
If you are using lets encrypt directly from traefik you can generate the certificates from acme.json and upload them to pritunl. The purpose is to generate certificates for the admin console but also for service or user interface for ssh access. Note At this step your pritunl instance pushes an invalid certificate. Generate the password with the command pritunl-zero default-password for a docker connect on the instance with the command docker exec.Ĭonnect on the interface and click on Certificates to set the certificates used through pritunl. Once the docker-compose up the pritunl instance is available on :444 That mean we will create two ssl ssl certificates for these two records.įinally the pritunldb is hosted with a mongodb container available on the classic ports 27017. The labels section is lanaged through traefik, we add 2 routes to join the server : The container is linked to a mongo db database where we create a pritunl-zero db, Node ID represents the instance pritunl zero. We put these ports behind 81 and 444 the port 4444 is not required but we will use it later. Pritunl should be available on the HTTP and HTTPS ports but they are already used with Traefik. In the environment section we set the dns provider information for let’s encrypt. The Traefik container listens on the HTTP and HTTPS ports of the server and also generates the SSL certificate with let’s encrypt. "MONGO_URI=mongodb://pritunldb:27017/pritunl-zero" "/var/run/docker.sock:/var/run/docker.sock:ro"


Let’s take a look to the docker-compose file : version: "3.7"

Our environment is a hosted web server with Traefik as proxy, Pritunl will be installed in a container with docker-compose.
PRITUNL USING PORT 80 HOW TO
Service can be ssh web in this article we will see how to implement pritunl zero in environment with docker and Traefik. Pritunl Zero is a zero trust system that provides secure authenticated access to internal services from untrusted networks without the use of a VPN.
