authelia helm

Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.

More popular helm chart found

authelia from bjw-s is more popular with 24 repositories.

Install

Install with:

helm repo add authelia https://charts.authelia.com/
helm install authelia authelia/authelia -f values.yaml

Top Repositories (2 out of 5)

See examples from other people.

NameRepoStarsVersionTimestamp
autheliaPumba98/flux2-gitops330.8.58a month ago
autheliadfroberg/cluster470.8.386 months ago

Values

See the most popular values for this chart:

KeyTypes
boolean
string
number
number
number
number
number
string
string
boolean
string
string
string
string
string
string
configMap.authentication_backend.ldap.url (1)
ldap://glauth.kube-system.svc.cluster.local:389
string
configMap.authentication_backend.ldap.user (1)
${SECRET_LDAP_USER},${SECRET_LDAP_BASE_DN}
string
string
configMap.authentication_backend.ldap.users_filter (1)
(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=*))
string
boolean
boolean
boolean
string
number
configMap.notifier.smtp.sender (3)
authelia@${SECRET_DOMAIN}
string
string
string
boolean
boolean
string
string
string
boolean
boolean
string
boolean
boolean
string
number
string
string
string
string
string
boolean
string
string
string
boolean
string
boolean
string
configMap.access_control.rules[].policy (4)
bypass
two_factor
one_factor
one_factor
string
string
configMap.access_control.rules[].domain[] (3)
- paperless.${SECRET_DOMAIN}
- longhorn.${SECRET_DOMAIN}
- jd2.${SECRET_DOMAIN}
- grafana.${SECRET_DOMAIN}
- gitops.${SECRET_DOMAIN}
- receipes.${SECRET_DOMAIN}
- homer.${SECRET_DOMAIN}
- prometheus.${SECRET_DOMAIN}
- alert-manager.${SECRET_DOMAIN}
- goldilocks.${SECRET_DOMAIN}
string
string
string
configMap.access_control.rules[].resources[] (1)
- ^/api([/?].*)?$
- ^/(.*)/api([/?].*)?$
- ^/static([/?].*)?$
- ^/manifest[.]json$
string
string
string
string
boolean
string
string
number
string
number
number
boolean
boolean
domain (5)
${SECRET_DOMAIN}
string
pod.kind (5)
Deployment
string
pod.extraVolumeMounts[].mountPath (3)
/config/users_database.yml
string
string
string
string
string
string
string
string
number
string, number
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_URL (1)
ldap://lldap.default.svc.cluster.local:389
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USERS_FILTER (1)
(&({username_attribute}={input})(objectClass=person))
string
string
string
string
string
string
number
string
string
string
string
string
pod.env[].value (1)
${CLUSTER_TZ}
string
boolean
string
string
string
string
string
string
string
string
string
string
string
boolean
ingress.tls.secret (1)
${SECRET_DOMAIN//./-}-tls
string
string
string
string
string
string
secret.jwt.value (1)
${SECRET_AUTHELIA_JWT_SECRET}
string
string
secret.redis.key (1)
REDIS_PASSWORD
string
secret.redis.value (1)
${SECRET_REDIS_PASSWORD}
string
string
secret.smtp.key (1)
SMTP_PASSWORD
string
secret.smtp.value (1)
${SECRET_AUTHELIA_SMTP_PASSWORD}
string
string
secret.storage.key (1)
STORAGE_PASSWORD
string
secret.storage.value (1)
${SECRET_AUTHELIA_POSTGRES_PASSWORD}
string
string
string
secret.storageEncryptionKey.value (1)
${SECRET_AUTHELIA_STORAGE_ENCRYPTION_KEY}
string
string
boolean
string
string
string
number