website/docs: add note for CSRF in hass
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
		@ -10,6 +10,10 @@ From https://www.home-assistant.io/
 | 
				
			|||||||
Open source home automation that puts local control and privacy first. Powered by a worldwide community of tinkerers and DIY enthusiasts. Perfect to run on a Raspberry Pi or a local server.
 | 
					Open source home automation that puts local control and privacy first. Powered by a worldwide community of tinkerers and DIY enthusiasts. Perfect to run on a Raspberry Pi or a local server.
 | 
				
			||||||
:::
 | 
					:::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:::warning
 | 
				
			||||||
 | 
					You might run into CSRF errors, this is caused by Home-assistant and not authentik, see [this GitHub issue](https://github.com/goauthentik/authentik/issues/884#issuecomment-851542477).
 | 
				
			||||||
 | 
					:::
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Preparation
 | 
					## Preparation
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The following placeholders will be used:
 | 
					The following placeholders will be used:
 | 
				
			||||||
 | 
				
			|||||||
@ -5,21 +5,25 @@ title: Terminology
 | 
				
			|||||||
 | 
					
 | 
				
			||||||

 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Policy
 | 
					### System tasks
 | 
				
			||||||
 | 
					
 | 
				
			||||||
At a base level a policy is a yes/no gate. It will either evaluate to True or False depending on the Policy Kind and settings. For example, a "Group Membership Policy" evaluates to True if the user is member of the specified Group and False if not. This can be used to conditionally apply Stages, grant/deny access to various objects, and for other custom logic.
 | 
					These are longer-running tasks which authentik runs in the background. This is used to sync LDAP sources, backup the database, and other various tasks.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Provider
 | 
					### Application
 | 
				
			||||||
 | 
					
 | 
				
			||||||
A Provider is a way for other applications to authenticate against authentik. Common Providers are OpenID Connect (OIDC) and SAML.
 | 
					An application links together Policies with a Provider, allowing you to control access. It also holds Information like UI Name, Icon and more.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Source
 | 
					### Source
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Sources are locations from which users can be added to authentik. For example, an LDAP Connection to import Users from Active Directory, or an OAuth2 Connection to allow Social Logins.
 | 
					Sources are locations from which users can be added to authentik. For example, an LDAP Connection to import Users from Active Directory, or an OAuth2 Connection to allow Social Logins.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Application
 | 
					### Provider
 | 
				
			||||||
 | 
					
 | 
				
			||||||
An application links together Policies with a Provider, allowing you to control access. It also holds Information like UI Name, Icon and more.
 | 
					A Provider is a way for other applications to authenticate against authentik. Common Providers are OpenID Connect (OIDC) and SAML.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					### Policy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					At a base level a policy is a yes/no gate. It will either evaluate to True or False depending on the Policy Kind and settings. For example, a "Group Membership Policy" evaluates to True if the user is member of the specified Group and False if not. This can be used to conditionally apply Stages, grant/deny access to various objects, and for other custom logic.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Stages
 | 
					### Stages
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user