#SPDX-License-Identifier: MIT-0 --- # defaults file for authentik # Base directory configuration (inherited from base role or defined here) docker_compose_base_dir: /etc/docker/compose docker_volume_base_dir: /srv/data # Authentik-specific configuration authentik_service_name: authentik authentik_docker_compose_dir: "{{ docker_compose_base_dir }}/{{ authentik_service_name }}" authentik_docker_volume_dir: "{{ docker_volume_base_dir }}/{{ authentik_service_name }}" # Authentik service configuration authentik_domain: "authentik.local.test" authentik_image: "ghcr.io/goauthentik/server:2025.12.0" authentik_port: 9000 authentik_secret_key: "changeme-generate-a-random-string" # PostgreSQL configuration authentik_postgres_image: "postgres:16-alpine" authentik_postgres_db: authentik authentik_postgres_user: authentik authentik_postgres_password: "changeme" # Traefik configuration authentik_traefik_network: "proxy" authentik_backend_network: "backend" authentik_use_ssl: true # Authentik environment settings authentik_log_level: "info" authentik_error_reporting_enabled: false # Blueprints authentik_proxy_apps: [] # - slug: whoami # name: whoami # internal_host: "http://whoami:80" # external_host: "https://whoami.example.com" # skip_path_regex: | # ^/healthz$ # flows: # authentication_slug: default-authentication-flow # authorization_slug: default-provider-authorization-implicit-consent # invalidation_slug: default-provider-invalidation-flow authentik_proxy_outposts: [] # - name: "proxy-main" # type: "proxy" # service_connection: null # providers: # - whoami # - nextcloud-proxy # config: # authentik_host: "https://authentik.local.test/" # authentik_host_browser: "https://authentik.local.test/" # log_level: "info" authentik_oidc_apps: [] # - slug: grafana # name: Grafana # client_id_env: GRAFANA_OIDC_CLIENT_ID # client_secret_env: GRAFANA_OIDC_CLIENT_SECRET # redirect_uris: # - url: "https://grafana.example.com/login/generic_oauth" # matching_mode: strict # signing_key_name: "authentik Self-signed Certificate" # flows: # authorization_slug: default-provider-authorization-implicit-consent # invalidation_slug: default-provider-invalidation-flow # scopes: [openid, email, profile, offline_access] authentik_blueprint_env: [] # GRAFANA_OIDC_CLIENT_ID: "grafana" # GRAFANA_OIDC_CLIENT_SECRET: "{{ vault_grafana_oidc_secret }}" # ENTRA_TENANT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" # ENTRA_CLIENT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" # ENTRA_CLIENT_SECRET: "{{ vault_entra_client_secret }}" # Oauth sources authentik_entra_sources: [] # - slug: entra-id # name: "Login with Entra" # tenant_mode: single # single | common # tenant_id_env: ENTRA_TENANT_ID # client_id_env: ENTRA_CLIENT_ID # client_secret_env: ENTRA_CLIENT_SECRET # scopes: # - openid # - profile # - email # # add only if you really need group sync on login: # # - https://graph.microsoft.com/GroupMember.Read.All # Show Entra on login screen: authentik_login_source_ids: [] # - "source-entra-entra-id" authentik_identification_stage_name: default-authentication-identification