2021-04-29 16:17:10 +00:00
---
2021-06-08 21:10:17 +00:00
title: Forward auth
2021-04-29 16:17:10 +00:00
---
2021-06-08 21:10:17 +00:00
Using forward auth uses your existing reverse proxy to do the proxying, and only uses the
2021-09-24 13:37:54 +00:00
authentik outpost to check authentication and authorization.
2021-04-29 16:17:10 +00:00
2021-06-08 21:10:17 +00:00
To use forward auth instead of proxying, you have to change a couple of settings.
In the Proxy Provider, make sure to use one of the Forward auth modes.
## Single application
Single application mode works for a single application hosted on its dedicated subdomain. This
has the advantage that you can still do per-application access policies in authentik.
2021-04-29 16:17:10 +00:00
2021-06-08 21:10:17 +00:00
## Domain level
2021-04-29 16:17:10 +00:00
2021-06-08 21:10:17 +00:00
To use forward auth instead of proxying, you have to change a couple of settings.
In the Proxy Provider, make sure to use the *Forward auth (domain level)* mode.
2021-04-29 16:17:10 +00:00
2021-06-08 21:10:17 +00:00
This mode differs from the *Forward auth (single application)* mode in the following points:
- You don't have to configure an application in authentik for each domain
- Users don't have to authorize multiple times
2021-05-14 09:42:03 +00:00
2021-06-08 21:10:17 +00:00
There are however also some downsides, mainly the fact that you **can't** restrict individual
applications to different users.
2021-05-14 09:42:03 +00:00
2021-06-08 21:10:17 +00:00
The only configuration difference between single application and domain level is the host you specify.
2021-05-14 09:42:03 +00:00
2021-06-08 21:10:17 +00:00
For single application, you'd use the domain which the application is running on, and only /akprox
2021-09-24 13:37:54 +00:00
is redirected to the outpost.
2021-04-29 16:17:10 +00:00
2021-06-08 21:10:17 +00:00
For domain level, you'd use the same domain as authentik.
2021-04-29 16:17:10 +00:00
2021-07-23 14:07:47 +00:00
:::info
*example-outpost* is used as a placeholder for the outpost name.
2021-09-17 07:47:27 +00:00
*authentik.company* is used as a placeholder for the authentik install.
2021-07-23 14:07:47 +00:00
:::
2021-04-29 16:17:10 +00:00
## Nginx
import Tabs from '@theme/Tabs';
import TabItem from '@theme/TabItem';
<Tabs
defaultValue="standalone-nginx"
values={[
{label: 'Standalone nginx', value: 'standalone-nginx'},
{label: 'Ingress', value: 'ingress'},
]}>
<TabItem value="standalone-nginx">
```
2021-06-29 18:32:49 +00:00
server {
# SSL and VHost configuration
listen 443 ssl http2;
server_name _;
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
2021-08-14 20:05:23 +00:00
# Increase buffer size for large headers
# This is needed only if you get 'upstream sent too big header while reading response header from upstream' error when trying to access an application protected by goauthentik
proxy_buffers 8 16k;
proxy_buffer_size 32k;
fastcgi_buffers 16 16k;
fastcgi_buffer_size 32k;
2021-06-29 18:32:49 +00:00
location / {
# Put your proxy_pass to your application here
# proxy_pass http://localhost:5000;
# authentik-specific config
2021-09-29 19:36:57 +00:00
auth_request /akprox/auth/nginx;
2021-06-08 21:10:17 +00:00
error_page 401 = @akprox_signin;
2021-10-18 14:35:12 +00:00
# For domain level, use the below error_page to redirect to your authentik server with the full redirect path
2021-09-17 07:47:27 +00:00
# error_page 401 =302 https://authentik.company/akprox/start?rd=$scheme://$http_host$request_uri;
2021-06-29 18:32:49 +00:00
# translate headers from the outposts back to the actual upstream
2021-11-12 21:48:01 +00:00
auth_request_set $authentik_username $upstream_http_x_authentik_username;
auth_request_set $authentik_groups $upstream_http_x_authentik_groups;
auth_request_set $authentik_email $upstream_http_x_authentik_email;
auth_request_set $authentik_name $upstream_http_x_authentik_name;
auth_request_set $authentik_uid $upstream_http_x_authentik_uid;
proxy_set_header X-authentik-username $authentik_username;
proxy_set_header X-authentik-groups $authentik_groups;
proxy_set_header X-authentik-email $authentik_email;
proxy_set_header X-authentik-name $authentik_name;
proxy_set_header X-authentik-uid $authentik_uid;
2021-04-29 16:17:10 +00:00
}
2021-06-29 18:32:49 +00:00
# all requests to /akprox must be accessible without authentication
location /akprox {
2021-09-20 17:21:30 +00:00
proxy_pass http://*ip or hostname of the authentik OUTPOST*:9000/akprox;
2021-06-29 18:32:49 +00:00
# ensure the host of this vserver matches your external URL you've configured
# in authentik
proxy_set_header Host $host;
add_header Set-Cookie $auth_cookie;
auth_request_set $auth_cookie $upstream_http_set_cookie;
2021-04-29 16:17:10 +00:00
}
2021-06-29 18:32:49 +00:00
# Special location for when the /auth endpoint returns a 401,
# redirect to the /start URL which initiates SSO
location @akprox_signin {
internal;
add_header Set-Cookie $auth_cookie;
return 302 /akprox/start?rd=$request_uri;
2021-04-29 16:17:10 +00:00
}
2021-06-29 18:32:49 +00:00
}
2021-04-29 16:17:10 +00:00
```
</TabItem>
<TabItem value="ingress">
Create a new ingress for the outpost
```yaml
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
name: authentik-outpost
spec:
rules:
- host: *external host that you configured in authentik*
http:
paths:
- backend:
2021-07-23 14:07:47 +00:00
serviceName: authentik-outpost-example-outpost
2021-09-08 18:04:56 +00:00
servicePort: 9000
2021-04-29 16:17:10 +00:00
path: /akprox
```
This ingress handles authentication requests, and the sign-in flow.
Add these annotations to the ingress you want to protect
```yaml
metadata:
annotations:
2021-05-31 21:32:17 +00:00
nginx.ingress.kubernetes.io/auth-url: https://*external host that you configured in authentik*/akprox/auth?nginx
nginx.ingress.kubernetes.io/auth-signin: https://*external host that you configured in authentik*/akprox/start?rd=$escaped_request_uri
2021-11-12 21:48:01 +00:00
nginx.ingress.kubernetes.io/auth-response-headers: Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
2021-04-29 16:17:10 +00:00
nginx.ingress.kubernetes.io/auth-snippet: |
proxy_set_header X-Forwarded-Host $http_host;
```
</TabItem>
</Tabs>
## Traefik
<Tabs
defaultValue="standalone-traefik"
values={[
{label: 'Standalone traefik', value: 'standalone-traefik'},
{label: 'docker-compose', value: 'docker-compose'},
{label: 'Ingress', value: 'ingress'},
]}>
<TabItem value="standalone-traefik">
```yaml
http:
middlewares:
authentik:
forwardAuth:
2021-09-29 19:36:57 +00:00
address: http://authentik-outpost-example-outpost:9000/akprox/auth/traefik
2021-04-29 16:17:10 +00:00
trustForwardHeader: true
authResponseHeaders:
- Set-Cookie
2021-11-12 21:48:01 +00:00
- X-authentik-username
- X-authentik-groups
- X-authentik-email
- X-authentik-name
- X-authentik-uid
2021-04-29 16:17:10 +00:00
routers:
default-router:
rule: "Host(`*external host that you configured in authentik*`)"
middlewares:
- name: authentik
priority: 10
services: # Unchanged
default-router-auth
match: "Host(`*external host that you configured in authentik*`) && PathPrefix(`/akprox/`)"
priority: 15
2021-09-08 18:04:56 +00:00
services: http://*ip of your outpost*:9000/akprox
2021-04-29 16:17:10 +00:00
```
</TabItem>
<TabItem value="docker-compose">
2021-05-07 12:08:30 +00:00
2021-04-29 16:17:10 +00:00
```yaml
version: '3.7'
services:
traefik:
image: traefik:v2.2
container_name: traefik
volumes:
- /var/run/docker.sock:/var/run/docker.sock
labels:
traefik.enable: true
traefik.http.routers.api.rule: Host(`traefik.example.com`)
traefik.http.routers.api.entrypoints: https
traefik.http.routers.api.service: api@internal
traefik.http.routers.api.tls: true
ports:
- 80:80
- 443:443
command:
- '--api'
- '--log=true'
- '--log.level=DEBUG'
- '--log.filepath=/var/log/traefik.log'
- '--providers.docker=true'
- '--providers.docker.exposedByDefault=false'
- '--entrypoints.http=true'
- '--entrypoints.http.address=:80'
- '--entrypoints.http.http.redirections.entrypoint.to=https'
- '--entrypoints.http.http.redirections.entrypoint.scheme=https'
- '--entrypoints.https=true'
- '--entrypoints.https.address=:443'
authentik_proxy:
2021-10-12 09:01:32 +00:00
image: goauthentik.io/proxy:2021.5.1
2021-04-29 16:17:10 +00:00
ports:
2021-09-08 18:04:56 +00:00
- 9000:9000
- 9443:9443
2021-04-29 16:17:10 +00:00
environment:
AUTHENTIK_HOST: https://your-authentik.tld
AUTHENTIK_INSECURE: "false"
AUTHENTIK_TOKEN: token-generated-by-authentik
2021-09-13 20:05:35 +00:00
# Starting with 2021.9, you can optionally set this too
2021-09-08 18:04:56 +00:00
# when authentik_host for internal communication doesn't match the public URL
# AUTHENTIK_HOST_BROWSER: https://external-domain.tld
2021-04-29 16:17:10 +00:00
labels:
traefik.enable: true
2021-09-08 18:04:56 +00:00
traefik.port: 9000
2021-04-29 16:17:10 +00:00
traefik.http.routers.authentik.rule: Host(`*external host that you configured in authentik*`) && PathPrefix(`/akprox/`)
traefik.http.routers.authentik.entrypoints: https
traefik.http.routers.authentik.tls: true
2021-09-29 19:36:57 +00:00
traefik.http.middlewares.authentik.forwardauth.address: http://authentik_proxy:9000/akprox/auth/traefik
2021-04-29 16:17:10 +00:00
traefik.http.middlewares.authentik.forwardauth.trustForwardHeader: true
2021-11-12 21:48:01 +00:00
traefik.http.middlewares.authentik.forwardauth.authResponseHeaders: Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
2021-04-29 16:17:10 +00:00
restart: unless-stopped
whoami:
image: containous/whoami
labels:
traefik.enable: true
traefik.http.routers.whoami.rule: Host(`*external host that you configured in authentik*`)
traefik.http.routers.whoami.entrypoints: https
traefik.http.routers.whoami.tls: true
traefik.http.routers.whoami.middlewares: authentik@docker
restart: unless-stopped
```
2021-05-07 12:08:30 +00:00
2021-04-29 16:17:10 +00:00
</TabItem>
<TabItem value="ingress">
Create a middleware:
```yaml
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: authentik
spec:
forwardAuth:
2021-09-29 19:36:57 +00:00
address: http://authentik-outpost-example-outpost:9000/akprox/auth/traefik
2021-04-29 16:17:10 +00:00
trustForwardHeader: true
authResponseHeaders:
- Set-Cookie
2021-11-12 21:48:01 +00:00
- X-authentik-username
- X-authentik-groups
- X-authentik-email
- X-authentik-name
- X-authentik-uid
2021-04-29 16:17:10 +00:00
```
Add the following settings to your IngressRoute
2021-08-29 18:46:17 +00:00
:::warning
By default traefik does not allow cross-namespace references for middlewares:
See [here](https://doc.traefik.io/traefik/v2.4/providers/kubernetes-crd/#allowcrossnamespace) to enable it.
:::
2021-04-29 16:17:10 +00:00
```yaml
spec:
routes:
- kind: Rule
match: "Host(`*external host that you configured in authentik*`)"
middlewares:
- name: authentik
2021-08-29 18:46:17 +00:00
namespace: authentik
2021-04-29 16:17:10 +00:00
priority: 10
services: # Unchanged
2021-08-29 18:46:17 +00:00
# This part is only required for single-app setups
2021-04-29 16:17:10 +00:00
- kind: Rule
match: "Host(`*external host that you configured in authentik*`) && PathPrefix(`/akprox/`)"
priority: 15
services:
- kind: Service
2021-07-23 14:07:47 +00:00
name: authentik-outpost-example-outpost
2021-09-08 18:04:56 +00:00
port: 9000
2021-04-29 16:17:10 +00:00
```
</TabItem>
</Tabs>