- vpn.md: Rewrite WireGuard section to match actual config (single tun_wg0 interface, 10.3.2.0/24 subnet, hub-and-spoke topology, correct device names and subnets for London/Valchedrym) - authentik-state.md: Document brute-force-protection policy unbinding fix that was blocking all unauthenticated users from login flows [ci skip]
121 lines
5.8 KiB
Markdown
121 lines
5.8 KiB
Markdown
# Authentik Current State
|
|
|
|
> Snapshot of applications, groups, users, and flows. Use `authentik` skill for management tasks.
|
|
|
|
## Applications (10)
|
|
| Application | Provider Type | Auth Flow |
|
|
|-------------|--------------|-----------|
|
|
| Cloudflare Access | OAuth2/OIDC | explicit consent |
|
|
| Domain wide catch all | Proxy (forward auth) | implicit consent |
|
|
| Forgejo | OAuth2/OIDC | explicit consent |
|
|
| Grafana | OAuth2/OIDC | implicit consent |
|
|
| Headscale | OAuth2/OIDC | explicit consent |
|
|
| Immich | OAuth2/OIDC | explicit consent |
|
|
| Kubernetes | OAuth2/OIDC (public) | implicit consent |
|
|
| linkwarden | OAuth2/OIDC | explicit consent |
|
|
| Matrix | OAuth2/OIDC | implicit consent |
|
|
| wrongmove | OAuth2/OIDC | implicit consent |
|
|
|
|
## Groups (9)
|
|
| Group | Parent | Superuser | Purpose |
|
|
|-------|--------|-----------|---------|
|
|
| Allow Login Users | -- | No | Parent group for login-permitted users |
|
|
| authentik Admins | -- | Yes | Full admin access |
|
|
| Headscale Users | Allow Login Users | No | VPN access |
|
|
| Home Server Admins | Allow Login Users | No | Server admin access |
|
|
| Wrongmove Users | Allow Login Users | No | Real-estate app access |
|
|
| kubernetes-admins | -- | No | K8s cluster-admin RBAC |
|
|
| kubernetes-power-users | -- | No | K8s power-user RBAC |
|
|
| kubernetes-namespace-owners | -- | No | K8s namespace-owner RBAC |
|
|
| Task Submitters | -- | No | Task submission access |
|
|
|
|
## Users (8 real)
|
|
| Username | Name | Type | Groups |
|
|
|----------|------|------|--------|
|
|
| akadmin | authentik Default Admin | internal | authentik Admins, Home Server Admins, Headscale Users |
|
|
| vbarzin@gmail.com | Viktor Barzin | internal | authentik Admins, Home Server Admins, Wrongmove Users, Headscale Users |
|
|
| emil.barzin@gmail.com | Emil Barzin | internal | Home Server Admins, Headscale Users |
|
|
| ancaelena98@gmail.com | Anca Milea | external | Wrongmove Users, Headscale Users |
|
|
| vabbit81@gmail.com | GHEORGHE Milea | external | Headscale Users |
|
|
| valentinakolevabarzina@gmail.com | Valentina | internal | Headscale Users |
|
|
| anca.r.cristian10@gmail.com | -- | internal | Wrongmove Users |
|
|
| kadir.tugan@gmail.com | Kadir | internal | Wrongmove Users |
|
|
|
|
## Login Sources
|
|
- **Google** (OAuth) -- user matching by identifier
|
|
- **GitHub** (OAuth) -- user matching by email_link
|
|
- **Facebook** (OAuth) -- user matching by email_link
|
|
- All sources use `invitation-enrollment` as enrollment flow (new users require invitation)
|
|
|
|
## Authorization Flows
|
|
- **Explicit consent** (`default-provider-authorization-explicit-consent`): Shows consent screen
|
|
- **Implicit consent** (`default-provider-authorization-implicit-consent`): Auto-redirects
|
|
|
|
## Invitation Enrollment Flow
|
|
Slug: `invitation-enrollment` | PK: `7d667321-2b02-4e16-8161-148078a8dac1`
|
|
|
|
New users can only sign up via invitation link. Admins generate single-use invite links.
|
|
|
|
### Stages (in order)
|
|
| Order | Stage | Type | Purpose |
|
|
|-------|-------|------|---------|
|
|
| 10 | invitation-validation | Invitation | Validates `?itoken=` parameter, blocks without valid token |
|
|
| 20 | enrollment-identification | Identification | Shows social login (Google/GitHub/Facebook) + passkey |
|
|
| 30 | enrollment-prompt | Prompt | Collects name and email (pre-filled from social login) |
|
|
| 40 | enrollment-user-write | User Write | Creates user in `Allow Login Users` group |
|
|
| 50 | enrollment-login | User Login | Auto-login after signup (policy: `invitation-group-assignment` adds user to target group from invitation `fixed_data.group`) |
|
|
|
|
### Invitation Management
|
|
Script: `.claude/scripts/authentik-invite.sh`
|
|
|
|
```bash
|
|
# Create invitation (single-use, no expiry)
|
|
./authentik-invite.sh create "Headscale Users"
|
|
|
|
# Create invitation with expiry
|
|
./authentik-invite.sh create "Wrongmove Users" --days 7
|
|
|
|
# Add user to group after enrollment
|
|
./authentik-invite.sh assign <username> "Headscale Users"
|
|
|
|
# List pending invitations
|
|
./authentik-invite.sh list
|
|
```
|
|
|
|
Invited users sign up via social login (Google/GitHub/Facebook) or passkey. No username/password enrollment.
|
|
The target group (e.g. "Headscale Users") is auto-assigned on enrollment via the `invitation-group-assignment` expression policy. The `assign` command is available for manual post-enrollment group changes.
|
|
|
|
## Cleanup Log (2026-03-13)
|
|
### Deleted Flows
|
|
- `enrollment-inviation` (typo) -- previous invitation attempt
|
|
- `headscale-authentication` -- not used by any provider
|
|
- `headscale-authorization` -- not used by any provider
|
|
- `default-enrollment-flow` -- password-based, unused
|
|
- `oauth-enrollment` -- replaced by invitation-enrollment
|
|
|
|
### Deleted Stages
|
|
- `enrollment-invitation`, `enrollment-invitation-write` (from old invitation flow)
|
|
- `invitation` (unbound)
|
|
- `default-enrollment-prompt-first`, `default-enrollment-prompt-second` (from default enrollment)
|
|
- `default-enrollment-user-write`, `default-enrollment-email-verification`, `default-enrollment-user-login`
|
|
|
|
### Deleted Groups
|
|
- `authentik Read-only` -- 0 users, unused role
|
|
|
|
### Deleted Policies
|
|
- `map github username to email` -- unbound
|
|
- `Map Google Attributes` -- unbound
|
|
|
|
### Deleted Roles
|
|
- `authentik Read-only` -- no group assignment
|
|
|
|
## Policy Fix (2026-04-06)
|
|
### Unbound brute-force-protection Policy
|
|
The `brute-force-protection` ReputationPolicy (PK: `ac98cb11-31d3-46ab-8883-bf51e6b09a60`, `check_username=True`, `check_ip=True`, `threshold=-5`) was bound to 3 authentication flows, causing "Flow does not apply to current user" for all unauthenticated users (no username to evaluate → failure_result=false → flow denied).
|
|
|
|
Removed bindings from:
|
|
- `default-authentication-flow` (PK: `34618cf3`) — username/password login
|
|
- `webauthn` (PK: `0b60c2a5`) — passkey login
|
|
- `default-source-authentication` (PK: via policybindingmodel `1a779f24`) — Google/GitHub/Facebook OAuth
|
|
|
|
Policy still exists with 0 bindings. If brute-force protection is needed, bind to the **password stage** (not the flow level).
|