authenticationauthentikauthorizationkubernetesoauth2oauth2-clientoauth2-serveroidcoidc-clientoidc-providerproxyreverse-proxysamlsaml-idpsaml-spsecuritysso
25f5031422
Bumps [django](https://github.com/django/django) from 3.1.6 to 3.1.7. - [Release notes](https://github.com/django/django/releases) - [Commits](https://github.com/django/django/compare/3.1.6...3.1.7) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> |
||
---|---|---|
.github | ||
authentik | ||
helm | ||
lifecycle | ||
outpost | ||
scripts | ||
tests | ||
web | ||
website | ||
xml | ||
.bumpversion.cfg | ||
.dockerignore | ||
.editorconfig | ||
.gitignore | ||
.prospector.yaml | ||
.pylintrc | ||
azure-pipelines.yml | ||
docker-compose.yml | ||
docker.env.yml | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
manage.py | ||
Pipfile | ||
Pipfile.lock | ||
pyproject.toml | ||
pyrightconfig.json | ||
pytest.ini | ||
README.md | ||
SECURITY.md | ||
setup.cfg | ||
swagger.yaml |
What is authentik?
authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
Installation
For small/test setups it is recommended to use docker-compose, see the documentation
For bigger setups, there is a Helm Chart in the helm/
directory. This is documented here
Screenshots
Development
Security
See SECURITY.md