<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://rmm.li/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://rmm.li/wiki/feed.php">
        <title>RMM DokuWiki - linux_server_manuals</title>
        <description></description>
        <link>https://rmm.li/wiki/</link>
        <image rdf:resource="https://rmm.li/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-11T17:23:12+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:2fa_authentication&amp;rev=1516357326&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:apache_http_2_php-fpm&amp;rev=1629297978&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:docker_keycloak_container_with_local_postgresql&amp;rev=1554313890&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:dokuwiki_authentication_against_keycloak&amp;rev=1517416759&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:dovecot_ldap_rspamd&amp;rev=1517165362&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:keycloak_openldap_integration&amp;rev=1526142513&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_ldap_integration&amp;rev=1517503787&amp;do=diff"/>
                <rdf:li rdf:resource="https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_saml_authentication_against_keycloak&amp;rev=1687713896&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://rmm.li/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>RMM DokuWiki</title>
        <link>https://rmm.li/wiki/</link>
        <url>https://rmm.li/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:2fa_authentication&amp;rev=1516357326&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-19T10:22:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Use 2FA Authentication over SSH (as Fallback for SSH-keys)</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:2fa_authentication&amp;rev=1516357326&amp;do=diff</link>
        <description>Use 2FA Authentication over SSH (as Fallback for SSH-keys)

We will install 2FA (Two Factor) authentication over SSH.
Afterwards we can authenticate as usually using ssh-keys, but as fallback, if we loose our SSH-key, or are sitting on an other computer, we can connect using the 2FA authentication. This is the root password plus a string which changes every 30 seconds.
The second factor we get with our smartphone. On an android based phone you can use andOTP oder freeOTP which you can get both o…</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:apache_http_2_php-fpm&amp;rev=1629297978&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-08-18T14:46:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Apache Web Server with mpm_event, mod_proxy_fcgi, php-fpm and HTTP/2</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:apache_http_2_php-fpm&amp;rev=1629297978&amp;do=diff</link>
        <description>Apache Web Server with mpm_event, mod_proxy_fcgi, php-fpm and HTTP/2

When installing a web server, there are certain chances that you will use webapplications which depend on PHP. Unfortunately php (7) is not thread safe. This means when using Apache, you&#039;ll have to use mpm_prefork, which is slow when there are a lot of conections, uses a lot of memory and only partially supports HTTP/2 (As it seems in newer versions of apache it&#039;s not supported at all). Therefore, to use mpm_event with php, we…</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:docker_keycloak_container_with_local_postgresql&amp;rev=1554313890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-03T17:51:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Install Keycloak as Docker Container with Apache Web Server as Reverse Proxy and a local PostgreSQL</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:docker_keycloak_container_with_local_postgresql&amp;rev=1554313890&amp;do=diff</link>
        <description>Install Keycloak as Docker Container with Apache Web Server as Reverse Proxy and a local PostgreSQL

Keycloak is an Identity and Access management solution. Which supports SSO (Single Sign on), i.e. if you have several webpages (services) to which you need to authenticate, it is enough if you authenticate only to one of them, and then you are automatically authenticated to all of them. The SSO Identity Providers of keycloak are SAML 2.0 and OpenID Connect, CAS can be added over a plugin. For mor…</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:dokuwiki_authentication_against_keycloak&amp;rev=1517416759&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-31T16:39:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Dokuwiki authentication against Keycloak</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:dokuwiki_authentication_against_keycloak&amp;rev=1517416759&amp;do=diff</link>
        <description>Dokuwiki authentication against Keycloak

There exists basically no documentation about how to do that proberly, and also the error messages from the plugin, are not helping in any way...

So to get the whole thing working:

Keycloak Config

Add a new client with following settings:</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:dovecot_ldap_rspamd&amp;rev=1517165362&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-28T18:49:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Dovecot + Postfix + Ldap (keycloak) + solr + Rspamd</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:dovecot_ldap_rspamd&amp;rev=1517165362&amp;do=diff</link>
        <description>Dovecot + Postfix + Ldap (keycloak) + solr + Rspamd

Postfix will be used to receive mails, it will use Rspamd as effective spam filter and check over LMTP with dovecot if mail adresses exists and if yes, deliver them to dovecot, as long as rspamd doesn&#039;t reject the mail.
Dovecot will authenticate user against an Ldap server and only accepts mail for users of the group mail. The Ldap data actually come from an keycloak installation, but that is irrelevant here</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:keycloak_openldap_integration&amp;rev=1526142513&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-05-12T16:28:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Setup openLDAP and integrate it with Keycloak</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:keycloak_openldap_integration&amp;rev=1526142513&amp;do=diff</link>
        <description>Setup openLDAP and integrate it with Keycloak

For that manual, we assume that you&#039;ve already got a working Keycloak installation. Otherwise take a look at Install Keycloak as Docker Container with Apache Web Server as Reverse Proxy and a local PostgreSQL first.
The manual was written for Debian Stretch, but should also work with other distributions.</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_ldap_integration&amp;rev=1517503787&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-02-01T16:49:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Integrate LDAP into Nextcloud</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_ldap_integration&amp;rev=1517503787&amp;do=diff</link>
        <description>Integrate LDAP into Nextcloud

Nextcloud can use LDAP for authentication, to get user groups, and even lets user change their passwords directly in the LDAP directory.

The whole LDAP integration process is pretty straight forward, I mainly write it down here, so I remember it myself</description>
    </item>
    <item rdf:about="https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_saml_authentication_against_keycloak&amp;rev=1687713896&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-25T17:24:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Keycloak as (SAML) SSO-Authentication provider for Nextcloud</title>
        <link>https://rmm.li/wiki/doku.php?id=linux_server_manuals:nextcloud_saml_authentication_against_keycloak&amp;rev=1687713896&amp;do=diff</link>
        <description>Keycloak as (SAML) SSO-Authentication provider for Nextcloud

We can use Keycloak as SSO (Single Sign On) authentication provider for nextcloud using SAML. Unfortunately the SAML plugin for nextcloud doesn&#039;t support groups (yet?). If you need/want to use them, you can get them over LDAP. Therefor you want to use</description>
    </item>
</rdf:RDF>
