This is a build environment to build a docker image for privacyIDEA based on official Python image and PrivacyIDEA
Tip
If you like this project and find it useful, please consider starring ⭐ it on GitHub to help it reach more people and get more feedback.
The docker image is a self-contained Debian with privacyIDEA installed, which will run on every distribution.
Note
Disclaimer: The respective trademarks mentioned in the offering are owned by the respective companies. We do not provide a commercial license for any of these products. This listing has an open-source license. privacyIDEA is run and maintained by NetKnights, which is a complete and separate project from kheeklab.
The image is stored in bellow registries:
The image tags are following privacyIDEA version e.g. 3.9.1
and latest
. The default tag is latest
is not suitable for production environments as it might not test all use cases.
Tag | Description |
---|---|
latest |
The latest image build from main branch |
3.10 3.10-python-3.12.7-bulseye |
The image specified tag |
To build the image
make build
Run it with
make run
Login to http://localhost with admin/privacyidea
Caution
The default configuration provide in this reposotory contains fixed credentials and encryption keys for testing and demo purposes. It should not be used in a production environment.Please refer to the configuration section below for more details.
Additional notes:
- Production environments should use environment variables or other secure methods to store sensitive information.
- Fixed credentials and encryption keys can be easily compromised if exposed, leading to security breaches.
- It is important to take all necessary precautions to protect sensitive data in production environments.
The kheeklab privacyIDEA container can create a default admin user by setting the following environment variables:
PI_ADMIN_USER
: Administrator default user. Default: admin.PI_ADMIN_PASSWORD
: Administrator default password. Default: privacyidea
Environment Variable | Description | Default |
---|---|---|
PI_ADMIN_USER |
Initial admin user for privacyIDEA login | admin |
PI_ADMIN_PASSWORD |
Initial admin password | privacyidea |
PI_DB_VENDOR |
Database vendor | sqlite |
PI_DB_USER |
Database user | |
PI_DB_PASSWORD |
Database password | |
PI_DB_NAME |
Database name | |
PI_DB_HOST |
Database host. For on postgres use it support multiple hosts with comma separated | |
PI_DB_PORT |
Database port. For on postgres use it support multiple hosts with comma separated | depnds on PI_DB_VENDOR default for each type |
PI_DB_ARGS |
Addiitional DB attributes | |
SQLALCHEMY_DATABASE_URI |
Full SQL connection string. If set it will override all PI_DB_* settings | |
PI_CACHE_TYPE |
privacyIDEA cache type | simple |
PI_PEPPER |
This is used to encrypt the admin passwords | |
PI_AUDIT_NO_SIGN |
If you by any reason want to avoid signing audit entries set it true | false |
PI_AUDIT_KEY_PRIVATE_PATH |
This is used to sign the audit log | |
PI_AUDIT_KEY_PUBLIC_PATH |
This is used to sign the audit log | |
PI_ENCFILE |
This is used to encrypt the token data and token passwords | |
PI_HSM |
privacyIDEA HSM | default |
PI_LOGFILE |
privacyIDEA log file location | /var/log/privacyidea/privacyidea.log |
PI_LOGLEVEL |
privacyIDEA log level | INFO |
PI_SECRET_KEY |
This is used to encrypt the auth_token | |
PI_SUPERUSER_REALM |
The realm, where users are allowed to login as administrators in comma separated value | administrator |
PI_SKIP_BOOTSTRAP |
Set this to true to prevent the container to run setup again | false |
PI_AUTO_UPDATE |
Set this to true to automatically update privacyIDEA. Only effect when PI_SKIP_BOOTSTRAP is set to true |
false |
Warning
Be careful and setting PI_SKIP_BOOTSTRAP
to true after first initialization. This will prevent the container to run setup again or your data such as admin credentials, secret keys, etc will be overwritten.
PI_AUTO_UPDATE
set to true will update privacyIDEA to the latest version. Make sure you have backup your data before setting PI_AUTO_UPDATE
to true.
Environment Variable | Description | Default |
---|---|---|
GUNICORN_ACCESS_LOGFILE |
Gunicorn access log file location | stdout |
GUNICORN_ERROR_LOGFILE |
Gunicorn error log file location | stderr |
GUNICORN_WORKER_CLASS |
Gunicorn worker class | sync |
GUNICORN_WORKERS |
Gunicorn workers | 1 |
GUNICORN_BIND |
Gunicorn bind address if not set GUNICORN_HOST and GUNICORN_PORT will be used |
None |
GUNICORN_HOST |
Gunicorn host will be ingored if GUNICORN_BIND is set |
0.0.0.0 |
GUNICORN_PORT |
Gunicorn port will be ingored if GUNICORN_BIND is set |
8080 |
GUNICORN_LOGLEVEL |
Gunicorn log level | INFO |
GUNICORN_TIMEOUT |
Gunicorn timeout | 60 |
The privacyIDEA container uses the files you provide to execute the following use cases:
- Configure PrivacyIDEA with configuration files
- Run scripts
All of the use cases can be triggered on container creation when the container finds files in specific folders within key container folders.
- /mnt/privacyidea
- /user/local/privacyidea/scripts
The Container Lifecycle and API specifies the scanned subfolders, the phases in which the container scans them, and the actions taken on their files.
You can provide files to the container in several ways.
All of the use cases require making files available on container creation. Bind mounts and volumes accomplish this. Applying config files can be accomplished on container creation using bind mounts and volumes, or at run time using docker cp.
Bind mounts are used in the examples here as they are simpler than volumes for providing files. As you prepare files for mounting to a container, it’s helpful to organize them in a way that’s easiest for you to manage. Bind mounting to privacyIDEA containers, organizing files, and using docker cp are covered here.
You can specify any number of bind mounts to a docker run command. Each bind mount follows this format:
-v [source path in host]:[destination path in container]
The bind mount source can be any folder path or file path in the host. The bind mount destination can be any folder path or file path in the container.
The container scans these folders.
- /mnt/privacyidea/files (all files and subfolders are scanned)
- /mnt/privacyidea/scripts
- /usr/local/privacyidea/scripts/post-shutdown
- /usr/local/privacyidea/scripts/pre-configure
- /usr/local/privacyidea/scripts/pre-startup
At a high level, the container starts gunicorn with privacyIDEA deployed on it. Additionally, however, the container entry point provides an API for executing these use cases:
- Invoking scripts
The container provides an API for triggering and configuring these use cases. It executes the use cases in different phases of its lifecycle.
After you create a container in an environment, the container entry point executes the following lifecycle phases in that environment:
- Pre-configure: Runs user-provided scripts before configuring privacyIDEA.
- Configure: Prepares for running privacyIDEA.
- Set Python's runtime environment.
- Run user-provided scripts.
- Pre-startup: Runs user-provided scripts before starting privacyIDEA.
- PrivacyIDEA startup: Launches privacyIDEA.
- Post-shutdown: Runs user-provided scripts after privacyIDEA stops.
The container entry point scans the following container folders for files and uses those files to configure the container and privacyIDEA and to act on privacyIDEA.
- /mnt/privacyidea
- /user/local/privacyidea/scripts
The key folders above have subfolders that are designated for specific actions. The subfolders, the actions taken on their files, and associated use cases are listed in lifecycle phase order in the following sections.
We'd love for you to contribute to this container. You can request new features by creating an issue, or submitting a pull request with your contribution.