Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.
authelia from bjw-s-labs/charts/ is more popular with 25 repositories.
Install with:
helm repo add authelia oci://ghcr.io/bjw-s-labs/charts/
helm install authelia authelia/authelia -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| authelia | auricom/home-ops | 204 | 4.6.2 | 6 days ago |
| authelia | ahgraber/homelab-gitops-k3s | 109 | 4.6.2 | 9 days ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
persistence.config.globalMounts[].path (10) /config/configuration.yaml | string |
persistence.config.globalMounts[].subPath (10) configuration.yaml | string |
| boolean | |
persistence.config.name (10) authelia-config | string |
persistence.config.type (10) configMap | string |
| boolean | |
persistence.secret-files.globalMounts[].path (3) /config/secret | string |
| string | |
| string | |
| boolean | |
| boolean | |
persistence.config-rules.globalMounts[].path (2) /config/configuration-rules.yaml | string |
| boolean | |
persistence.config-rules.globalMounts[].subPath (2) configuration-rules.yaml | string |
persistence.config-rules.name (2) authelia-config-rules | string |
persistence.config-rules.type (2) configMap | string |
| string | |
| string | |
| boolean | |
| string | |
persistence.db-secret-files.name (2) authelia-pguser-authelia | string |
| string | |
| boolean | |
persistence.dragonfly-secret-files.globalMounts[].path (2) /config/dragonfly | string |
persistence.dragonfly-secret-files.name (2) authelia-dragonfly | string |
| string | |
persistence.tmp.type (2) emptyDir | string |
persistence.secrets.globalMounts[].path (1) /config/secrets | string |
| boolean | |
| string | |
persistence.secrets.volumeSpec.projected.sources[].secret.name (1) authelia | string |
| string | |
| string | |
controllers.authelia.containers.app.env.X_AUTHELIA_CONFIG (9) /config/configuration.yaml | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
controllers.authelia.containers.app.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_ADDRESS (2) ldap://lldap.kube-auth.svc.cluster.local:389 | string |
controllers.authelia.containers.app.env.AUTHELIA_NOTIFIER_SMTP_SENDER (2) Authelia <authelia@${SECRET_DOMAIN}> | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
controllers.authelia.containers.app.image.repository (9) ghcr.io/authelia/authelia | string |
controllers.authelia.containers.app.image.tag (9) 4.39.16@sha256:edbce01c5125249e4f4faea01e0f76f0031d64b4a1d0c2514a0ca69cb126d05f | string |
| boolean | |
| boolean | |
| number | |
| string | |
| number | |
| number | |
| number | |
| number | |
| boolean | |
| boolean | |
| number | |
| string | |
| number | |
| number | |
| number | |
| number | |
| boolean | |
| number | |
| number | |
| string | |
| number | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
controllers.authelia.containers.main.image.repository (1) ghcr.io/authelia/authelia | string |
| string | |
| boolean | |
| boolean | |
| boolean | |
| number | |
| number | |
| string | |
| string | |
| number | |
controllers.authelia.strategy (9) RollingUpdate | string |
| boolean | |
| string | |
| boolean | |
| string | |
controllers.authelia.initContainers.init-db.image.repository (3) ghcr.io/home-operations/postgres-init | string |
controllers.authelia.initContainers.init-db.image.tag (3) 18.3.0@sha256:6fa1f331cddd2eb0b6afa7b8d3685c864127a81ab01c3d9400bc3ff5263a51cf | string, number |
| string | |
| string | |
| number | |
controllers.authelia.pod.topologySpreadConstraints[].topologyKey (3) kubernetes.io/hostname | string |
| string | |
controllers.authelia.pod.annotations."k8s.ksgate.org/postgres" (2) {
"apiVersion": "apps/v1",
"kind": "Deployment",
"name": "authelia-pgbouncer",
"expression": "resource.status.updatedReplicas >= 1"
}
| string |
| boolean | |
controllers.authelia.pod.schedulingGates[].name (2) k8s.ksgate.org/postgres | string |
| number | |
| boolean | |
| number | |
| string | |
| number | |
| boolean | |
| number | |
| boolean | |
service.app.controller (5) authelia | string |
service.main.controller (1) authelia | string |
| number | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| number | |
| number | |
| boolean | |
| string | |
| string | |
| number | |
| boolean | |
| boolean | |
| string | |
| number | |
defaultPodOptions.topologySpreadConstraints[].topologyKey (3) kubernetes.io/hostname | string |
| string | |
route.app.hostnames[] (6) - auth.${DOMAIN_NAME} | string |
| string | |
| string | |
| string | |
| number | |
| string | |
| string | |
route.app.rules[].filters[].requestHeaderModifier.add[].name (1) Cache-Control | string |
route.app.rules[].filters[].requestHeaderModifier.add[].value (1) no-store | string |
route.app.rules[].filters[].type (1) RequestHeaderModifier | string |
route.app.annotations."gatus.home-operations.com/enabled" (2) conditions: ['[STATUS] == 200']
group: auth | string |
route.app.annotations."gatus.home-operations.com/endpoint" (1) conditions: ["[STATUS] == any(200,401)"] | string |
route.main.hostnames[] (2) - auth.rphilipsen.nl | string |
route.main.parentRefs[].name (2) external | string |
| string | |
| string | |
| string | |
| number | |
route.main.annotations."gatus.home-operations.com/endpoint" (1) conditions: ["[STATUS] == 200"] | string |
route.external.hostnames[] (1) - auth.${SECRET_DOMAIN} | string |
route.external.parentRefs[].name (1) envoy-external | string |
| string | |
| string | |
| string | |
| number | |
| string | |
| string | |
| string | |
route.internal.hostnames[] (1) - auth.${SECRET_DOMAIN} | string |
route.internal.parentRefs[].name (1) envoy-internal | string |
| string | |
| string | |
| string | |
| number | |
| string | |
| string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/configuration-snippet" (1) add_header Cache-Control "no-store";
add_header Pragma "no-cache";
add_header X-Frame-Options "SAMEORIGIN";
add_header X-XSS-Protection "1; mode=block";
| string |
| string | |
| string | |
ingress.app.className (1) external | string |
ingress.app.hosts[].host (1) auth.mcgrath.nz | string |
| string | |
| string | |
| string | |
ingress.app.tls[].hosts[] (1) - auth.mcgrath.nz | string |