Unchanged3656

joined 1 year ago
[–] [email protected] 2 points 1 year ago (1 children)

After looking deeper into the docs they do not support and do not plan to support the Relying Party role. So it probably won't fit for this use case.

[–] [email protected] 8 points 1 year ago (4 children)

Depending on what you are trying to do, Authelia does have OIDC in beta https://www.authelia.com/roadmap/active/openid-connect/

I use Authelia again since in beta it now supports multiple Pass/FIDO keys via the web interface, and it does work reasonably well.

[–] [email protected] 4 points 1 year ago (1 children)

Probably more. Your app can use the local API then as well. And AWS is insanely expensive, especially if you forget to block log ingestion to Cloudwatch (ask me how I know).

[–] [email protected] 178 points 1 year ago (47 children)

Well, how about having a local API and have no calls at all to your cloud infrastructure? Probably too easy and you cannot lock people into your ecosystem.

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago) (1 children)

Does it though? I had a similar setup in the past, but I did not feel good with it. If your first backup corrupts that corruption is then synced to your remote location. Since then I have two separate backup runs for local and remote. But restic as well with resticprofile. Remote is a SFTP server. For restic I am using the rclone backend for SFTP since I had some connection issues with the internal SFTP backend (on connection resets it would just abort and not try to reconnect, but I think it got improved since then)

view more: ‹ prev next ›