defguard
  • Introduction
  • User documentation (help)
    • Configuring VPN
      • Defguard Desktop Client
        • Update instance
      • Other WireGuard® Clients
        • Configuring a device for new VPN Location manually
    • Password change / Reset
    • Enrollment & Onboarding
      • With internal Defguard SSO
      • With external SSO (Google/Microsoft/Custom)
    • Setting up 2FA/MFA
    • Desktop Client
    • CLI Client
  • Admin & features
    • Deploying your instance
      • One-line install script
      • Standalone package based installation
      • Docker images and tags
      • Docker Compose
      • Kubernetes
      • Upgrading
      • Gateway
        • Running gateway on MikroTik routers
      • Securing gRPC communication
      • OpenID RSA key
      • Configuration
      • Pre-production and development releases
      • High Availability and Failover
      • Health check
    • Features & configuration
      • Zero-Trust VPN with 2FA/MFA
        • Create/manage VPN Location
        • Network overview
        • Executing custom gateway commands
        • Multi-Factor Authentication (MFA/2FA)
          • MFA Architecture
        • Remote desktop client configuration
        • DNS and domains
      • Remote user enrollment
        • User onboarding after enrollment
      • SSO (OpenID Connect)
        • Portainer
        • Grafana setup
        • Proxmox
        • Matrix / Synapse
        • Django
        • MinIO
        • Vault
      • SMTP for email notifications
      • YubiKey Provisioning
      • Webhooks
      • Forward auth
      • SSH Authentication
      • Network devices
      • Gateway notifications
      • New version notifications
  • Troubleshooting Guide
    • Sending support information
    • Client Windows installer exit codes
    • Client "All traffic" connection issues
    • WebAuthn security keys
  • Enterprise Features
    • License
    • Enteprise features
      • Automatic (real time) desktop client configuration & sync
      • External OpenID providers
        • Google
        • Microsoft
        • Zitadel
        • Keycloak
        • JumpCloud
        • Okta
        • Custom
      • External OIDC secure enrollment
      • VPN & Client behavior customization
      • REST API
      • Access Control List
        • ACL Aliases
      • LDAP and Active Directory integration
        • Configuration
        • Settings table
        • Two-way LDAP and Active Directory synchronization
  • Tutorials
    • Step by step setting up a VPN server
      • Adding additional VPN locations
  • In depth
    • Roadmap
    • Architecture
      • How do VPN statistics work
      • Security concepts
  • For Developers
    • Contributing
    • Environment setup
    • Translations (core/web)
      • Switching language
      • Adding translations
  • Translations (client)
    • Adding translations
  • Contact us
    • Community & Support
Powered by GitBook
On this page
  • Add Proxmox app to Defguard
  • Proxmox configuration

Was this helpful?

Edit on GitHub
  1. Admin & features
  2. Features & configuration
  3. SSO (OpenID Connect)

Proxmox

PreviousGrafana setupNextMatrix / Synapse

Last updated 1 year ago

Was this helpful?

For Proxmox OIDC to work you'll have to run Defguard with .

Add Proxmox app to Defguard

First, go to the Defguard OpenID tab and click add new app button.

  1. Add the name Proxmox

  2. Add your proxmox address as redirect URL (e.g. https://yourproxmox.com)

  3. Select scopes:

  • OpenID

  • Profile

  • Email

  • Phone

  1. Submit the form.

After successfully adding your app you can see it in the OpenID apps list. When you click on it you will be redirected to the client details page. From this page copy Client ID and Client secret values for later.

Proxmox configuration

  1. Log into your proxmox instance.

  2. Select Datacenter

  3. Select Permissions -> Realms

  1. Select Add -> OpenID Connect Server

  2. Fill in the form:

  • Issuer URL: Your Defguard instance URL (e.g. https://defguard.mycompany.com)

  • Realm: Name for the realm, internal for Proxmox, (e.g. Defguard)

  • Client ID: Client ID you copied after creating Defguard OpenID app

  • Client Key: Client secret you copied after creating Defguard OpenID app

  • Default: leave unchecked

  • Comment: leave empty

  • Autocreate users: check

Without Autocreate users option Proxmox won't be able to create new users, only log in existing ones.

  • Username claim: subject

  • Scopes: openid

  • Prompt: Auth-Provider Default

  1. Save the form.

After logging out of Proxmox you should now be able to select your new realm and login with Defguard using OpenID Connect.

RSA signing key
Proxmox Realm Settings
Proxmox OIDC Form