authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Alissa Gerhard 06850a2f57
sources/ldap: fix task timeout for ldap_sync_all and ldap_sync_single (#6809)
* sources/ldap: fix task timeout for ldap_sync_all and ldap_sync_single

* ldap_sync_all runs tasks async so doesn't need longer timeouts

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* bump time more as we run some tasks in serial and add more leeway

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2023-09-08 20:37:54 +02:00
.github root: lock node to 20.5 (#6776) 2023-09-06 12:22:25 +02:00
.vscode root: migrate bootstrap to blueprints (#6433) 2023-07-31 19:34:46 +02:00
authentik sources/ldap: fix task timeout for ldap_sync_all and ldap_sync_single (#6809) 2023-09-08 20:37:54 +02:00
blueprints stages/authenticator: vendor otp (#6741) 2023-09-04 11:45:14 +02:00
cmd root: connect to backend via socket (#6720) 2023-09-02 17:58:37 +02:00
internal root: connect to backend via socket (#6720) 2023-09-02 17:58:37 +02:00
lifecycle stages/authenticator: vendor otp (#6741) 2023-09-04 11:45:14 +02:00
locale translate: Updates for file locale/en/LC_MESSAGES/django.po in zh_CN on branch main (#6789) 2023-09-07 11:58:54 +02:00
schemas providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
scripts providers/oauth2: fix id_token being saved incorrectly leading to lost claims (#6645) 2023-08-28 00:51:48 +02:00
tests stages/authenticator: vendor otp (#6741) 2023-09-04 11:45:14 +02:00
web web: bump @formatjs/intl-listformat from 7.4.0 to 7.4.1 in /web (#6801) 2023-09-08 10:15:36 +02:00
website website/dev-docs: more raw templates, fixed wget link (#6778) 2023-09-07 15:31:36 -05:00
.bumpversion.cfg release: 2023.8.2 2023-09-01 17:27:16 +02:00
.dockerignore blueprints: fix tag values not resolved correctly (#6653) 2023-08-28 18:27:44 +02:00
.editorconfig website: codespell with custom dictionary and CI (#5062) 2023-03-24 00:24:55 +01:00
.gitignore root: add generated Source docs (#5323) 2023-07-31 11:59:20 +02:00
CODEOWNERS root: Test codeowners (#5586) 2023-05-11 20:26:04 +02:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md website/developer-docs: move contributing to dev docs index and link contributing file (#5554) 2023-05-09 20:26:55 +02:00
Dockerfile core: bump golang from 1.21.0-bookworm to 1.21.1-bookworm (#6783) 2023-09-07 12:00:34 +02:00
LICENSE enterprise: initial license (#5293) 2023-04-19 16:13:45 +02:00
Makefile web/admin: fix ak-toggle-group for policy and blueprint uses (#6687) 2023-08-30 12:46:58 +02:00
README.md web: Add storybook (#5865) 2023-06-07 13:05:33 +02:00
SECURITY.md website: update 2023.8 release notes (#6666) 2023-08-29 19:57:14 +02:00
docker-compose.yml release: 2023.8.2 2023-09-01 17:27:16 +02:00
go.mod core: bump github.com/getsentry/sentry-go from 0.23.0 to 0.24.0 (#6771) 2023-09-06 12:22:32 +02:00
go.sum core: bump github.com/getsentry/sentry-go from 0.23.0 to 0.24.0 (#6771) 2023-09-06 12:22:32 +02:00
ldap.Dockerfile core: bump golang from 1.21.0-bookworm to 1.21.1-bookworm (#6783) 2023-09-07 12:00:34 +02:00
manage.py root: update deprecation warnings 2022-11-25 11:47:28 +01:00
poetry.lock core: bump gitpython from 3.1.34 to 3.1.35 (#6805) 2023-09-08 10:37:22 +02:00
proxy.Dockerfile core: bump golang from 1.21.0-bookworm to 1.21.1-bookworm (#6783) 2023-09-07 12:00:34 +02:00
pyproject.toml stages/authenticator: vendor otp (#6741) 2023-09-04 11:45:14 +02:00
radius.Dockerfile core: bump golang from 1.21.0-bookworm to 1.21.1-bookworm (#6783) 2023-09-07 12:00:34 +02:00
schema.yml stages/authenticator: vendor otp (#6741) 2023-09-04 11:45:14 +02:00

README.md

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider that emphasizes flexibility and versatility. It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them.

Installation

For small/test setups it is recommended to use Docker Compose; refer to the documentation.

For bigger setups, there is a Helm Chart here. This is documented here.

Screenshots

Light Dark

Development

See Developer Documentation

Security

See SECURITY.md

Adoption and Contributions

Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR! For more information on how to contribute to authentik, please refer to our CONTRIBUTING.md file.

Sponsors

This project is proudly sponsored by:

DigitalOcean provides development and testing resources for authentik.