authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Find a file
bjk525 8cf0a5dace
website/integrations: update pfSense integration details (#4337)
* Update index.md

Removed need to enable ExtendedQuery, changed format of Authentication Containers to use semi-colons per note in pfSense, and added setting for Group member attribute (to allow users to not have to create pfsense users individually)

Signed-off-by: bjk525 <34558980+bjk525@users.noreply.github.com>

* Update index.md

Signed-off-by: bjk525 <34558980+bjk525@users.noreply.github.com>

* Update index.md

Signed-off-by: bjk525 <34558980+bjk525@users.noreply.github.com>

* revert Authentication containers

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: bjk525 <34558980+bjk525@users.noreply.github.com>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2023-02-03 13:45:13 +00:00
.github ci: bump docker/build-push-action from 3 to 4 (#4574) 2023-01-31 10:35:45 +01:00
.vscode providers/proxy: outpost wide logout implementation (#4605) 2023-02-02 21:18:59 +01:00
authentik providers/oauth2: optimise client credentials JWT database lookup (#4606) 2023-02-02 19:15:19 +01:00
blueprints blueprints: don't update default tenant 2023-01-31 15:17:05 +01:00
cmd internal: fix race condition with config loading on startup, add index on debug server 2023-01-08 20:33:04 +01:00
internal providers/proxy: outpost wide logout implementation (#4605) 2023-02-02 21:18:59 +01:00
lifecycle core: bump black from 22.12.0 to 23.1.0 (#4584) 2023-02-01 11:31:32 +01:00
locale core: fix inconsistent branding in end_session view 2023-02-01 19:40:59 +01:00
scripts root: update options for generating TS API (#3833) 2022-10-21 09:08:25 +02:00
tests core: bump black from 22.12.0 to 23.1.0 (#4584) 2023-02-01 11:31:32 +01:00
web web: bump @codemirror/lang-javascript from 6.1.2 to 6.1.3 in /web (#4611) 2023-02-03 11:26:27 +01:00
website website/integrations: update pfSense integration details (#4337) 2023-02-03 13:45:13 +00:00
xml */saml: test against SAML Schema 2020-12-13 19:53:16 +01:00
.bumpversion.cfg release: 2023.1.2 2023-01-23 14:25:55 +01:00
.dockerignore core: bundle geoip (#4250) 2022-12-20 22:09:30 +01:00
.editorconfig repo cleanup, switch to new docker registry 2019-04-29 17:05:39 +02:00
.gitignore root: allow custom settings via python module 2022-12-15 10:59:14 +01:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md polices/hibp: remove deprecated (#4363) 2023-01-05 13:19:26 +01:00
docker-compose.yml release: 2023.1.2 2023-01-23 14:25:55 +01:00
Dockerfile core: bump golang from 1.19.5-bullseye to 1.20.0-bullseye (#4593) 2023-02-02 10:45:25 +01:00
go.mod core: bump goauthentik.io/api/v3 from 3.2023012.2 to 3.2023012.3 (#4568) 2023-01-30 10:54:49 +01:00
go.sum core: bump goauthentik.io/api/v3 from 3.2023012.2 to 3.2023012.3 (#4568) 2023-01-30 10:54:49 +01:00
ldap.Dockerfile core: bump golang from 1.19.5-bullseye to 1.20.0-bullseye (#4593) 2023-02-02 10:45:25 +01:00
LICENSE root: relicense and launch blog post 2022-11-03 16:00:00 +01:00
Makefile providers/saml: initial SLO implementation (#2346) 2023-01-04 19:45:31 +01:00
manage.py root: update deprecation warnings 2022-11-25 11:47:28 +01:00
poetry.lock core: bump pylint from 2.16.0 to 2.16.1 (#4612) 2023-02-03 11:12:32 +01:00
proxy.Dockerfile core: bump golang from 1.19.5-bullseye to 1.20.0-bullseye (#4593) 2023-02-02 10:45:25 +01:00
pyproject.toml release: 2023.1.2 2023-01-23 14:25:55 +01:00
README.md root: migrate to hosted sentry with rate-limited DSN 2022-12-23 11:18:26 +01:00
schema.yml providers/oauth2: add user id as "sub" mode 2023-01-29 16:15:03 +01:00
SECURITY.md root: update supported versions 2023-01-20 14:23:21 +01:00

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.

Installation

For small/test setups it is recommended to use docker-compose, see the documentation

For bigger setups, there is a Helm Chart here. This is documented here

Screenshots

Light Dark

Development

See Development Documentation

Security

See SECURITY.md

Sponsors

This project is proudly sponsored by:

DigitalOcean provides development and testing resources for authentik.

Deploys by Netlify

Netlify hosts the goauthentik.io site.