authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Find a file
Jens L a4dc6d13b5
events: rename audit to events and use for more metrics (#397)
* events: rename audit to events

* policies/expression: log expression exceptions as event

* policies/expression: add ExpressionPolicy Model to event when possible

* lib/expressions: ensure syntax errors are logged too

* lib: fix lint error

* policies: add execution_logging field

* core: add property mapping tests

* policies/expression: add full test

* policies/expression: fix attribute name

* policies: add execution_logging

* web: fix imports

* root: update swagger

* policies: use dataclass instead of dict for types

* events: add support for dataclass as event param

* events: add special keys which are never cleaned

* policies: add tests for process, don't clean full cache

* admin: create event when new version is seen

* events: move utils to separate file

* admin: add tests for admin tasks

* events: add .set_user method to ensure users have correct attributes set

* core: add test for property_mapping errors with user and request
2020-12-20 22:04:29 +01:00
.github release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
authentik events: rename audit to events and use for more metrics (#397) 2020-12-20 22:04:29 +01:00
helm release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
lifecycle events: rename audit to events and use for more metrics (#397) 2020-12-20 22:04:29 +01:00
proxy release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
scripts root: use proxy for e2e tests 2020-12-06 19:52:26 +01:00
tests tests/integration: continue even if ssl can't be cleaned up 2020-12-13 21:51:59 +01:00
web events: rename audit to events and use for more metrics (#397) 2020-12-20 22:04:29 +01:00
website release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
xml */saml: test against SAML Schema 2020-12-13 19:53:16 +01:00
.bumpversion.cfg release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
.dockerignore root: attempt to build static image without django's collectstatic (#360) 2020-12-02 21:23:07 +01:00
.editorconfig repo cleanup, switch to new docker registry 2019-04-29 17:05:39 +02:00
.gitignore web: remove dist from git 2020-11-30 12:50:08 +01:00
.prospector.yaml root: upgrade to python3.9 2020-11-15 16:15:01 +01:00
.pylintrc e2e: attempt to fix prospector error again 2020-11-15 20:46:53 +01:00
azure-pipelines.yml wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
docker-compose.yml release: 0.13.3-stable 2020-12-19 16:55:07 +01:00
docker.env.yml e2e: add apply_default_data to load data from migrations after tables have been truncated 2020-06-07 19:31:16 +02:00
Dockerfile root: fix paths for XML Schema files 2020-12-13 23:40:01 +01:00
LICENSE repo cleanup, switch to new docker registry 2019-04-29 17:05:39 +02:00
Makefile outposts: remove unused views 2020-12-13 21:25:05 +01:00
manage.py wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
Pipfile root: upgrade to python3.9 2020-11-15 16:15:01 +01:00
Pipfile.lock build(deps): bump boto3 from 1.16.38 to 1.16.39 (#412) 2020-12-18 09:44:54 +01:00
pyproject.toml wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
pyrightconfig.json Proxy v2 (#189) 2020-09-03 00:04:12 +02:00
pytest.ini wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
README.md web: fix icons not being included in static container 2020-12-12 21:49:00 +01:00
SECURITY.md tests/integration: add tests for Docker outpost using TLS connection 2020-12-13 21:30:33 +01:00
setup.cfg OAuth Provider Rewrite (#182) 2020-08-19 10:32:44 +02:00
swagger.yaml events: rename audit to events and use for more metrics (#397) 2020-12-20 22:04:29 +01:00

authentik logo

CI Build status Tests Code Coverage Docker pulls Latest version LGTM Grade

What is authentik?

authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.

Installation

For small/test setups it is recommended to use docker-compose, see the documentation

For bigger setups, there is a Helm Chart in the helm/ directory. This is documented here

Screenshots

Development

See Development Documentation

Security

See SECURITY.md