2020-02-29 07:43:59 +07:00
---
layout: default
title: Access Control
parent: Configuration
2020-05-16 06:41:42 +07:00
nav_order: 1
2020-02-29 07:43:59 +07:00
---
# Access Control
{: .no_toc }
2021-03-05 11:18:31 +07:00
## Policies
2020-02-29 07:43:59 +07:00
With **Authelia** you can define a list of rules that are going to be evaluated in
2020-03-10 05:37:46 +07:00
sequential order when authorization is delegated to Authelia.
2020-02-29 07:43:59 +07:00
2020-03-10 05:37:46 +07:00
The first matching rule of the list defines the policy applied to the resource, if
no rule matches the resource a customizable default policy is applied.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
### deny
This is the policy applied by default, and is what we recommend as the default policy for all installs. Its effect
is literally to deny the user access to the resource. Additionally you can use this policy to conditionally deny
access in desired situations. Examples include denying access to an API that has no authentication mechanism built in.
### bypass
This policy skips all authentication and allows anyone to use the resource. This policy is not available with a rule
that includes a [subject ](#Subjects ) restriction because the minimum authentication level required to obtain information
about the subject is [one_factor ](#one_factor ).
### one_factor
This policy requires the user at minimum complete 1FA successfully (username and password). This means if they have
performed 2FA then they will be allowed to access the resource.
### two_factor
This policy requires the user to complete 2FA successfully. This is currently the highest level of authentication
policy available.
## Default Policy
The default policy is the policy applied when no other rule matches. It is recommended that this is configured to
[deny ](#deny ) for security reasons. Sites which you do not wish to secure with Authelia should not be configured to
perform authentication with Authelia at all.
See [Policies ](#policies ) for more information.
## Network Aliases
The main networks section defines a list of network aliases, where the name matches a list of networks. These names can
be used in any [rule ](#rules ) instead of a literal network. This makes it easier to define a group of networks multiple
times.
You can combine both literal networks and these aliases inside the [networks ](#networks ) section of a rule. See this
section for more details.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
## Rules
2020-02-29 07:43:59 +07:00
A rule defines two things:
2020-03-10 05:37:46 +07:00
* the matching criteria of the request presented to the reverse proxy
* the policy applied when all criteria match.
2020-02-29 07:43:59 +07:00
2020-03-10 05:37:46 +07:00
The criteria are:
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
* domain: domain or list of domains targeted by the request.
* resources: pattern or list of patterns that the path should match.
2020-02-29 07:43:59 +07:00
* subject: the user or group of users to define the policy for.
2021-01-04 17:55:23 +07:00
* networks: the network addresses, ranges (CIDR notation) or groups from where the request originates.
2021-03-05 11:18:31 +07:00
* methods: the http methods used in the request.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
A rule is matched when all criteria of the rule match. Rules are evaluated in sequential order, and this is
particularly **important** for bypass rules. Bypass rules should generally appear near the top of the rules list.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
### Policy
2020-02-29 07:43:59 +07:00
A policy represents the level of authentication the user needs to pass before
being authorized to request the resource.
2021-03-05 11:18:31 +07:00
See [Policies ](#policies ) for more information.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
### Domains
2020-02-29 07:43:59 +07:00
The domains defined in rules must obviously be either a subdomain of the domain
protected by Authelia or the protected domain itself. In order to match multiple
subdomains, the wildcard matcher character `*.` can be used as prefix of the domain.
For instance, to define a rule for all subdomains of *example.com* , one would use
2020-04-16 07:18:11 +07:00
`*.example.com` in the rule. A single rule can define multiple domains for matching.
2020-11-13 06:30:23 +07:00
These domains can be either listed in YAML-short form `["example1.com", "example2.com"]`
or in YAML long-form as dashed list.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
Domain prefixes can also be dynamically match users or groups. For example you can have a
specific policy adjustment if the user or group matches the subdomain. For
example `{user}.example.com` or `{group}.example.com` check the users name or
groups against the subdomain.
### Resources
2020-02-29 07:43:59 +07:00
2020-11-13 06:30:23 +07:00
A rule can define multiple regular expressions for matching the path of the resource
similar to the list of domains. If any one of them matches, the resource criteria of
the rule matches.
2020-02-29 07:43:59 +07:00
2020-12-16 07:00:58 +07:00
Note that regular expressions can be used to match a given path. However, they do not match
the query parameters in the URL, only the path.
You might also face some escaping issues preventing Authelia to start. Please make sure that
when you are using regular expressions, you enclose them between quotes. It's optional but
it will likely save you a lot of debugging time.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
### Subjects
2020-02-29 07:43:59 +07:00
A subject is a representation of a user or a group of user for who the rule should apply.
For a user with unique identifier `john` , the subject should be `user:john` and for a group
2020-04-16 07:18:11 +07:00
uniquely identified by `developers` , the subject should be `group:developers` . Similar to resources
and domains you can define multiple subjects in a single rule.
2020-02-29 07:43:59 +07:00
2020-11-13 06:30:23 +07:00
If you want a combination of subjects to be matched at once using a logical `AND` , you can
specify a nested list of subjects like `- ["group:developers", "group:admins"]` .
In summary, the first list level of subjects are evaluated using a logical `OR` , whereas the
second level by a logical `AND` . The last example below reads as: the group is `dev` AND the
username is `john` OR the group is `admins` .
2020-06-25 15:22:42 +07:00
2021-03-05 11:18:31 +07:00
#### Combining subjects and the bypass policy
A subject cannot be combined with the `bypass` policy since the minimum authentication level to identify a subject is
`one_factor` . Combining the `one_factor` policy with a subject is effectively the same as setting the policy to `bypass`
in the past. We have taken an opinionated stance on preventing this configuration as it could result in problematic
security scenarios with badly thought out configurations and cannot see a likely configuration scenario that would
require users to do this. If you have a scenario in mind please open an
[issue ](https://github.com/authelia/authelia/issues/new ) on GitHub.
### Networks
2020-02-29 07:43:59 +07:00
2021-01-04 17:55:23 +07:00
A list of network addresses, ranges (CIDR notation) or groups can be specified in a rule in order to apply different
2021-03-05 11:18:31 +07:00
policies when requests originate from different networks. This list can contain both literal definitions of networks
and [network aliases ](#network-aliases ).
2020-02-29 07:43:59 +07:00
2021-03-11 06:18:39 +07:00
Network addresses specified will be matched against the first IP in the X-Forwarded-For, and if there is none it will fall back to the IP address of the request. If using Authelia with a reverse proxy, additional configuration
may be required on the reverse proxy to ensure these headers are present and correct.
2021-03-05 11:18:31 +07:00
Main use cases for this rule option is to adjust the security requirements of a resource based on the location of
the user. For example lets say a resource should be exposed both on the Internet and from an
2020-02-29 07:43:59 +07:00
authenticated VPN for instance. Passing a second factor a first time to get access to the VPN and
2020-03-10 05:37:46 +07:00
a second time to get access to the application can sometimes be cumbersome if the endpoint is not
considered overly sensitive.
2020-02-29 07:43:59 +07:00
2021-03-05 11:18:31 +07:00
An additional situation where this may be useful is if there is a specific network you wish to deny access
or require a higher level of authentication for; like a public machine network vs a company device network, or a
BYOD network.
2020-03-10 05:37:46 +07:00
Even if Authelia provides this flexibility, you might prefer a higher level of security and avoid
2020-02-29 07:43:59 +07:00
this option entirely. You and only you can define your security policy and it's up to you to
configure Authelia accordingly.
2021-03-05 11:18:31 +07:00
### Methods
A list of HTTP request methods to apply the rule to. Valid values are GET, HEAD, POST, PUT, DELETE,
CONNECT, OPTIONS, and TRACE. Additional information about HTTP request methods can be found on the
[MDN ](https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods ).
It's important to note this policy type is primarily intended for use when you wish to bypass authentication for
a specific request method. This is because there are several key limitations in what is possible to accomplish
without Authelia being a reverse proxy server. This rule type is discouraged unless you really know what you're
doing or you wish to setup a rule to bypass CORS preflight requests by bypassing for the OPTIONS method.
For example, if you require authentication only for write events (POST, PATCH, DELETE, PUT), when a user who is not
currently authenticated tries to do one of these actions, they will be redirected to Authelia. Authelia will decide
what level is required for authentication, and then after the user authenticates it will redirect them to the original
URL where Authelia decided they needed to authenticate. So if the endpoint they are redirected to originally had
data sent as part of the request, this data is completely lost. Further if the endpoint expects the data or doesn't allow
GET request types, the user may be presented with an error leading to a bad user experience.
2020-02-29 07:43:59 +07:00
## Complete example
Here is a complete example of complex access control list that can be defined in Authelia.
2020-04-11 11:46:07 +07:00
```yaml
access_control:
default_policy: deny
2021-01-04 17:55:23 +07:00
networks:
- name: internal
networks:
- 10.10.0.0/16
- 192.168.2.0/24
- name: VPN
networks: 10.9.0.0/16
2020-04-11 11:46:07 +07:00
rules:
- domain: public.example.com
policy: bypass
2021-03-05 11:18:31 +07:00
- domain: "*.example.com"
policy: bypass
methods:
- OPTIONS
2020-04-11 11:46:07 +07:00
- domain: secure.example.com
policy: one_factor
networks:
2021-01-04 17:55:23 +07:00
- internal
- VPN
- 192.168.1.0/24
- 10.0.0.1
2020-04-11 11:46:07 +07:00
2020-04-16 07:18:11 +07:00
- domain:
- secure.example.com
- private.example.com
2020-04-11 11:46:07 +07:00
policy: two_factor
- domain: singlefactor.example.com
policy: one_factor
- domain: "mx2.mail.example.com"
subject: "group:admins"
policy: deny
- domain: "*.example.com"
2020-04-16 07:18:11 +07:00
subject:
- "group:admins"
- "group:moderators"
2020-04-11 11:46:07 +07:00
policy: two_factor
- domain: dev.example.com
resources:
- "^/groups/dev/.*$"
subject: "group:dev"
policy: two_factor
- domain: dev.example.com
resources:
- "^/users/john/.*$"
2020-06-25 15:22:42 +07:00
subject:
- ["group:dev", "user:john"]
2020-11-13 06:30:23 +07:00
- "group:admins"
2020-04-11 11:46:07 +07:00
policy: two_factor
2021-03-05 11:18:31 +07:00
- domain: "{user}.example.com"
policy: bypass
2020-04-16 07:18:11 +07:00
```