The authentication glue you need.
Go to file
Jens L. 3d5a189fa7
ci: mirror repo to internal repo (#12160)
* don't push when on internal repo

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* only run certain workflows on main repo

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* add mirror

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* how tf did a tab get in there

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* ooops

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
2024-11-22 18:26:56 +01:00
.github ci: mirror repo to internal repo (#12160) 2024-11-22 18:26:56 +01:00
.vscode providers/oauth2: add initial JWE support (#11344) 2024-10-17 14:04:19 +02:00
authentik root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
blueprints root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
cmd root: Multi-tenancy (#7590) 2024-01-23 14:28:06 +01:00
internal root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
lifecycle lifecycle: fix ak exit status not being passed (#12024) 2024-11-14 15:33:03 +01:00
locale translate: Updates for file locale/en/LC_MESSAGES/django.po in it (#12110) 2024-11-21 13:06:46 +01:00
schemas providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
scripts scripts: remove read_replicas from generated dev config (#12078) 2024-11-19 17:33:02 +01:00
tests security: fix CVE 2024 52289 (#12113) 2024-11-21 14:46:43 +01:00
web translate: Updates for file web/xliff/en.xlf in zh_CN (#12156) 2024-11-22 14:17:13 +01:00
website website/docs: update info about footer links to match new UI (#12120) 2024-11-21 14:14:15 -06:00
.bumpversion.cfg root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
.dockerignore enterprise/providers: Add RAC [AUTH-15] (#7291) 2023-12-30 21:33:14 +01:00
.editorconfig website: codespell with custom dictionary and CI (#5062) 2023-03-24 00:24:55 +01:00
.gitignore root: Ignore the vendor folder (#7094) 2023-10-06 17:50:46 +02:00
CODEOWNERS fix codeowners 2024-01-23 15:01:46 +01:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md website/developer-docs: move contributing to dev docs index and link contributing file (#5554) 2023-05-09 20:26:55 +02:00
Dockerfile core: bump maxmind/geoipupdate from v7.0.1 to v7.1.0 (#12073) 2024-11-19 14:22:49 +01:00
LICENSE enterprise: initial license (#5293) 2023-04-19 16:13:45 +02:00
Makefile website: latest PR for new Docs structure (#11639) 2024-10-09 09:33:40 -05:00
README.md website: latest PR for new Docs structure (#11639) 2024-10-09 09:33:40 -05:00
SECURITY.md website: update supported versions (#11841) 2024-10-31 01:02:37 +01:00
docker-compose.yml root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
go.mod core: bump goauthentik.io/api/v3 from 3.2024102.2 to 3.2024104.1 (#12149) 2024-11-22 15:22:41 +01:00
go.sum core: bump goauthentik.io/api/v3 from 3.2024102.2 to 3.2024104.1 (#12149) 2024-11-22 15:22:41 +01:00
ldap.Dockerfile ci: fix dockerfile warning (#11956) 2024-11-07 19:16:11 +00:00
manage.py root: add configuration option to enable fips (#10088) 2024-06-14 10:04:00 +00:00
package.json root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
poetry.lock core: bump debugpy from 1.8.8 to 1.8.9 (#12150) 2024-11-22 14:17:36 +01:00
proxy.Dockerfile core: bump github.com/gorilla/sessions from 1.3.0 to 1.4.0 (#11002) 2024-08-22 10:53:58 +02:00
pyproject.toml root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00
rac.Dockerfile core: bump github.com/gorilla/sessions from 1.3.0 to 1.4.0 (#11002) 2024-08-22 10:53:58 +02:00
radius.Dockerfile core: bump github.com/gorilla/sessions from 1.3.0 to 1.4.0 (#11002) 2024-08-22 10:53:58 +02:00
schema.yml root: Backport version change (#12146) 2024-11-22 01:51:30 +01:00

README.md

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider that emphasizes flexibility and versatility, with support for a wide set of protocols.

Our enterprise offer can also be used as a self-hosted replacement for large-scale deployments of Okta/Auth0, Entra ID, Ping Identity, or other legacy IdPs for employees and B2B2C use.

Installation

For small/test setups it is recommended to use Docker Compose; refer to the documentation.

For bigger setups, there is a Helm Chart here. This is documented here.

Screenshots

Light Dark

Development

See Developer Documentation

Security

See SECURITY.md

Adoption and Contributions

Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR! For more information on how to contribute to authentik, please refer to our CONTRIBUTING.md file.