website/docs: remove � (#11823)
remove Signed-off-by: Tobias <5702338+T0biii@users.noreply.github.com>
This commit is contained in:
		| @ -112,7 +112,7 @@ An optional list of all permissions that will be given to the application by gra | |||||||
|  |  | ||||||
| #### Deny stage | #### Deny stage | ||||||
|  |  | ||||||
| ##### `deny_message` (string) <span class="badge badge--version">authentik 2023.10+</span> | ##### `deny_message` (string) <span class="badge badge--version">authentik 2023.10+</span> | ||||||
|  |  | ||||||
| Optionally overwrite the deny message shown, has a higher priority than the message configured in the stage. | Optionally overwrite the deny message shown, has a higher priority than the message configured in the stage. | ||||||
|  |  | ||||||
| @ -128,7 +128,7 @@ If set, this must be a list of group objects and not group names. | |||||||
|  |  | ||||||
| Path the `pending_user` will be written to. If not set in the flow, falls back to the value set in the user_write stage, and otherwise to the `users` path. | Path the `pending_user` will be written to. If not set in the flow, falls back to the value set in the user_write stage, and otherwise to the `users` path. | ||||||
|  |  | ||||||
| ##### `user_type` (string) <span class="badge badge--version">authentik 2023.10+</span> | ##### `user_type` (string) <span class="badge badge--version">authentik 2023.10+</span> | ||||||
|  |  | ||||||
| Type the `pending_user` will be created as. Must be one of `internal`, `external` or `service_account`. | Type the `pending_user` will be created as. Must be one of `internal`, `external` or `service_account`. | ||||||
|  |  | ||||||
|  | |||||||
| @ -10,7 +10,7 @@ Copy all of the integration key, secret key and API hostname, and paste them in | |||||||
|  |  | ||||||
| Devices created reference the stage they were created with, since the API credentials are needed to authenticate. This also means when the stage is deleted, all devices are removed. | Devices created reference the stage they were created with, since the API credentials are needed to authenticate. This also means when the stage is deleted, all devices are removed. | ||||||
|  |  | ||||||
| ## Importing users <span class="badge badge--version">authentik 2022.9+</span> | ## Importing users <span class="badge badge--version">authentik 2022.9+</span> | ||||||
|  |  | ||||||
| :::info | :::info | ||||||
| Due to the way the Duo API works, authentik can only automatically import existing Duo users when a Duo MFA or higher license is active. | Due to the way the Duo API works, authentik can only automatically import existing Duo users when a Duo MFA or higher license is active. | ||||||
| @ -20,7 +20,7 @@ To import a device, open the Stages list in the authentik Admin interface. On th | |||||||
|  |  | ||||||
| The Duo username can be found by navigating to your Duo Admin dashboard and selecting _Users_ in the sidebar. Optionally if you have multiple users with the same username, you can click on a User and copy their ID from the URL, and use that to import the device. | The Duo username can be found by navigating to your Duo Admin dashboard and selecting _Users_ in the sidebar. Optionally if you have multiple users with the same username, you can click on a User and copy their ID from the URL, and use that to import the device. | ||||||
|  |  | ||||||
| ### Older versions <span class="badge badge--version">authentik 2021.9.1+</span> | ### Older versions <span class="badge badge--version">authentik 2021.9.1+</span> | ||||||
|  |  | ||||||
| You can call the `/api/v3/stages/authenticator/duo/{stage_uuid}/import_devices/` endpoint ([see here](https://goauthentik.io/api/#post-/stages/authenticator/duo/-stage_uuid-/import_devices/)) using the following parameters: | You can call the `/api/v3/stages/authenticator/duo/{stage_uuid}/import_devices/` endpoint ([see here](https://goauthentik.io/api/#post-/stages/authenticator/duo/-stage_uuid-/import_devices/)) using the following parameters: | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,7 +1,12 @@ | |||||||
|  | --- | ||||||
|  | title: Caddy | ||||||
|  | hide_title: true | ||||||
|  | --- | ||||||
|  |  | ||||||
| import Tabs from "@theme/Tabs"; | import Tabs from "@theme/Tabs"; | ||||||
| import TabItem from "@theme/TabItem"; | import TabItem from "@theme/TabItem"; | ||||||
|  |  | ||||||
| # Caddy <span class="badge badge--version">authentik 2022.8+</span> | # Caddy <span class="badge badge--version">authentik 2022.8+</span> | ||||||
|  |  | ||||||
| The configuration template shown below apply to both single-application and domain-level forward auth. | The configuration template shown below apply to both single-application and domain-level forward auth. | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,7 +1,12 @@ | |||||||
|  | --- | ||||||
|  | title: Envoy | ||||||
|  | hide_title: true | ||||||
|  | --- | ||||||
|  |  | ||||||
| import Tabs from "@theme/Tabs"; | import Tabs from "@theme/Tabs"; | ||||||
| import TabItem from "@theme/TabItem"; | import TabItem from "@theme/TabItem"; | ||||||
|  |  | ||||||
| # Envoy <span class="badge badge--version">authentik 2022.6+</span> | # Envoy <span class="badge badge--version">authentik 2022.6+</span> | ||||||
|  |  | ||||||
| The configuration template shown below apply to both single-application and domain-level forward auth. | The configuration template shown below apply to both single-application and domain-level forward auth. | ||||||
|  |  | ||||||
|  | |||||||
| @ -2,7 +2,7 @@ | |||||||
| title: Blueprints | title: Blueprints | ||||||
| --- | --- | ||||||
|  |  | ||||||
| <span class="badge badge--version">authentik 2022.8+</span> | <span class="badge badge--version">authentik 2022.8+</span> | ||||||
|  |  | ||||||
| --- | --- | ||||||
|  |  | ||||||
|  | |||||||
| @ -26,7 +26,7 @@ For example: | |||||||
|  |  | ||||||
| ## `authentik_core.user` | ## `authentik_core.user` | ||||||
|  |  | ||||||
| ### `password` <span class="badge badge--version">authentik 2023.6+</span> | ### `password` <span class="badge badge--version">authentik 2023.6+</span> | ||||||
|  |  | ||||||
| Via the standard API, a user's password can only be set via the separate `/api/v3/core/users/<id>/set_password/` endpoint. In blueprints, the password of a user can be set using the `password` field. | Via the standard API, a user's password can only be set via the separate `/api/v3/core/users/<id>/set_password/` endpoint. In blueprints, the password of a user can be set using the `password` field. | ||||||
|  |  | ||||||
| @ -45,7 +45,7 @@ For example: | |||||||
|       password: this-should-be-a-long-value |       password: this-should-be-a-long-value | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ### `permissions` <span class="badge badge--version">authentik 2024.8+</span> | ### `permissions` <span class="badge badge--version">authentik 2024.8+</span> | ||||||
|  |  | ||||||
| The `permissions` field can be used to set global permissions for a user. A full list of possible permissions is included in the JSON schema for blueprints. | The `permissions` field can be used to set global permissions for a user. A full list of possible permissions is included in the JSON schema for blueprints. | ||||||
|  |  | ||||||
| @ -63,7 +63,7 @@ For example: | |||||||
|  |  | ||||||
| ## `authentik_core.application` | ## `authentik_core.application` | ||||||
|  |  | ||||||
| ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ||||||
|  |  | ||||||
| Application icons can be directly set to URLs with the `icon` field. | Application icons can be directly set to URLs with the `icon` field. | ||||||
|  |  | ||||||
| @ -81,7 +81,7 @@ For example: | |||||||
|  |  | ||||||
| ## `authentik_sources_oauth.oauthsource`, `authentik_sources_saml.samlsource`, `authentik_sources_plex.plexsource` | ## `authentik_sources_oauth.oauthsource`, `authentik_sources_saml.samlsource`, `authentik_sources_plex.plexsource` | ||||||
|  |  | ||||||
| ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ||||||
|  |  | ||||||
| Source icons can be directly set to URLs with the `icon` field. | Source icons can be directly set to URLs with the `icon` field. | ||||||
|  |  | ||||||
| @ -99,7 +99,7 @@ For example: | |||||||
|  |  | ||||||
| ## `authentik_flows.flow` | ## `authentik_flows.flow` | ||||||
|  |  | ||||||
| ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ### `icon` <span class="badge badge--version">authentik 2023.5+</span> | ||||||
|  |  | ||||||
| Flow backgrounds can be directly set to URLs with the `background` field. | Flow backgrounds can be directly set to URLs with the `background` field. | ||||||
|  |  | ||||||
| @ -119,7 +119,7 @@ For example: | |||||||
|  |  | ||||||
| ## `authentik_rbac.role` | ## `authentik_rbac.role` | ||||||
|  |  | ||||||
| ### `permissions` <span class="badge badge--version">authentik 2024.8+</span> | ### `permissions` <span class="badge badge--version">authentik 2024.8+</span> | ||||||
|  |  | ||||||
| The `permissions` field can be used to set global permissions for a role. A full list of possible permissions is included in the JSON schema for blueprints. | The `permissions` field can be used to set global permissions for a role. A full list of possible permissions is included in the JSON schema for blueprints. | ||||||
|  |  | ||||||
|  | |||||||
| @ -29,7 +29,7 @@ user = list_flatten(["foo"]) | |||||||
| # user = "foo" | # user = "foo" | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ### `ak_call_policy(name: str, **kwargs) -> PolicyResult` <span class="badge badge--version">authentik 2021.12+</span> | ### `ak_call_policy(name: str, **kwargs) -> PolicyResult` <span class="badge badge--version">authentik 2021.12+</span> | ||||||
|  |  | ||||||
| Call another policy with the name _name_. Current request is passed to policy. Key-word arguments | Call another policy with the name _name_. Current request is passed to policy. Key-word arguments | ||||||
| can be used to modify the request's context. | can be used to modify the request's context. | ||||||
| @ -70,7 +70,7 @@ Example: | |||||||
| other_user = ak_user_by(username="other_user") | other_user = ak_user_by(username="other_user") | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ### `ak_user_has_authenticator(user: User, device_type: Optional[str] = None) -> bool` <span class="badge badge--version">authentik 2022.9+</span> | ### `ak_user_has_authenticator(user: User, device_type: Optional[str] = None) -> bool` <span class="badge badge--version">authentik 2022.9+</span> | ||||||
|  |  | ||||||
| Check if a user has any authenticator devices. Only fully validated devices are counted. | Check if a user has any authenticator devices. Only fully validated devices are counted. | ||||||
|  |  | ||||||
| @ -87,7 +87,7 @@ Example: | |||||||
| return ak_user_has_authenticator(request.user) | return ak_user_has_authenticator(request.user) | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ### `ak_create_event(action: str, **kwargs) -> None` <span class="badge badge--version">authentik 2022.9+</span> | ### `ak_create_event(action: str, **kwargs) -> None` <span class="badge badge--version">authentik 2022.9+</span> | ||||||
|  |  | ||||||
| Create a new event with the action set to `action`. Any additional key-word parameters will be saved in the event context. Additionally, `context` will be set to the context in which this function is called. | Create a new event with the action set to `action`. Any additional key-word parameters will be saved in the event context. Additionally, `context` will be set to the context in which this function is called. | ||||||
|  |  | ||||||
| @ -112,7 +112,7 @@ ip_address('192.0.2.1') in ip_network('192.0.2.0/24') | |||||||
| # evaluates to True | # evaluates to True | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ## DNS resolution and reverse DNS lookups <span class="badge badge--version">authentik 2023.3+</span> | ## DNS resolution and reverse DNS lookups <span class="badge badge--version">authentik 2023.3+</span> | ||||||
|  |  | ||||||
| To resolve a hostname to a list of IP addresses, use the functions `resolve_dns(hostname)` and `resolve_dns(hostname, ip_version)`. | To resolve a hostname to a list of IP addresses, use the functions `resolve_dns(hostname)` and `resolve_dns(hostname, ip_version)`. | ||||||
|  |  | ||||||
|  | |||||||
| @ -8,11 +8,11 @@ To install authentik automatically (skipping the Out-of-box experience), you can | |||||||
|  |  | ||||||
| Configure the default password for the `akadmin` user. Only read on the first startup. Can be used for any flow executor. | Configure the default password for the `akadmin` user. Only read on the first startup. Can be used for any flow executor. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_BOOTSTRAP_TOKEN` <span class="badge badge--version">authentik 2021.8+</span> | ### `AUTHENTIK_BOOTSTRAP_TOKEN` <span class="badge badge--version">authentik 2021.8+</span> | ||||||
|  |  | ||||||
| Create a token for the default `akadmin` user. Only read on the first startup. The string you specify for this variable is the token key you can use to authenticate yourself to the API. | Create a token for the default `akadmin` user. Only read on the first startup. The string you specify for this variable is the token key you can use to authenticate yourself to the API. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_BOOTSTRAP_EMAIL` <span class="badge badge--version">authentik 2023.3+</span> | ### `AUTHENTIK_BOOTSTRAP_EMAIL` <span class="badge badge--version">authentik 2023.3+</span> | ||||||
|  |  | ||||||
| Set the email address for the default `akadmin` user. | Set the email address for the default `akadmin` user. | ||||||
|  |  | ||||||
|  | |||||||
| @ -299,47 +299,47 @@ Disable the inbuilt update-checker. Defaults to `false`. | |||||||
|     -   Kubeconfig |     -   Kubeconfig | ||||||
|     -   Existence of a docker socket |     -   Existence of a docker socket | ||||||
|  |  | ||||||
| ### `AUTHENTIK_LDAP__TASK_TIMEOUT_HOURS` <span class="badge badge--version">authentik 2023.1+</span> | ### `AUTHENTIK_LDAP__TASK_TIMEOUT_HOURS` <span class="badge badge--version">authentik 2023.1+</span> | ||||||
|  |  | ||||||
| Timeout in hours for LDAP synchronization tasks. | Timeout in hours for LDAP synchronization tasks. | ||||||
|  |  | ||||||
| Defaults to `2`. | Defaults to `2`. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_LDAP__PAGE_SIZE` <span class="badge badge--version">authentik 2023.6.1+</span> | ### `AUTHENTIK_LDAP__PAGE_SIZE` <span class="badge badge--version">authentik 2023.6.1+</span> | ||||||
|  |  | ||||||
| Page size for LDAP synchronization. Controls the number of objects created in a single task. | Page size for LDAP synchronization. Controls the number of objects created in a single task. | ||||||
|  |  | ||||||
| Defaults to `50`. | Defaults to `50`. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_LDAP__TLS__CIPHERS` <span class="badge badge--version">authentik 2022.7+</span> | ### `AUTHENTIK_LDAP__TLS__CIPHERS` <span class="badge badge--version">authentik 2022.7+</span> | ||||||
|  |  | ||||||
| Allows configuration of TLS Cliphers for LDAP connections used by LDAP sources. Setting applies to all sources. | Allows configuration of TLS Cliphers for LDAP connections used by LDAP sources. Setting applies to all sources. | ||||||
|  |  | ||||||
| Defaults to `null`. | Defaults to `null`. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_REPUTATION__EXPIRY` <span class="badge badge--version">authentik 2023.8.2+</span> | ### `AUTHENTIK_REPUTATION__EXPIRY` <span class="badge badge--version">authentik 2023.8.2+</span> | ||||||
|  |  | ||||||
| Configure how long reputation scores should be saved for in seconds. Note that this is different than [`AUTHENTIK_REDIS__CACHE_TIMEOUT_REPUTATION`](#redis-settings), as reputation is saved to the database every 5 minutes. | Configure how long reputation scores should be saved for in seconds. Note that this is different than [`AUTHENTIK_REDIS__CACHE_TIMEOUT_REPUTATION`](#redis-settings), as reputation is saved to the database every 5 minutes. | ||||||
|  |  | ||||||
| Defaults to `86400`. | Defaults to `86400`. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_SESSION_STORAGE` <span class="badge badge--version">authentik 2024.4+</span> | ### `AUTHENTIK_SESSION_STORAGE` <span class="badge badge--version">authentik 2024.4+</span> | ||||||
|  |  | ||||||
| Configure if the sessions are stored in the cache or the database. Defaults to `cache`. Allowed values are `cache` and `db`. Note that changing this value will invalidate all previous sessions. | Configure if the sessions are stored in the cache or the database. Defaults to `cache`. Allowed values are `cache` and `db`. Note that changing this value will invalidate all previous sessions. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_WEB__WORKERS` <span class="badge badge--version">authentik 2022.9+</span> | ### `AUTHENTIK_WEB__WORKERS` <span class="badge badge--version">authentik 2022.9+</span> | ||||||
|  |  | ||||||
| Configure how many gunicorn worker processes should be started (see https://docs.gunicorn.org/en/stable/design.html). | Configure how many gunicorn worker processes should be started (see https://docs.gunicorn.org/en/stable/design.html). | ||||||
|  |  | ||||||
| Defaults to 2. A value below 2 workers is not recommended. In environments where scaling with multiple replicas of the authentik server is not possible, this number can be increased to handle higher loads. | Defaults to 2. A value below 2 workers is not recommended. In environments where scaling with multiple replicas of the authentik server is not possible, this number can be increased to handle higher loads. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_WEB__THREADS` <span class="badge badge--version">authentik 2022.9+</span> | ### `AUTHENTIK_WEB__THREADS` <span class="badge badge--version">authentik 2022.9+</span> | ||||||
|  |  | ||||||
| Configure how many gunicorn threads a worker processes should have (see https://docs.gunicorn.org/en/stable/design.html). | Configure how many gunicorn threads a worker processes should have (see https://docs.gunicorn.org/en/stable/design.html). | ||||||
|  |  | ||||||
| Defaults to 4. | Defaults to 4. | ||||||
|  |  | ||||||
| ### `AUTHENTIK_WORKER__CONCURRENCY` <span class="badge badge--version">authentik 2023.9+</span> | ### `AUTHENTIK_WORKER__CONCURRENCY` <span class="badge badge--version">authentik 2023.9+</span> | ||||||
|  |  | ||||||
| Configure Celery worker concurrency for authentik worker (see https://docs.celeryq.dev/en/latest/userguide/configuration.html#worker-concurrency). This essentially defines the number of worker processes spawned for a single worker. | Configure Celery worker concurrency for authentik worker (see https://docs.celeryq.dev/en/latest/userguide/configuration.html#worker-concurrency). This essentially defines the number of worker processes spawned for a single worker. | ||||||
|  |  | ||||||
|  | |||||||
		Reference in New Issue
	
	Block a user
	 Tobias
					Tobias