authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
SiskoUrso ff1532da13
website/integrations: Changes to reverse proxy information for grafana (#4938)
Changes to reverse proxy information for grafana

Changed to remove the port at the end of the domain for root_url, if grafana is behind a reverse proxy and is reachable at its ip or at https://grafana.company it would not than be accessible by that port. 

Until the root_url was changed in grafana.ini to https://grafana.company/ gives the following error  The request fails due to a missing, invalid, or mismatching redirection URI (redirect_uri).

This was tested using:
authentik 2023.3.0
grafana 9.3.6
nginx proxy manager 2.9.19

Signed-off-by: SiskoUrso <91812199+SiskoUrso@users.noreply.github.com>
2023-03-14 13:44:08 +01:00
.github ci: bump snok/container-retention-policy from 1 to 2 (#4710) 2023-02-17 09:44:04 +01:00
.vscode core: add a list of recommended vs code extensions (#4869) 2023-03-08 00:25:59 +01:00
authentik providers: fix authorization_flow not required in API (#4932) 2023-03-13 23:36:24 +01:00
blueprints providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
cmd internal: fix race condition with config loading on startup, add index on debug server 2023-01-08 20:33:04 +01:00
internal release: 2023.3.0 (#4925) 2023-03-13 19:10:48 +01:00
lifecycle core: bump black from 22.12.0 to 23.1.0 (#4584) 2023-02-01 11:31:32 +01:00
locale core: fix inconsistent branding in end_session view 2023-02-01 19:40:59 +01:00
schemas providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
scripts root: update options for generating TS API (#3833) 2022-10-21 09:08:25 +02:00
tests flows: planner error handling (#4812) 2023-02-28 15:18:29 +01:00
web web: bump @sentry/tracing from 7.42.0 to 7.43.0 in /web (#4939) 2023-03-14 11:31:45 +01:00
website website/integrations: Changes to reverse proxy information for grafana (#4938) 2023-03-14 13:44:08 +01:00
.bumpversion.cfg release: 2023.3.0 (#4925) 2023-03-13 19:10:48 +01:00
.dockerignore core: bundle geoip (#4250) 2022-12-20 22:09:30 +01:00
.editorconfig repo cleanup, switch to new docker registry 2019-04-29 17:05:39 +02:00
.gitignore website/blog: Becoming OpenID certified - Why standards matter (#4865) 2023-03-07 18:22:53 +01:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md website: add website development setup, update contribution guidelines on PR titles (#4852) 2023-03-06 19:27:05 +00:00
Dockerfile core: bump golang from 1.20.1-bullseye to 1.20.2-bullseye (#4871) 2023-03-08 10:52:18 +01:00
LICENSE root: relicense and launch blog post 2022-11-03 16:00:00 +01:00
Makefile providers/saml: initial SLO implementation (#2346) 2023-01-04 19:45:31 +01:00
README.md root: add support/shoutout section to readme 2023-02-13 20:56:44 +01:00
SECURITY.md website/docs: add new release to sidebar, cleanup (#4926) 2023-03-13 19:04:25 +01:00
docker-compose.yml release: 2023.3.0 (#4925) 2023-03-13 19:10:48 +01:00
go.mod core: bump goauthentik.io/api/v3 from 3.2023022.15 to 3.2023030.2 (#4942) 2023-03-14 11:31:59 +01:00
go.sum core: bump goauthentik.io/api/v3 from 3.2023022.15 to 3.2023030.2 (#4942) 2023-03-14 11:31:59 +01:00
ldap.Dockerfile core: bump golang from 1.20.1-bullseye to 1.20.2-bullseye (#4871) 2023-03-08 10:52:18 +01:00
manage.py root: update deprecation warnings 2022-11-25 11:47:28 +01:00
poetry.lock core: bump paramiko from 3.0.0 to 3.1.0 (#4913) 2023-03-13 10:47:16 +01:00
proxy.Dockerfile core: bump golang from 1.20.1-bullseye to 1.20.2-bullseye (#4871) 2023-03-08 10:52:18 +01:00
pyproject.toml release: 2023.3.0 (#4925) 2023-03-13 19:10:48 +01:00
schema.yml providers: fix authorization_flow not required in API (#4932) 2023-03-13 23:36:24 +01:00

README.md

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.

Installation

For small/test setups it is recommended to use docker-compose, see the documentation

For bigger setups, there is a Helm Chart here. This is documented here

Screenshots

Light Dark

Development

See Development Documentation

Security

See SECURITY.md

Support

Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR!

Sponsors

This project is proudly sponsored by:

DigitalOcean provides development and testing resources for authentik.