Course, feel free to DM if you have questions.
This is a common setup. Have a firewall block all traffic. Use docker to punch a hole through the firewall and expose only 443 to the reverse proxy. Now any container can be routed through the reverse proxy as long as the container is on the same docker network.
If you define no network, the containers are put into a default bridge network, use docker inspect to see the container ips.
Here is an example of how to define a custom docker network called “proxy_net” and statically set each container ip.
networks:
proxy_net:
driver: bridge
ipam:
config:
- subnet: 172.28.0.0/16
services:
app1:
image: nginx:latest
container_name: app1
networks:
proxy_net:
ipv4_address: 172.28.0.10
ports:
- "8080:80"
whoami:
image: containous/whoami:latest
container_name: whoami
networks:
proxy_net:
ipv4_address: 172.28.0.11
Notice how “who am I” is not exposed at all. The nginx container can now serve the whoami container with the proper config, pointing at 172.28.0.11.






You can use Authentik to setup an LDAP outpost then use a jellyfin LDAP plug-in to sync everything up.
https://github.com/jellyfin/jellyfin-plugin-ldapauth?tab=readme-ov-file