apiVersion: external-secrets.io/v1 kind: ExternalSecret metadata: name: authelia-secrets namespace: authelia spec: refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore name: vault-backend target: name: authelia-secrets creationPolicy: Owner data: # Storage password (PostgreSQL) - secretKey: storage.postgres.password.txt remoteRef: key: postgresql property: PASSWORD # Session encryption key - secretKey: session.encryption.key remoteRef: key: authelia property: SESSION_SECRET # Storage encryption key - secretKey: storage.encryption.key remoteRef: key: authelia property: STORAGE_ENCRYPTION_KEY # JWT HMAC key for identity validation (password reset) - secretKey: identity_validation.reset_password.jwt.hmac.key remoteRef: key: authelia property: JWT_HMAC_KEY # OIDC HMAC key - secretKey: identity_providers.oidc.hmac.key remoteRef: key: authelia property: OIDC_HMAC_SECRET # OIDC JWKS private key - secretKey: identity_providers.oidc.jwks.key remoteRef: key: authelia property: OIDC_JWKS_PRIVATE_KEY # Headlamp OIDC client secret - secretKey: HEADLAMP_CLIENT_SECRET remoteRef: key: authelia property: HEADLAMP_CLIENT_SECRET # Vault OIDC client secret - secretKey: VAULT_CLIENT_SECRET remoteRef: key: authelia property: VAULT_CLIENT_SECRET # Immich OIDC client secret - secretKey: IMMICH_CLIENT_SECRET remoteRef: key: authelia property: IMMICH_CLIENT_SECRET