$37
Self-hosted identity provider supporting SAML, OAuth2/OIDC, LDAP, and proxy authentication. Designed for Kubernetes deployment via Helm with declarative configuration through blueprints.
helm repo add authentik https://charts.goauthentik.io
helm repo update
helm upgrade --install authentik authentik/authentik -f values.yaml -n authentik --create-namespace
Initial setup: https://<host>/if/flow/initial-setup/
For Helm values reference and ArgoCD app-of-apps integration, see deployment.md.
Configure SAML providers for SSO with applications (ArgoCD, Grafana, etc.).
/application/saml/<slug>/metadata//application/saml/<slug>/sso/binding/post/YAML-based declarative configuration for flows, stages, providers, applications.
version, metadata, context, entries!KeyOf (intra-blueprint only), !Find, !FindObject (2025.8+), !Env, !Context, !Format, !If, !Condition, !Enumerate. !Slice does not exist — common mis-citation.state: values: present (reconcile drift), created (create-once-ignore-after), must_created (fail if exists), absent (delete)/blueprints/custom/ in server + worker pods, atomic per-file transactions, 60min reapply cadenceuser_matching_mode, password sync, delete_not_found): blueprints/ldap_sources.mdProtect apps behind Traefik using Authentik proxy provider outpost.
forwardAuth middleware pointing to outpostX-authentik-username, X-authentik-groups, X-authentik-email"Login with Google" via SAML federation source.
SAML/OIDC setup for common self-hosted apps.
/sso/binding/post/ not /sso/binding/redirect/ (CSRF)All settings via AUTHENTIK_* env vars. Double underscore (__) separates nested keys.
SECRET_KEY, LOG_LEVEL, COOKIE_DOMAINDISABLE_SERVER_SIDE_CURSORS), read replicasenv:// and file:// URI syntax for indirectionDisable all outbound connections for air-gapped environments:
AUTHENTIK_DISABLE_UPDATE_CHECK=true — disable version checkerAUTHENTIK_DISABLE_STARTUP_ANALYTICS=true — disable startup analyticsAUTHENTIK_ERROR_REPORTING__ENABLED=false — disable Sentryinitials in System > Settings (default uses Gravatar)/geoip/AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE to internal registryCustom logos, colors, CSS, and per-domain visual identity via the authentik_brands.brand model.
%(theme)s placeholder (light/dark)--pf-global--primary-color--*) for color schemes::part() targetingCustom attribute statements and access control.
request, user, provider variables| Endpoint | URL Pattern |
|---|---|
| Admin UI | /if/admin/ |
| User UI | /if/user/ |
| SAML Metadata | /application/saml/<slug>/metadata/ |
| SAML SSO (POST) | /application/saml/<slug>/sso/binding/post/ |
| SAML SSO (Redirect) | /application/saml/<slug>/sso/binding/redirect/ |
| SAML SLO | /application/saml/<slug>/slo/binding/[post|redirect]/ |
| IdP-initiated SSO | /application/saml/<slug>/sso/binding/init/ |
| OAuth2 Authorize | /application/o/authorize/ |
| OIDC Discovery | /application/o/<slug>/.well-known/openid-configuration |
| Outpost health | outpost:9300/metrics |