authelia helm

Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.

More popular helm chart found

authelia from bjw-s is more popular with 53 repositories.

Install

Install with:

helm repo add authelia https://charts.authelia.com/
helm install authelia authelia/authelia -f values.yaml

Examples

See examples from other people.

Top Repositories (3 out of 4)

NameRepoStarsVersionTimestamp
autheliapascaliske/infrastructure580.9.95 days ago
autheliaPumba98/flux2-gitops490.9.914 days ago
autheliawrmilling/k3s-gitops2110.9.916 days ago

Values

See the most popular values for this chart:

KeyTypes
boolean
configMap.notifier.smtp.address (3)
submission://smtp.fastmail.com:587
string
boolean
configMap.notifier.smtp.sender (3)
Authelia <authelia@${SECRET_DOMAIN}>
string
string
configMap.notifier.smtp.subject (2)
[auth@infrastructure] {title}
string
string
string
configMap.notifier.smtp.password.value (1)
${SECRET_AUTH_SMTP_PASSWORD}
string
string
boolean
boolean
string
boolean
string
boolean
number
number
boolean
boolean
string
boolean
configMap.session.redis.password.value (1)
${SECRET_AUTH_REDIS_PASSWORD}
string
string
string
string
string
configMap.session.cookies[].default_redirection_url (1)
https://${DOMAIN_INTERNAL}
https://${DOMAIN_EXTERNAL}
string
string
string
string
string
string
string
string
boolean
configMap.storage.postgres.address (3)
tcp://authelia-postgresql:5432
string
string
string
boolean
string
configMap.storage.postgres.password.value (1)
${SECRET_AUTH_STORAGE_PASSWORD}
string
string
configMap.storage.encryption_key.value (1)
${SECRET_AUTH_STORAGE_ENC_KEY}
string
boolean
string
boolean
string
configMap.access_control.rules[].domain (3)
*.${SECRET_DOMAIN}
sftpgo.${SECRET_DOMAIN}
*.${SECRET_DOMAIN}
string
configMap.access_control.rules[].policy (3)
two_factor
two_factor
bypass
bypass
bypass
two_factor
string
configMap.access_control.rules[].domain[] (2)
- files.${SECRET_DOMAIN}
- syncthing.${SECRET_DOMAIN}
- radicale.${SECRET_DOMAIN}
- radicale.${SECRET_DOMAIN}
string
configMap.access_control.rules[].resources[] (2)
- ^/.web/.*
- ^/web/client/pubshares.*
- ^/static.*
string
string
string
string
configMap.access_control.networks[].networks[] (1)
- ${PRIVATE_NETWORK}
- "100.64.0.0/10"
string
boolean
boolean
string
number
number
number
number
number
string
string
boolean
boolean
boolean
string
string
configMap.authentication_backend.ldap.address (1)
ldap://openldap.kube-system.svc:1389
string
string
configMap.authentication_backend.ldap.groups_filter (1)
(&(member={dn})(objectclass=groupOfNames))
string
string
string
configMap.authentication_backend.ldap.user (1)
CN=${SECRET_LDAP_ADMIN_USERNAME},${SECRET_LDAP_BASE_DN}
string
string
configMap.authentication_backend.ldap.users_filter (1)
(&({username_attribute}={input})(objectClass=person))
string
boolean
boolean
string
boolean
configMap.identity_providers.oidc.clients[].authorization_policy (2)
two_factor
two_factor
two_factor
two_factor
two_factor
two_factor
two_factor
string
configMap.identity_providers.oidc.clients[].client_id (2)
Ph_ZrFAgRfB79_grNoVYFC3sPgQ9GLUKptNuTGNGpSe9bltBqDw45rNQ_oIWI2CAfnMqpGRL
0lKCSv_puuemgh08buYozXwRJ61u129TDEq42EBvnRcbGqJuZ25KywlUkviurEsJ~MbqvrM4
KNv~V~FBVK5R0bznkuHPV.fo-FmdqO0gUyifPqE6wH5SFTUgZma7uCJJTEinTNshwBVi4eWe
2HilffOuYvUuFZ6mBu0elHbv6KAQrwQsCCsAs5SaIIUq.ZyiwKb70upbQQmI7sXjBs~i60Tz
R4Fy_RAZUfHmPsCAWaD89Snt7wABRsD2IUTP3Xm0AxKbRWzBLIMqQNIpTvuLfKkC6_bvNagL
wCDESryfxgaEQUrgISZWrcNgNQCCUL3u1PZulzpSTaRvkQTpN4CQvrWx6RTa69flzhonmC5p
MJ04uHbUwWj00-RYG3X4QACoW-45EF0u0ahDEpv48yDT~caYFZMb240_nT8Z3kHrY6jmvY~Q
string
configMap.identity_providers.oidc.clients[].client_name (2)
Immich
Memos
Paperless
Tandoor
Rancher
Grafana
SFTPGo
string
configMap.identity_providers.oidc.clients[].redirect_uris[] (2)
- https://immich.${SECRET_DOMAIN}/auth/login
- https://immich.${SECRET_DOMAIN}/user-settings
- https://immich.${SECRET_DOMAIN}/api/oauth/mobile-redirect
- https://memos.${SECRET_DOMAIN}/auth/callback
- https://paperless.${SECRET_DOMAIN}/accounts/oidc/authelia/login/callback/
- https://recipes.${SECRET_DOMAIN}/accounts/oidc/authelia/login/callback/
- https://rancher.${SECRET_DOMAIN}/verify-auth
- https://grafana.${SECRET_DOMAIN}/login/generic_oauth
- https://sftpgo.${SECRET_DOMAIN}/web/oidc/redirect
string
string
string
configMap.identity_providers.oidc.clients[].client_secret.path (1)
/secrets/authelia/oidc.client.immich.value
/secrets/authelia/oidc.client.memos.value
/secrets/authelia/oidc.client.paperless.value
/secrets/authelia/oidc.client.tandoor.value
/secrets/authelia/oidc.client.rancher.value
/secrets/authelia/oidc.client.grafana.value
/secrets/authelia/oidc.client.sftpgo.value
string
configMap.identity_providers.oidc.clients[].client_secret (1)
${AUTH_OIDC_CLIENT_SECRET_HASH}
${AUTH_OIDC_CLIENT_SECRET_HASH}
string
configMap.identity_providers.oidc.clients[].consent_mode (1)
implicit
implicit
implicit
implicit
implicit
implicit
implicit
string
boolean
string
boolean
string
string
configMap.identity_providers.oidc.jwks[].key.path (2)
/secrets/authelia/oidc.jwk.RS256.pem
string
boolean
string
string
string
number
string
string
string
string
boolean
boolean
string
string
pod.kind (3)
Deployment
string
pod.extraVolumeMounts[].mountPath (2)
/config/users_database.yml
string
string
string
boolean
string
string
string
string
string
string
string
number
string
pod.tolerations[].key (2)
node-role.kubernetes.io/control-plane
k8s.pascaliske.dev/location
string
string
pod.tolerations[].effect (1)
NoSchedule
NoSchedule
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_URL (1)
ldap://lldap.default.svc.cluster.local:389
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USERS_FILTER (1)
(&({username_attribute}={input})(objectClass=person))
string
string
string
string
string
string
number
string
string
string
string
pod.env[].name (1)
TZ
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE
string
pod.env[].value (1)
${TIMEZONE}
/extras/postgresql-password
string
string
string
string
secret.additionalSecrets.authelia.items[].key (1)
identity_providers.oidc.hmac.key
oidc.jwk.RS256.pem
oidc.client.immich.value
oidc.client.memos.value
oidc.client.paperless.value
oidc.client.tandoor.value
oidc.client.rancher.value
oidc.client.grafana.value
oidc.client.sftpgo.value
string
domain (2)
${SECRET_DOMAIN}
string
string
string
string
ingress.className (2)
nginx-external
string
boolean
string
boolean
string
string
string
image.repository (1)
authelia/authelia
string
string
boolean
string
number