CalDAV/CardDAV with Radicale and Authelia OIDC - App Password Authentication Not Working #1898
Replies: 2 comments 2 replies
-
|
How do you configure the caldav client? |
Beta Was this translation helpful? Give feedback.
2 replies
-
|
How is proxy.yaml mounted inside the opencloud container? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Environment
opencloudeu/opencloud:latestradicale/radicale.yml)Problem Summary
I have OpenCloud successfully configured with Authelia as an external OIDC provider. Web UI authentication works perfectly, users are auto-provisioned, and I can create app passwords in Settings → Security. However, when CalDAV clients attempt to authenticate using these app passwords, Radicale logs show all requests are received as anonymous:
Current Configuration
Environment Variables (.env)
proxy.yaml
Authelia Client Configuration
Radicale logs show:
How should
proxy.yamlroutes be configured to authenticate app passwords and set theX-Remote-Userheader for Radicale?The current configuration tells OpenCloud:
backend: http://radicale:5232)remote_user_header: X-Remote-User)unprotected: false)But it doesn’t seem to:
X-Remote-Userheader before forwarding to RadicaleAdditional Context
I’ve reviewed multiple discussions (#587, #854, #1830) about Authelia/OIDC integration, but none specifically address CalDAV/CardDAV working with app passwords. Most examples show web UI authentication working, but don’t demonstrate CalDAV clients successfully connecting.
Is there:
proxy.yamlfor Basic Auth validation?Any guidance would be greatly appreciated!
Beta Was this translation helpful? Give feedback.
All reactions