digitalboard.core/roles/authentik/defaults/main.yml

130 lines
3.9 KiB
YAML

#SPDX-License-Identifier: MIT-0
---
# defaults file for authentik
# Base directory configuration (inherited from base role or defined here)
docker_compose_base_dir: /etc/docker/compose
docker_volume_base_dir: /srv/data
# Authentik-specific configuration
authentik_service_name: authentik
authentik_docker_compose_dir: "{{ docker_compose_base_dir }}/{{ authentik_service_name }}"
authentik_docker_volume_dir: "{{ docker_volume_base_dir }}/{{ authentik_service_name }}"
# Authentik service configuration
authentik_domain: "authentik.local.test"
authentik_image: "ghcr.io/goauthentik/server:2025.12.0"
authentik_port: 9000
authentik_secret_key: "changeme-generate-a-random-string"
# PostgreSQL configuration
authentik_postgres_image: "postgres:16-alpine"
authentik_postgres_db: authentik
authentik_postgres_user: authentik
authentik_postgres_password: "changeme"
# Traefik configuration
authentik_traefik_network: "proxy"
authentik_backend_network: "backend"
authentik_use_ssl: true
# Authentik environment settings
authentik_log_level: "info"
authentik_error_reporting_enabled: false
# Blueprints
authentik_proxy_apps: []
# - slug: whoami
# name: whoami
# internal_host: "http://whoami:80"
# external_host: "https://whoami.example.com"
# skip_path_regex: |
# ^/healthz$
# flows:
# authentication_slug: default-authentication-flow
# authorization_slug: default-provider-authorization-implicit-consent
# invalidation_slug: default-provider-invalidation-flow
authentik_proxy_outposts: []
# - name: "proxy-main"
# type: "proxy"
# service_connection: null
# providers:
# - whoami
# - nextcloud-proxy
# config:
# authentik_host: "https://authentik.local.test/"
# authentik_host_browser: "https://authentik.local.test/"
# log_level: "info"
authentik_oidc_apps: []
# - slug: grafana
# name: Grafana
# client_id_env: GRAFANA_OIDC_CLIENT_ID
# client_secret_env: GRAFANA_OIDC_CLIENT_SECRET
# redirect_uris:
# - url: "https://grafana.example.com/login/generic_oauth"
# matching_mode: strict
# signing_key_name: "authentik Self-signed Certificate"
# flows:
# authorization_slug: default-provider-authorization-implicit-consent
# invalidation_slug: default-provider-invalidation-flow
# scopes: [openid, email, profile, offline_access]
authentik_blueprint_env: []
# GRAFANA_OIDC_CLIENT_ID: "grafana"
# GRAFANA_OIDC_CLIENT_SECRET: "{{ vault_grafana_oidc_secret }}"
# ENTRA_TENANT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
# ENTRA_CLIENT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
# ENTRA_CLIENT_SECRET: "{{ vault_entra_client_secret }}"
# Oauth sources
authentik_entra_sources: []
# - slug: entra-id
# name: "Login with Entra"
# tenant_mode: single # single | common
# tenant_id_env: ENTRA_TENANT_ID
# client_id_env: ENTRA_CLIENT_ID
# client_secret_env: ENTRA_CLIENT_SECRET
# scopes:
# - openid
# - profile
# - email
# # add only if you really need group sync on login:
# # - https://graph.microsoft.com/GroupMember.Read.All
# Show OAuth sources on login screen (list of source slugs):
authentik_login_sources: []
# - slug: entra-id
authentik_identification_stage_name: default-authentication-identification
# Local login fields to show on login screen (username, email, upn)
# Set to empty list to hide local login form entirely
authentik_login_user_fields:
- username
- email
# Local users to provision
authentik_local_users: []
# - username: admin
# name: "Admin User"
# email: "admin@example.com"
# password_env: AUTHENTIK_ADMIN_PASSWORD # reference env var in authentik_blueprint_env
# is_active: true
# groups:
# - authentik Admins
# attributes:
# settings:
# locale: en
# Resources to remove from Authentik (cleanup)
# Add slugs/names here when removing from the lists above
authentik_removed_oidc_apps: []
# - grafana
authentik_removed_proxy_apps: []
# - whoami
authentik_removed_local_users: []
# - olduser