This is an example guide how to deploy Authentik with Traefik in forward auth proxy mode - that means that any application behind the proxy will be automatically authenticated by Traefik. This allows better reuse of code and completely moves user management to Traefik & Authentik.
In this guide we use custom DNS to make the requests nicer and to show that it works with DNS. So step #1 is to put following records to
your /etc/hosts
(for example by sudo nano /etc/hosts
and adding these values)
# domains needed for traefik & authentik example
127.0.0.1 app.example.com
127.0.0.1 auth.example.com
Now we need to start the applications - it is not completely automated, even thought we set the dependencies, Traefik does not pick the
middleware from the beginning, so it's better to start it one by one. Also check the logs per app if it started.
First make sure you have correct docker-compose.yml
file in the current folder (part of this gist).
- start databases ->
docker compose up -d postgresql redis
- start worker & authentik server ->
docker compose up -d worker server
- now go to http://localhost:9000/if/flow/initial-setup/ and create new account for
authentik (the username is
akadmin
) - setup application http://localhost:9000/if/admin/#/core/applications including provider
- when setting up provider, choose
Forward auth (single application)
option - setup outpost http://localhost:9000/if/admin/#/outpost/outposts that points to the application
- click on View Deployment Info and copy token -> this token then put to the
docker-compose.yml
toauthentik-proxy
service as environment variableAUTHENTIK_TOKEN=<copied data>
- start proxy ->
docker compose up -d authentik-proxy
- start our real app ->
docker compose up -d whoami
- if logs look good (especially
authentik-proxy
needs to be checked), start Traefik ->docker compose up -d traefik
- now everything should be up & running -> app is accessible from app.example.com and authentik admin interface from auth.example.com
- go to app and you will be asked to log in, use credentials created in step #3
Can you expand a bit on creating the app and provider? For the provider I don't see the option Forward Auth. I see
LDAP Provider
Allow applications to authenticate against authentik's users using LDAP.
OAuth2/OpenID Provider
OAuth2 Provider for generic OAuth and OpenID Connect Applications.
Proxy Provider
Protect applications that don't support any of the other Protocols by using a Reverse-Proxy.
SAML Provider
SAML 2.0 Endpoint for applications which support SAML.
SAML Provider from Metadata
Create a SAML Provider by importing its Metadata.