The authentication glue you need.
Go to file
Teffen Ellis ca3b948895
web: Indicate when caps-lock is active during password input. (#12733)
Determining the state of the caps-lock key can be tricky as we're
dependant on a user-provided input to set a value. Thus, our initial
state defaults to not display any warning until the first keystroke.

- Revise to better use lit-html.
2025-02-19 10:38:27 -08:00
.github ci: parallelize unit tests (#13036) 2025-02-16 17:35:38 +01:00
.vscode root: Improve debugging experience (#12961) 2025-02-15 00:51:28 +01:00
authentik sources/oauth: add group sync for azure_ad (#12894) 2025-02-19 17:57:47 +01:00
blueprints providers/rac: move to open source (#13015) 2025-02-19 12:48:11 +01:00
cmd cmd: set version in outposts (#13116) 2025-02-19 17:56:57 +01:00
internal lifecycle: much improved debugging experience (#12804) 2025-02-01 03:35:56 +01:00
lifecycle lifecycle/aws: bump aws-cdk from 2.178.2 to 2.179.0 in /lifecycle/aws (#13101) 2025-02-18 13:47:12 +01:00
locale core, web: update translations (#13088) 2025-02-17 13:20:55 +01:00
schemas providers: SCIM (#4835) 2023-03-06 19:39:08 +01:00
scripts ci: fix daily test (#12909) 2025-02-01 03:36:30 +01:00
tests enterprise/providers: SSF (#12327) 2025-02-05 17:52:14 +01:00
web web: Indicate when caps-lock is active during password input. (#12733) 2025-02-19 10:38:27 -08:00
website website: Use Docusaurus Frontmatter for badges (#12893) 2025-02-19 18:03:05 +00:00
.bumpversion.cfg release: 2024.12.3 (#12883) 2025-01-29 23:35:06 +01:00
.dockerignore enterprise/providers: Add RAC [AUTH-15] (#7291) 2023-12-30 21:33:14 +01:00
.editorconfig website: codespell with custom dictionary and CI (#5062) 2023-03-24 00:24:55 +01:00
.gitignore root: Improve debugging experience (#12961) 2025-02-15 00:51:28 +01:00
CODEOWNERS lifecycle: move AWS CFN generation to lifecycle and fix CI (#12743) 2025-01-21 14:48:11 +01:00
CODE_OF_CONDUCT.md root: rework and expand security policy 2022-11-28 12:10:53 +01:00
CONTRIBUTING.md docs: fix contribution link (#12189) 2024-11-26 14:11:38 +01:00
Dockerfile core: revert bump oss/go/microsoft/golang from 1.23-fips-bookworm to 1.24-fips-bookworm (#13012) (#13022) 2025-02-13 18:42:13 +01:00
LICENSE enterprise: initial license (#5293) 2023-04-19 16:13:45 +02:00
Makefile root: fix generated API docs not being excluded from codespell (#13091) 2025-02-17 18:19:33 +01:00
README.md website: latest PR for new Docs structure (#11639) 2024-10-09 09:33:40 -05:00
SECURITY.md website/docs: prepare for 2024.12.0 (#12420) 2024-12-19 18:17:14 +00:00
docker-compose.yml release: 2024.12.3 (#12883) 2025-01-29 23:35:06 +01:00
go.mod core: bump goauthentik.io/api/v3 from 3.2024123.4 to 3.2024123.6 (#13100) 2025-02-18 13:47:30 +01:00
go.sum core: bump goauthentik.io/api/v3 from 3.2024123.4 to 3.2024123.6 (#13100) 2025-02-18 13:47:30 +01:00
ldap.Dockerfile core: revert bump oss/go/microsoft/golang from 1.23-fips-bookworm to 1.24-fips-bookworm (#13012) (#13022) 2025-02-13 18:42:13 +01:00
manage.py root: add configuration option to enable fips (#10088) 2024-06-14 10:04:00 +00:00
package.json release: 2024.12.3 (#12883) 2025-01-29 23:35:06 +01:00
poetry.lock core: bump sentry-sdk from 2.21.0 to 2.22.0 (#13098) 2025-02-18 14:26:49 +01:00
proxy.Dockerfile core: revert bump oss/go/microsoft/golang from 1.23-fips-bookworm to 1.24-fips-bookworm (#13012) (#13022) 2025-02-13 18:42:13 +01:00
pyproject.toml policies/geoip: distance + impossible travel (#12541) 2025-02-17 18:47:25 +01:00
rac.Dockerfile core: revert bump oss/go/microsoft/golang from 1.23-fips-bookworm to 1.24-fips-bookworm (#13012) (#13022) 2025-02-13 18:42:13 +01:00
radius.Dockerfile core: revert bump oss/go/microsoft/golang from 1.23-fips-bookworm to 1.24-fips-bookworm (#13012) (#13022) 2025-02-13 18:42:13 +01:00
schema.yml providers/rac: move to open source (#13015) 2025-02-19 12:48:11 +01:00

README.md

authentik logo


Join Discord GitHub Workflow Status GitHub Workflow Status GitHub Workflow Status Code Coverage Docker pulls Latest version

What is authentik?

authentik is an open-source Identity Provider that emphasizes flexibility and versatility, with support for a wide set of protocols.

Our enterprise offer can also be used as a self-hosted replacement for large-scale deployments of Okta/Auth0, Entra ID, Ping Identity, or other legacy IdPs for employees and B2B2C use.

Installation

For small/test setups it is recommended to use Docker Compose; refer to the documentation.

For bigger setups, there is a Helm Chart here. This is documented here.

Screenshots

Light Dark

Development

See Developer Documentation

Security

See SECURITY.md

Adoption and Contributions

Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR! For more information on how to contribute to authentik, please refer to our CONTRIBUTING.md file.