authelia helm

Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.

More popular helm chart found

authelia from bjw-s is more popular with 47 repositories.

Install

Install with:

helm repo add authelia-charts https://charts.authelia.com/
helm install authelia authelia-charts/authelia -f values.yaml

Examples

See examples from other people.

Top Repositories (3 out of 5)

NameRepoStarsVersionTimestamp
autheliaPumba98/flux2-gitops380.8.582 days ago
autheliawrmilling/k3s-gitops1930.8.583 months ago
autheliadfroberg/cluster570.8.3810 months ago

Values

See the most popular values for this chart:

KeyTypes
string
configMap.access_control.rules[].policy (3)
bypass
two_factor
one_factor
one_factor
string
string
configMap.access_control.rules[].domain[] (2)
- paperless.${SECRET_DOMAIN}
- longhorn.${SECRET_DOMAIN}
- jd2.${SECRET_DOMAIN}
- metube.${SECRET_DOMAIN}
- grafana.${SECRET_DOMAIN}
- gitops.${SECRET_DOMAIN}
- receipes.${SECRET_DOMAIN}
- homer.${SECRET_DOMAIN}
- prometheus.${SECRET_DOMAIN}
- alert-manager.${SECRET_DOMAIN}
- goldilocks.${SECRET_DOMAIN}
string
string
string
configMap.access_control.rules[].resources[] (1)
- ^/api([/?].*)?$
- ^/(.*)/api([/?].*)?$
- ^/static([/?].*)?$
- ^/manifest[.]json$
string
string
string
boolean
boolean
string
number
configMap.notifier.smtp.sender (4)
authelia@${SECRET_DOMAIN}
string
string
string
string
string
boolean
boolean
string
boolean
boolean
string
boolean
boolean
string
number
number
string
string
string
string
string
string
boolean
string
string
string
number
string
string
boolean
string
boolean
boolean
string
string
configMap.authentication_backend.ldap.groups_filter (2)
(&(member={dn})(objectclass=posixGroup))
string
string
configMap.authentication_backend.ldap.url (2)
ldap://openldap.auth.svc.cluster.local:389
string
configMap.authentication_backend.ldap.user (2)
cn=admin,${SECRET_LDAP_BASE_DN}
string
string
configMap.authentication_backend.ldap.users_filter (2)
(&({username_attribute}={input})(objectClass=posixAccount))
string
string
string
boolean
string
number
number
number
number
number
string
string
boolean
boolean
string
string
string
string
number
number
number
configMap.totp.issuer (1)
${SECRET_PUBLIC_DOMAIN}
string
domain (5)
${SECRET_DOMAIN}
string
boolean
string
boolean
ingress.tls.secret (2)
${SECRET_DOMAIN//./-}-tls
string
string
string
string
string
string
string
string
string
ingress.className (2)
nginx-external
string
string
boolean
boolean
string
pod.kind (4)
Deployment
string
number
string
pod.env[].value (2)
${CLUSTER_TZ}
string
pod.extraVolumeMounts[].mountPath (2)
/config/users_database.yml
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_URL (1)
ldap://lldap.default.svc.cluster.local:389
string
string
string
pod.env.AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USERS_FILTER (1)
(&({username_attribute}={input})(objectClass=person))
string
string
string
string
string
string
number
string
string
string
string
string
string
string
secret.redis.key (3)
REDIS_PASSWORD
string
secret.redis.value (2)
${SECRET_REDIS_PASSWORD}
string
string
secret.smtp.key (3)
SMTP_PASSWORD
string
secret.smtp.value (2)
${SECRET_AUTHELIA_SMTP_PASSWORD}
string
string
secret.storage.key (3)
STORAGE_PASSWORD
string
secret.storage.value (2)
${SECRET_AUTHELIA_POSTGRES_PASSWORD}
string
string
string
secret.storageEncryptionKey.value (2)
${SECRET_AUTHELIA_STORAGE_ENCRYPTION_KEY}
string
string
string
string
secret.jwt.value (1)
${SECRET_AUTHELIA_JWT_SECRET}
string
secret.ldap.key (2)
LDAP_ADMIN_PASSWORD
string
secret.ldap.value (1)
${SECRET_LDAP_ADMIN_PASSWORD}
string
string
secret.session.key (1)
session_encryption_key
string
string
boolean
string
string
string
number