This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/website/docs/sources.md
Jens L 1cfe1aff13
wip: rename to authentik (#361)
* root: initial rename

* web: rename custom element prefix

* root: rename external functions with pb_ prefix

* root: fix formatting

* root: replace domain with goauthentik.io

* proxy: update path

* root: rename remaining prefixes

* flows: rename file extension

* root: pbadmin -> akadmin

* docs: fix image filenames

* lifecycle: ignore migration files

* ci: copy default config from current source before loading last tagged

* *: new sentry dsn

* tests: fix missing python3.9-dev package

* root: add additional migrations for service accounts created by outposts

* core: mark system-created service accounts with attribute

* policies/expression: fix pb_ replacement not working

* web: fix last linting errors, add lit-analyse

* policies/expressions: fix lint errors

* web: fix sidebar display on screens where not all items fit

* proxy: attempt to fix proxy pipeline

* proxy: use go env GOPATH to get gopath

* lib: fix user_default naming inconsistency

* docs: add upgrade docs

* docs: update screenshots to use authentik

* admin: fix create button on empty-state of outpost

* web: fix modal submit not refreshing SiteShell and Table

* web: fix height of app-card and height of generic icon

* web: fix rendering of subtext

* admin: fix version check error not being caught

* web: fix worker count not being shown

* docs: update screenshots

* root: new icon

* web: fix lint error

* admin: fix linting error

* root: migrate coverage config to pyproject
2020-12-05 22:08:42 +01:00

2.6 KiB

title
Sources

Sources allow you to connect authentik to an existing user directory. They can also be used for social logins, using external providers such as Facebook, Twitter, etc.

Generic OAuth Source

All Integration-specific Sources are documented in the Integrations Section

This source allows users to enroll themselves with an external OAuth-based Identity Provider. The generic provider expects the endpoint to return OpenID-Connect compatible information. Vendor-specific implementations have their own OAuth Source.

  • Policies: Allow/Forbid users from linking their accounts with this provider.
  • Request Token URL: This field is used for OAuth v1 implementations and will be provided by the provider.
  • Authorization URL: This value will be provided by the provider.
  • Access Token URL: This value will be provided by the provider.
  • Profile URL: This URL is called by authentik to retrieve user information upon successful authentication.
  • Consumer key/Consumer secret: These values will be provided by the provider.

SAML Source

This source allows authentik to act as a SAML Service Provider. Just like the SAML Provider, it supports signed requests. Vendor-specific documentation can be found in the Integrations Section.

LDAP Source

This source allows you to import users and groups from an LDAP Server.

  • Server URI: URI to your LDAP server/Domain Controller.
  • Bind CN: CN of the bind user. This can also be a UPN in the format of user@domain.tld.
  • Bind password: Password used during the bind process.
  • Enable StartTLS: Enables StartTLS functionality. To use LDAPS instead, use port 636.
  • Base DN: Base DN used for all LDAP queries.
  • Addition User DN: Prepended to the base DN for user queries.
  • Addition Group DN: Prepended to the base DN for group queries.
  • User object filter: Consider objects matching this filter to be users.
  • Group object filter: Consider objects matching this filter to be groups.
  • User group membership field: This field contains the user's group memberships.
  • Object uniqueness field: This field contains a unique identifier.
  • Sync groups: Enable/disable group synchronization. Groups are synced in the background every 5 minutes.
  • Sync parent group: Optionally set this group as the parent group for all synced groups. An example use case of this would be to import Active Directory groups under a root imported-from-ad group.
  • Property mappings: Define which LDAP properties map to which authentik properties. The default set of property mappings is generated for Active Directory. See also LDAP Property Mappings