mirror of
https://github.com/juanfont/headscale.git
synced 2025-07-13 19:11:08 -04:00
Restructure and rewrite the OpenID Connect documentation. Start from the most minimal configuration and describe what needs to be done both in Headscale and the identity provider. Describe additional features such as PKCE and authorization filters in a generic manner with examples. Document how Headscale populates its user profile and how it relates to OIDC claims. This is a revised version from the table in the changelog. Document the validation rules for fields and extend known limitations. Sort the provider specific section alphabetically and add a section for Authelia, Authentik, Kanidm and Keycloak. Also simplify and rename Azure to Entra ID. Update the description for the oidc section in the example configuration. Give a short explanation of each configuration setting. All documentend features were tested with Headscale 0.26 (using a fresh database each time) using the following identity providers: * Authelia * Authentik * Kanidm * Keycloak Fixes: #2295
2.4 KiB
2.4 KiB
Features
Headscale aims to implement a self-hosted, open source alternative to the Tailscale control server. Headscale's goal is to provide self-hosters and hobbyists with an open-source server they can use for their projects and labs. This page provides on overview of Headscale's feature and compatibility with the Tailscale control server:
- Full "base" support of Tailscale's features
- Node registration
- Interactive
- Pre authenticated key
- DNS
- Taildrop (File Sharing)
- Routes
- Dual stack (IPv4 and IPv6)
- Ephemeral nodes
- Embedded DERP server
- Access control lists (GitHub label "policy")
- ACL management via API
- Some Autogroups, currently:
autogroup:internet
,autogroup:nonroot
,autogroup:member
,autogroup:tagged
- Auto approvers for subnet routers and exit nodes
- Tailscale SSH
- Node registration using Single-Sign-On (OpenID Connect) (GitHub label "OIDC")
- Basic registration
- Update user profile from identity provider
- OIDC groups cannot be used in ACLs