
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.api.rule=Host(`traefik.example.com`)"
      - "traefik.http.routers.api.service=api@internal"
      - "traefik.http.routers.api.entrypoints=https"
      - "traefik.http.routers.api.middlewares=cloudflare-access@docker"
      - "traefik.http.middlewares.cloudflare-access.forwardauth.address=http://traefik-forwardauth-cloudflare-teams:8000/auth/{AUD}"

  traefik-forwardauth-cloudflare-teams:
    image: "ghcr.io/byte-method/traefik-forwardauth-cloudflare-teams:latest"
    environment:
      CF_TEAMS_DOMAIN: "test.cloudflareaccess.com"

About

Traefik ForwardAuth middleware server to verify JWT assertions from Cloudflare Access.

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Languages

  • Dockerfile 50.0%
  • Python 46.8%
  • Shell 3.2%