authenticationauthentikauthorizationhacktoberfestkubernetesoauth2oauth2-clientoauth2-serveroidcoidc-clientoidc-providerproxyreverse-proxysamlsaml-idpsaml-spsecuritysso
250e23408e
* stages/authenticator_duo: initial duo stage Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages/authenticator_duo: improve setup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages/authenticator_validate: add Duo support Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: make use of oneOf OpenAPI to annotate all challenge types Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outpost: update to new api schema Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outposts/ldap: fix client usage Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outposts/ldap: return user info when user can't search Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: fix linting error Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages: fix stage unittests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: add default challenge response Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web/flows: update types Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: fix mismatched names Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * website/docs: add duo docs Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages/authenticator_duo: add missing duo device Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web/admin: fix enable buttons missing on stages Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages/prompt: annotate PromptChallengeResponse's additionalProperties Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web/flows: improve logging Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix flow titles not being set Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests/e2e: fix invalid flows Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * api: fix error when authorization header has no spaces Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * stages/user_write: handle integrity error Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * outposts: handle disconnects without outpost better Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: allow blank on WithUserInfo Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> |
||
---|---|---|
.github | ||
authentik | ||
cmd/server | ||
internal | ||
lifecycle | ||
outpost | ||
scripts | ||
tests | ||
web | ||
website | ||
xml | ||
.bumpversion.cfg | ||
.dockerignore | ||
.editorconfig | ||
.gitignore | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
Pipfile | ||
Pipfile.lock | ||
README.md | ||
SECURITY.md | ||
azure-pipelines.yml | ||
docker-compose.yml | ||
go.mod | ||
go.sum | ||
manage.py | ||
pyproject.toml | ||
pyrightconfig.json | ||
schema.yml |
README.md
What is authentik?
authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
Installation
For small/test setups it is recommended to use docker-compose, see the documentation
For bigger setups, there is a Helm Chart in the helm/
directory. This is documented here
Screenshots
Light | Dark |
---|---|
Development
Security
See SECURITY.md