Greetings everyone! Daniel here, I’ve been working on Linkwarden part-time over the past few months.

Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages.

Key features:

  • 📸 Preserve webpages as Screenshot, PDF, etc. So you can access them even if they are taken down.
  • 👥 Collaborative, so you can share your collections with your friends and colleagues. You can also make them public and share them with the world.
  • 📱 Designed for every screen size, from widescreen monitors down to smartphones.
  • ⚡️ Open source and fully self-hostable!
  • ✨ And so many more features! (Literally, just didn’t want to make this post too long. Check out the Github repo and Website for more info…)

If you like what we’re doing, you can support the project by either starring ⭐️ the repo to make it more visible to others or by subscribing to the Cloud plan (which helps the project, a lot).

Things like mobile app are already on the project roadmap and I’m so excited to share them with you in the future.

Feedback is always welcome, so feel free to share your thoughts!

Website: https://linkwarden.app

GitHub: https://github.com/linkwarden/linkwarden

  • Kir@feddit.it
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    I’m intrigued. How does it work? Do you have a link or an article to point me to?

    • Lem453@lemmy.ca
      link
      fedilink
      English
      arrow-up
      16
      ·
      edit-2
      1 year ago

      The general principle is called single sign on (sso).

      The idea is that instead of each all keeping track of users itself, there is another app (sometimes called an identity provider) that does this. Then when you try to log into an app, it takes to the to login of your identity provider instead. When the IP says you are the correct user, it sends a token to the app saying to let you access your account.

      The huge benefits are if you are already logged into the IP on a browser for example, the other apps will login automatically without having to put in your password again.

      Also for me the biggest benefit is not having to manage passwords for a large number of apps so family that uses my server have 1 account which gives them access to jellyfin, seafile, immich, freshrss etc. If they change that password it changes it for everything. You can enforce minimum password requirements. You can also add 2FA to any app now immediately.

      I use Authentik as my identity provider: https://goauthentik.io/https://goauthentik.io/

      There’s good guides to settings it up with traefik so that you get let encrypt certificates and can use traefik for proxy authentication on web based apps like sonarr. There are many different authentication methods an app can choose to use and Authentik essentially supports everything.

      https://youtu.be/CPURnYaW3Zk

      SSO should really be the standard for self hosted apps because this way they don’t have to worry about ensuring they have the latest security for user management etc. The app just allows a dedicated identity provider to worry about user management security so the app devs can focus on just the app.

      • dan@upvote.au
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Authentik is pretty good. Authelia is good too, and lighter weight.

        You can combine Authelia with LLDAP to get a web UI for user management and LDAP for apps that don’t support OpenID Connect (like Home Assistant).

        • Lem453@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          If you have to add a whole other app the match what authentik can do, is authelia really lighter weight?

          Im joking because authentik does takes a decent chunk of ram but having all protocols together is nice. You can actually make ldap authentication 2FA if you want.

          • dan@upvote.au
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Interesting… How does Authentik do 2FA for LDAP?

            I’m going to try it out and see how it compares to Authelia. My home server has 64GB RAM and I have VPSes with 16GB and 48GB RAM so RAM isn’t much of an issue :D

              • dan@upvote.au
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                1 year ago

                LDAP sends username and password over the network though… It doesn’t use regular web-based authentication. How would it add 2FA to that?

                • Lem453@lemmy.ca
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 year ago

                  The above YouTube video shows that you can get authentik to send a 2fa push authentication that requires the phone to hit a button in order to complete the authentication flow.

                  • dan@upvote.au
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    1 year ago

                    Ohhhh, interesting. Sorry, I didn’t watch the video yet. Thank you!!

      • Kir@feddit.it
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Thank you for the detailed answer! It seems really interesting and I will definitely give a try on my server!