apiVersion: external-secrets.io/v1 kind: ExternalSecret metadata: name: authelia-secrets namespace: authelia spec: refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore name: vault-backend target: name: authelia-secrets creationPolicy: Owner data: # Storage password (PostgreSQL) - secretKey: storage.postgres.password.txt remoteRef: key: storage/postgresql property: PASSWORD # Session encryption key - secretKey: session.encryption.key remoteRef: key: security/authelia property: SESSION_SECRET # Storage encryption key - secretKey: storage.encryption.key remoteRef: key: security/authelia property: STORAGE_ENCRYPTION_KEY # JWT HMAC key for identity validation (password reset) - secretKey: identity_validation.reset_password.jwt.hmac.key remoteRef: key: security/authelia property: JWT_HMAC_KEY # OIDC HMAC key - secretKey: identity_providers.oidc.hmac.key remoteRef: key: security/authelia property: OIDC_HMAC_SECRET # OIDC JWKS private key - secretKey: identity_providers.oidc.jwks.key remoteRef: key: security/authelia property: OIDC_JWKS_PRIVATE_KEY # Headlamp OIDC client secret - secretKey: HEADLAMP_CLIENT_SECRET remoteRef: key: security/authelia property: HEADLAMP_CLIENT_SECRET # Vault OIDC client secret - secretKey: VAULT_CLIENT_SECRET remoteRef: key: security/authelia property: VAULT_CLIENT_SECRET # Zot OIDC client secret - secretKey: ZOT_CLIENT_SECRET remoteRef: key: security/authelia property: ZOT_CLIENT_SECRET