Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions website/.prettierignore
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,3 @@ coverage
node_modules
help
static
# TODO: Enable after monorepo formatting is cleaned up.
**/*.md
**/*.mdx
Original file line number Diff line number Diff line change
@@ -1,9 +1,8 @@
---
title: Email Authenticator Setup stage
authentik_version: "2025.2"
---

<span class="badge badge--version">authentik 2025.2+</span>

This stage configures an email-based authenticator that sends a one-time code to a user's email address for authentication.

When a user goes through a flow that includes this stage, they are prompted for their email address (if not already set). The user then receives an email with a one-time code, which they enter into the authentik Login panel.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,6 @@
title: WebAuthn / Passkeys Authenticator setup stage
---

<span class="badge badge--version">authentik 2021.3.1+</span>

This stage configures a WebAuthn-based Authenticator. This can either be a browser, biometrics or a Security stick like a YubiKey.

### Options
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,8 +29,8 @@ You can also use custom email templates, to use your own design or layout.
Starting with authentik 2024.2, it is possible to create `.txt` files with the same name as the `.html` template. If a matching `.txt` file exists, the email sent will be a multipart email with both the text and HTML template.
:::

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs
defaultValue="docker-compose"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,9 @@
title: Caddy
---

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

import Placeholders from "./__placeholders.md";
import CaddyStandalone from "./_caddy_standalone.md";

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,12 @@
title: Envoy
---

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

import Placeholders from "./__placeholders.md";
import EnvoyIstio from "./_envoy_istio.md";

# Envoy

The configuration template shown below apply to both single-application and domain-level forward auth.

:::info
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

# nginx

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

# Traefik

Expand Down
2 changes: 2 additions & 0 deletions website/docs/customize/blueprints/v1/example.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ title: Example

This is one of the default packaged blueprints to create the default authentication flow.

<!-- prettier-ignore-start -->
```yaml
version: 1
metadata:
Expand Down Expand Up @@ -64,3 +65,4 @@ entries:
target: !KeyOf flow
model: authentik_flows.flowstagebinding
```
<!-- prettier-ignore-end -->
17 changes: 17 additions & 0 deletions website/docs/customize/blueprints/v1/tags.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,8 @@ Returns the value of the given environment variable. Can be used as a scalar wit

Examples:

{/* prettier-ignore-start */}

```yaml
configure_flow: !Find [authentik_flows.flow, [slug, default-password-change]]
```
Expand All @@ -60,17 +62,24 @@ configure_flow:
]
```

{/* prettier-ignore-end */}

Looks up any model and resolves to the the matches' primary key.
First argument is the model to be queried, remaining arguments are expected to be pairs of key=value pairs to query for.

#### `!Context`

Example:

{/* prettier-ignore-start */}


```yaml
configure_flow: !Context foo
```

{/* prettier-ignore-end */}

Find values from the context. Can optionally be called with a default like `!Context [foo, default-value]`.

#### `!Format`
Expand Down Expand Up @@ -209,6 +218,8 @@ For example, given a sequence like this - `["a", "b", "c"]`, this tag will resol

Minimal examples:

{/* prettier-ignore-start */}

```yaml
configuration_stages: !Enumerate [
!Context map_of_totp_stage_names_and_types,
Expand All @@ -224,6 +235,8 @@ configuration_stages: !Enumerate [
]
```

{/* prettier-ignore-end */}

The above example will resolve to something like this:

```yaml
Expand Down Expand Up @@ -265,6 +278,8 @@ Full example:
Note that an `!Enumeration` tag's iterable can never be an `!Item` or `!Value` tag with a depth of `0`. Minimum depth allowed is `1`. This is because a depth of `0` refers to the `!Enumeration` tag the `!Item` or `!Value` tag is in, and an `!Enumeration` tag cannot iterate over itself.
:::

{/* prettier-ignore-start */}

```yaml
example: !Enumerate [
!Context sequence, # ["foo", "bar"]
Expand All @@ -288,6 +303,8 @@ example: !Enumerate [
]
```

{/* prettier-ignore-end */}

The above example will resolve to something like this:

```yaml
Expand Down
2 changes: 1 addition & 1 deletion website/docs/customize/interfaces/_global/customcss.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@

To further modify the look of authentik, a custom CSS file can be created. Creating such a file is outside the scope of this document.

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs
defaultValue="docker-compose"
Expand Down
2 changes: 1 addition & 1 deletion website/docs/developer-docs/docs/style-guide.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -255,8 +255,8 @@ This section covers the usage of React components within our documentation. File
Use **Tabs** to display different configurations (e.g., setting up authentication with OIDC vs. SAML) to help users navigate between options. Default to the easier or more common option. Insert the following lines wherever you want the code block to appear:

```jsx
import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs
defaultValue="oidc"
Expand Down
4 changes: 2 additions & 2 deletions website/docs/developer-docs/setup/full-dev-environment.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ tags:
- docker
---

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import ExecutionEnvironment from "@docusaurus/ExecutionEnvironment";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

## Requirements

Expand Down
11 changes: 3 additions & 8 deletions website/docs/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -24,39 +24,34 @@ The authentik product provides the following consoles:

In authentik, you can use Light or Dark mode for the Admin interface, User interface, and the Flow interface.

import "react-before-after-slider-component/dist/build.css";
import ReactBeforeSliderComponent from "react-before-after-slider-component";
import useBaseUrl from "@docusaurus/useBaseUrl";
import ReactBeforeSliderComponent from "react-before-after-slider-component";

import "react-before-after-slider-component/dist/build.css";

<ReactBeforeSliderComponent
firstImage={{
id: 1,
imageUrl: useBaseUrl("img/screen_flow_dark.jpg"),
}}
secondImage={{
id: 2,
imageUrl: useBaseUrl("img/screen_flow_light.jpg"),
}}
/>

<ReactBeforeSliderComponent
firstImage={{
id: 1,
imageUrl: useBaseUrl("img/screen_apps_dark.jpg"),
}}
secondImage={{
id: 2,
imageUrl: useBaseUrl("img/screen_apps_light.jpg"),
}}
/>

<ReactBeforeSliderComponent
firstImage={{
id: 1,
imageUrl: useBaseUrl("img/screen_admin_dark.jpg"),
}}
secondImage={{
id: 2,
imageUrl: useBaseUrl("img/screen_admin_light.jpg"),
}}
/>
Expand Down
2 changes: 1 addition & 1 deletion website/docs/install-config/air-gapped.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,8 @@ To disable these outbound connections, adjust the settings as follows:

To view a list of all configuration options, refer to the [Configuration](./configuration/configuration.mdx) documentation.

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs
defaultValue="docker-compose"
Expand Down
2 changes: 1 addition & 1 deletion website/docs/install-config/beta.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@ You can test upcoming authentik versions, including major new features that are
Downgrading from the Beta is not supported. It is recommended to take a backup before upgrading, or test Beta versions on a separate install. Upgrading from Beta versions to the next release is usually possible, however also not supported.
:::

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs
defaultValue="docker-compose"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,8 @@ All of these variables can be set to values, but you can also use a URI-like for

## Set your environment variables

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs groupId="platform">
<TabItem value="docker-compose" label="Docker Compose" default>
Expand Down
2 changes: 1 addition & 1 deletion website/docs/install-config/install/docker-compose.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -27,8 +27,8 @@ This installation method is for test setups and small-scale production setups.
To download the latest `docker-compose.yml` open your terminal and navigate to the directory of your choice.
Run the following command:

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

{/* prettier-ignore */}
<Tabs groupId="OS">
Expand Down
2 changes: 1 addition & 1 deletion website/docs/install-config/upgrade.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ authentik does not support downgrading. Make sure to back up your database in ca

## Upgrade authentik

import Tabs from "@theme/Tabs";
import TabItem from "@theme/TabItem";
import Tabs from "@theme/Tabs";

<Tabs groupId="platform">
<TabItem value="docker-compose" label="Docker Compose" default>
Expand Down
6 changes: 3 additions & 3 deletions website/docs/releases/2024/v2024.10.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@ slug: "/releases/2024.10"

## Highlights

- **Chrome Device Trust** <span class="badge badge--primary">Enterprise</span> <span class="badge badge--info">Preview</span>: Verify that your users are logging in from managed devices and validate the devices' compliance with company policies.
- **FIPS/FAL3 for FedRAMP "very high" compliance** <span class="badge badge--primary">Enterprise+</span>: with support for SAML encryption and now JWE (JSON Web Encryption) support, authentik can now be configured for FIPS compliance at Federation Assurance Level (FAL) 3.
- **Chrome Device Trust** :ak-enterprise :ak-preview : Verify that your users are logging in from managed devices and validate the devices' compliance with company policies.
- **FIPS/FAL3 for FedRAMP "very high" compliance** :ak-enterprise : with support for SAML encryption and now JWE (JSON Web Encryption) support, authentik can now be configured for FIPS compliance at Federation Assurance Level (FAL) 3.
- **Captcha on Identification stage**: Run a CAPTCHA process in the background while the user is entering their identification.
- **Kerberos source**: authentik can now integrate with existing Kerberos environments by allowing users to log in with their Kerberos credentials, SPNEGO, or syncing users into authentik.

Expand All @@ -16,7 +16,7 @@ We have no breaking changes this release!

## New features

- **Chrome Device Trust** <span class="badge badge--primary">Enterprise</span> <span class="badge badge--info">Preview</span>
- **Chrome Device Trust** :ak-enterprise :ak-preview

This is a new stage for Enterprise clients that verifies the user through the Chrome Verified Access API. This stage only works with Google Chrome. You'll need to bring your own [Verified Access API instance](https://developers.google.com/chrome/verified-access/overview) via Google Cloud.

Expand Down
8 changes: 4 additions & 4 deletions website/docs/releases/2024/v2024.12.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,8 @@ slug: "/releases/2024.12"
## Highlights

- **Redirect stage** Conditionally redirect users to other flows and URLs.
- **Application entitlements** <span class="badge badge--info">Preview</span> Additional granular permission configuration on an application-level basis.
- **CloudFormation** <span class="badge badge--info">Preview</span> One-click deploy on AWS.
- **Application entitlements** :ak-preview Additional granular permission configuration on an application-level basis.
- **CloudFormation** :ak-preview One-click deploy on AWS.
- **Policies in the application wizard** Configure access restriction while creating an application.

## Breaking changes
Expand All @@ -32,15 +32,15 @@ slug: "/releases/2024.12"

This new stage allows redirecting a user to another flow or external URL. This allows for dynamically choosing which flow runs depending on user attributes or other factors, or redirection to another URL.

- **Application entitlements** <span class="badge badge--info">Preview</span>
- **Application entitlements** :ak-preview

Centrally configure permissions by granting entitlements to groups and users on an application-level basis.

- **Policies in the application wizard**

In the application creation wizard, administrators can now configure policies bindings along with the other application settings.

- **CloudFormation** <span class="badge badge--info">Preview</span>
- **CloudFormation** :ak-preview

Deploy authentik in your own AWS environment with one click using our new [AWS CloudFormation template](../../install-config/install/aws.md).

Expand Down
8 changes: 4 additions & 4 deletions website/docs/releases/2024/v2024.2.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@ slug: /releases/2024.2

## Highlights

- **Remote Access Control** <span class="badge badge--primary">Enterprise</span> Access machines over RDP, SSH, and VNC from authentik
- **Remote Access Control** :ak-enterprise Access machines over RDP, SSH, and VNC from authentik

- **Audit logging** <span class="badge badge--primary">Enterprise</span> See what fields were changed when objects are updated
- **Audit logging** :ak-enterprise See what fields were changed when objects are updated

- **Session location and network binding** Increase security by preventing session theft

Expand Down Expand Up @@ -102,11 +102,11 @@ slug: /releases/2024.2

## New features

- **New provider: Remote Access Control** <span class="badge badge--primary">Enterprise</span>
- **New provider: Remote Access Control** :ak-enterprise

The Remote Access Control provider allows you to remotely connect to remote machines over RDP, SSH and VNC through authentik. As such, you can use the same policy engine and customization options that are possible with other providers using the same user and admin interface.

- **Audit logging** <span class="badge badge--primary">Enterprise</span>
- **Audit logging** :ak-enterprise

authentik instances that have a valid enterprise license installed will log any changes made to models, including which fields were changed with previous and new values of the fields. The values are censored if they are sensitive (for example a password hash), however a hash of the changed value will still be logged.

Expand Down
8 changes: 4 additions & 4 deletions website/docs/releases/2024/v2024.4.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@ slug: /releases/2024.4

## Highlights

- **OAuth/SAML as authentication factor** <span class="badge badge--primary">Enterprise</span> Use an external provider as part of an MFA authentication flow, including custom implementations
- **OAuth/SAML as authentication factor** :ak-enterprise Use an external provider as part of an MFA authentication flow, including custom implementations

- **SCIM Source** <span class="badge badge--info">Preview</span> Provision users and groups in authentik using an SCIM API
- **SCIM Source** :ak-preview Provision users and groups in authentik using an SCIM API

- **Configurable WebAuthn device restrictions** Configure which types of WebAuthn devices can be used to enroll and validate for different authorization levels.

Expand All @@ -27,13 +27,13 @@ slug: /releases/2024.4

## New features

- **Source stage** <span class="badge badge--primary">Enterprise</span>
- **Source stage** :ak-enterprise

The source stage allows for an inclusion of a source as part of a flow. This can be used to link a user to a source as part of their authentication/enrollment, or it can be used as an external multi-factor to provide device health attestation for example.

For details refer to [Source stage](../../add-secure-apps/flows-stages/stages/source/index.md)

- **SCIM Source** <span class="badge badge--info">Preview</span>
- **SCIM Source** :ak-preview

Provision users and groups in authentik using an SCIM API.

Expand Down
Loading
Loading