Authentik + Grafana: OAuth SSO Across VLANs and the 11 Things That Broke

The views and opinions expressed on this site are my own and do not reflect the views of my employer. This content is based entirely on publicly available documentation for open-source tools and does not contain proprietary information from any current or former employer. Intentionally Insecure Lab Environment This deployment is deliberately configured without TLS, reverse proxies, or secrets management. It exists to expose and document the full attack surface of a vanilla monitoring stack so that hardening decisions in later phases are informed, not assumed. ...

February 14, 2026 · 25 min · Oob Skulden�