mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
ddea31193b
OpenID connect has become a standard when it comes to authentication and in order to fix a security concern around forwarding authentication and authorization information it has been decided to add support for it. This feature is in beta version and only enabled when there is a configuration for it. Before enabling it in production, please consider that it's in beta with potential bugs and that there are several production critical features still missing such as all OIDC related data is stored in configuration or memory. This means you are potentially going to experience issues with HA deployments, or when restarting a single instance specifically related to OIDC. We are still working on adding the remaining set of features before making it GA as soon as possible. Related to #189 Co-authored-by: Clement Michaud <clement.michaud34@gmail.com>
1.6 KiB
1.6 KiB
layout | title | nav_order | has_children |
---|---|---|---|
default | Home | 1 | true |
Home
It has never been so easy to secure your applications with Single Sign-On and Two-Factor.
With Authelia you can login once and get access to all your web apps safely from the Web thanks to two-factor authentication.
Authelia is an open source authentication and authorization server protecting modern web applications by collaborating with reverse proxies such as NGINX, Traefik and HAProxy. Consequently, no code is required to protect your apps.
Multiple 2-factor methods are available for satisfying every users.
- Time-based One-Time passwords with Google Authenticator.
- Security Keys with tokens like Yubikey.
- Push notifications on your mobile using Duo.
Authelia is available as Docker images, static binaries and AUR packages so that you can test it in minutes. Let's begin with the Getting Started.
However, Authelia...
- OpenID Connect is still in preview.
- is not a SAML provider yet.
- does not support authentication against an OAuth or OpenID Connect provider yet.
- does not support authentication against a SAML provider yet.
- does not support using hardware devices as single factor.
- does not provide a PAM module yet.