Add optional Forward Auth support to integrate Fizzy with reverse-proxy SSO (Zero Trust / Enterprise gateway auth) #2488
Unanswered
soulteary
asked this question in
Ideas and Issue Triage
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi maintainers — I’d like to propose adding optional Forward Auth support to Fizzy so it can natively integrate with common reverse-proxy / gateway authentication setups (Traefik/Nginx/Zero Trust gateways, etc.).
The real problem this solves
In many orgs, authentication is centralized at the edge: users authenticate via an IdP (OIDC/SAML/MFA/OTP) and the gateway forwards requests to apps with identity headers such as
X-Auth-Email/X-Auth-User.In those deployments, requiring each app to run its own login flow (or depend on magic-link email delivery) is friction and sometimes not even feasible (no outbound SMTP, restricted email flows, internal-only networks).
Why this is valuable for Fizzy
Security / risk controls
The only scary part is header spoofing, so the feature must be strictly trust-gated:
FORWARD_AUTH_TRUSTED_IPS),FORWARD_AUTH_SECRET_HEADER+FORWARD_AUTH_SECRET).This keeps it safe and clearly “enterprise-configured,” not a default-open surface area.
Why now
PR #2485 already structures this as a clean, configurable integration:
Requested outcome
I’d love to see this supported as an official, optional “Forward Auth / reverse-proxy SSO integration” path for self-hosters:
Even if it lands as “experimental behind config” initially, I believe this is one of those features where a small, well-guarded change unlocks a large set of real-world enterprise deployments.
Beta Was this translation helpful? Give feedback.
All reactions