This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/outpost
2021-05-22 20:15:23 +02:00
..
cmd outposts/ldap: fix linting 2021-04-26 12:24:46 +02:00
pkg release: 2021.5.4 2021-05-22 20:15:23 +02:00
.dockerignore outpost: rename proxy to outpost 2021-01-16 19:20:27 +01:00
.gitignore outpost: rename proxy to outpost 2021-01-16 19:20:27 +01:00
azure-pipelines.yml outposts: fix GIT_BUILD_HASH not being set correctly 2021-05-13 17:49:11 +02:00
go.mod outposts: fix issue with duplicate outpost health 2021-05-11 21:46:30 +02:00
go.sum outposts: fix issue with duplicate outpost health 2021-05-11 21:46:30 +02:00
ldap.Dockerfile outposts: include git commit hash in build from git branch 2021-05-12 18:56:44 +02:00
Makefile outpost: forwardAuth mode (#790) 2021-04-29 18:17:10 +02:00
proxy.Dockerfile outposts: include git commit hash in build from git branch 2021-05-12 18:56:44 +02:00
README.md *: fix more URLs for github org 2021-04-22 11:06:56 +02:00

authentik outpost

CI Build status Docker pulls (proxy)

Reverse Proxy based on oauth2_proxy, completely managed and monitored by authentik.

Usage

authentik Proxy is built to be configured by authentik itself, hence the only options you can directly give it are connection params.

The following environment variable are implemented:

AUTHENTIK_HOST: Full URL to the authentik instance with protocol, i.e. "https://authentik.company.tld"

AUTHENTIK_TOKEN: Token used to authenticate against authentik. This is generated after an Outpost instance is created.

AUTHENTIK_INSECURE: This environment variable can optionally be set to ignore the SSL Certificate of the authentik instance. Applies to both HTTP and WS connections.

Development

authentik Proxy uses an auto-generated API Client to communicate with authentik. This client is not kept in git. To generate the client locally, run make generate.

Afterwards you can build the proxy like any other Go project, using go build.