authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
sdimovv 6192d01b7e
stages: Add ability to set user friendly names for MFA stages (#5005)
* Added ability to name MFA stage

* Schema

* Changed Charfield to Textfield

* Regenerated schema

* Add explicit required

* set null instead of blank so title check works

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* add help text and adjust wording

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2023-04-02 16:52:44 +02:00
.github root: set codecov after_n_builds and threshold (#5137) 2023-03-31 23:59:23 +02:00
.vscode core: add a list of recommended vs code extensions (#4869) 2023-03-08 00:25:59 +01:00
authentik stages: Add ability to set user friendly names for MFA stages (#5005) 2023-04-02 16:52:44 +02:00
blueprints providers/scim: add missing default fields (#5108) 2023-03-28 14:42:52 +02:00
cmd providers/radius: simple radius outpost (#1796) 2023-03-20 16:54:35 +01:00
internal root: bump api generator (#5139) 2023-04-01 18:10:52 +02:00
lifecycle lifecycle: also migrate before starting worker, trap exit to cleanup mode (#5123) 2023-03-30 14:04:38 +02:00
locale Translate 'locale/en/LC_MESSAGES/django.po' in 'zh_CN' [manual sync] (#5031) 2023-03-21 13:04:31 +01:00
schemas providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
scripts root: update options for generating TS API (#3833) 2022-10-21 09:08:25 +02:00
tests providers/radius: simple radius outpost (#1796) 2023-03-20 16:54:35 +01:00
web stages: Add ability to set user friendly names for MFA stages (#5005) 2023-04-02 16:52:44 +02:00
website website/blog: JWT blog final draft for review (#5128) 2023-03-30 14:27:14 -05:00
.bumpversion.cfg version: 2023.3 (#4980) 2023-03-16 22:43:57 +01:00
.dockerignore core: bundle geoip (#4250) 2022-12-20 22:09:30 +01:00
.editorconfig website: codespell with custom dictionary and CI (#5062) 2023-03-24 00:24:55 +01:00
.gitignore website/blog: Becoming OpenID certified - Why standards matter (#4865) 2023-03-07 18:22:53 +01:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md website: add website development setup, update contribution guidelines on PR titles (#4852) 2023-03-06 19:27:05 +00:00
Dockerfile lifecycle: also migrate before starting worker, trap exit to cleanup mode (#5123) 2023-03-30 14:04:38 +02:00
LICENSE root: relicense and launch blog post 2022-11-03 16:00:00 +01:00
Makefile root: bump api generator (#5139) 2023-04-01 18:10:52 +02:00
README.md root: add support/shoutout section to readme 2023-02-13 20:56:44 +01:00
SECURITY.md website/docs: add new release to sidebar, cleanup (#4926) 2023-03-13 19:04:25 +01:00
docker-compose.yml version: 2023.3 (#4980) 2023-03-16 22:43:57 +01:00
go.mod root: bump api generator (#5139) 2023-04-01 18:10:52 +02:00
go.sum root: bump api generator (#5139) 2023-04-01 18:10:52 +02:00
ldap.Dockerfile core: bump golang from 1.20.1-bullseye to 1.20.2-bullseye (#4871) 2023-03-08 10:52:18 +01:00
manage.py root: update deprecation warnings 2022-11-25 11:47:28 +01:00
poetry.lock core: bump redis from 4.5.3 to 4.5.4 (#5135) 2023-03-31 16:48:30 +02:00
proxy.Dockerfile core: bump golang from 1.20.1-bullseye to 1.20.2-bullseye (#4871) 2023-03-08 10:52:18 +01:00
pyproject.toml providers/radius: simple radius outpost (#1796) 2023-03-20 16:54:35 +01:00
radius.Dockerfile providers/radius: simple radius outpost (#1796) 2023-03-20 16:54:35 +01:00
schema.yml stages: Add ability to set user friendly names for MFA stages (#5005) 2023-04-02 16:52:44 +02:00

README.md

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.

Installation

For small/test setups it is recommended to use docker-compose, see the documentation

For bigger setups, there is a Helm Chart here. This is documented here

Screenshots

Light Dark

Development

See Development Documentation

Security

See SECURITY.md

Support

Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR!

Sponsors

This project is proudly sponsored by:

DigitalOcean provides development and testing resources for authentik.