authentik fork
This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Jens L 2852fa3c5e
web: use generated API Client (#616)
* api: fix types for config API

* api: remove broken swagger UI

* admin: re-fix system task enum

* events: make event optional

* events: fix Schema for notification transport test

* flows: use APIView for Flow Executor

* core: fix schema for Metrics APIs

* web: rewrite to use generated API client

* web: generate API Client in CI

* admin: use x_cord and y_cord to prevent yaml issues

* events: fix linting errors

* web: don't lint generated code

* core: fix fields not being required in TypeSerializer

* flows: fix missing permission_classes

* web: cleanup

* web: fix rendering of graph on Overview page

* web: cleanup imports

* core: fix missing background image filter

* flows: fix flows not advancing properly

* stages/*: fix warnings during get_challenge

* web: send Flow response as JSON instead of FormData

* web: fix styles for horizontal tabs

* web: add base chart class and custom chart for application view

* root: generate ts client for e2e tests

* web: don't attempt to connect to websocket in selenium tests

* web: fix UserTokenList not being included in the build

* web: fix styling for static token list

* web: fix CSRF Token missing

* stages/authenticator_static: fix error when disable static tokens

* core: fix display issue when updating user info

* web: fix Flow executor not showing spinner when redirecting
2021-03-08 11:14:00 +01:00
.github web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
authentik web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
helm release: 2021.3.2 2021-03-04 09:33:25 +01:00
lifecycle stages: add WebAuthn stage (#550) 2021-02-17 20:49:58 +01:00
outpost web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
scripts root: fix branch Name extraction to work on non PRs 2021-02-28 14:24:16 +01:00
tests tests/integration: add more tests for docker outpost 2021-03-05 19:09:13 +01:00
web web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
website docs: update manual k8s outpost deployment 2021-03-05 15:30:41 +01:00
xml */saml: test against SAML Schema 2020-12-13 19:53:16 +01:00
.bumpversion.cfg docs: update manual k8s outpost deployment 2021-03-05 15:30:41 +01:00
.dockerignore root: attempt to build static image without django's collectstatic (#360) 2020-12-02 21:23:07 +01:00
.editorconfig repo cleanup, switch to new docker registry 2019-04-29 17:05:39 +02:00
.gitignore root: add initial geoip implementation 2021-02-12 09:52:14 +01:00
.prospector.yaml root: upgrade to python3.9 2020-11-15 16:15:01 +01:00
.pylintrc e2e: attempt to fix prospector error again 2020-11-15 20:46:53 +01:00
Dockerfile web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
LICENSE root: update license 2020-12-24 16:01:55 +01:00
Makefile tests/e2e: fix URLs, use self.login() 2021-02-27 19:02:29 +01:00
Pipfile root: lock twisted to 20.3.0 whilst its causing issues with uvloop 2021-03-01 16:26:05 +01:00
Pipfile.lock build(deps): bump boto3 from 1.17.21 to 1.17.22 (#617) 2021-03-08 07:45:40 +01:00
README.md root: align image on readme 2021-03-02 17:00:36 +01:00
SECURITY.md root: update screenshots 2021-03-02 12:15:32 +01:00
azure-pipelines.yml web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00
docker-compose.yml release: 2021.3.2 2021-03-04 09:33:25 +01:00
manage.py wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
pyproject.toml wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
pyrightconfig.json Proxy v2 (#189) 2020-09-03 00:04:12 +02:00
pytest.ini wip: rename to authentik (#361) 2020-12-05 22:08:42 +01:00
setup.cfg OAuth Provider Rewrite (#182) 2020-08-19 10:32:44 +02:00
swagger.yaml web: use generated API Client (#616) 2021-03-08 11:14:00 +01:00

README.md

authentik logo


CI Build status Tests Code Coverage Docker pulls Latest version LGTM Grade

What is authentik?

authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols. authentik is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.

Installation

For small/test setups it is recommended to use docker-compose, see the documentation

For bigger setups, there is a Helm Chart in the helm/ directory. This is documented here

Screenshots

Light Dark

Development

See Development Documentation

Security

See SECURITY.md