authenticationauthentikauthorizationkubernetesoauth2oauth2-clientoauth2-serveroidcoidc-clientoidc-providerproxyreverse-proxysamlsaml-idpsaml-spsecuritysso
a6d0c8c26c
* providers/saml: add basic metadata parser * providers/saml: add importer for Singing certificate, validate signature, add tests * providers/saml: add provider name to form, * web: don't use trailing slash for spa URLs * providers/saml: formatting fixes * sources/*: add verbose_name to source serializers * admin: add button launch import modal |
||
---|---|---|
.github | ||
authentik | ||
helm | ||
lifecycle | ||
proxy | ||
scripts | ||
tests | ||
web | ||
website | ||
xml | ||
.bumpversion.cfg | ||
.dockerignore | ||
.editorconfig | ||
.gitignore | ||
.prospector.yaml | ||
.pylintrc | ||
azure-pipelines.yml | ||
docker-compose.yml | ||
docker.env.yml | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
manage.py | ||
Pipfile | ||
Pipfile.lock | ||
pyproject.toml | ||
pyrightconfig.json | ||
pytest.ini | ||
README.md | ||
SECURITY.md | ||
setup.cfg | ||
swagger.yaml |
What is authentik?
authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
Installation
For small/test setups it is recommended to use docker-compose, see the documentation
For bigger setups, there is a Helm Chart in the helm/
directory. This is documented here
Screenshots
Development
Security
See SECURITY.md