From ee537099943b238a8c59e5621ccbc37a8db64131 Mon Sep 17 00:00:00 2001 From: Fishandchips321 Date: Wed, 15 Apr 2026 16:02:47 +0100 Subject: [PATCH] feat(documentation): Added authentik readme content and example helm values file --- Authentik/README.md | 2 ++ Authentik/values.yml | 27 +++++++++++++++++++++++++++ 2 files changed, 29 insertions(+) create mode 100644 Authentik/values.yml diff --git a/Authentik/README.md b/Authentik/README.md index e69de29..1c105f0 100644 --- a/Authentik/README.md +++ b/Authentik/README.md @@ -0,0 +1,2 @@ +# Authentik +Authentik provides a single-sign-on service (SSO) that allows you to login to many different services using the same account. It provides LDAP, OIDC, OAUTH2, and other authentication endpoints. It is highly configurable (to the point of being quite complex). I used their helm chart ([found here](https://docs.goauthentik.io/install-config/install/kubernetes/)) to deploy mine. I may create a proper kubernetes deployment in the future if people want that, but the helm chart has worked perfectly fine for me. I have left an example values file here which is based on the one I used for my own deployment, but you are probably best off following the official documentation. \ No newline at end of file diff --git a/Authentik/values.yml b/Authentik/values.yml new file mode 100644 index 0000000..76d0bfe --- /dev/null +++ b/Authentik/values.yml @@ -0,0 +1,27 @@ +authentik: + secret_key: + # This sends anonymous usage-data, stack traces on errors and + # performance data to sentry.io, and is fully opt-in + error_reporting: + enabled: false + postgresql: + password: + +server: + ingress: + # Specify kubernetes ingress controller class name + ingressClassName: traefik + enabled: true + hosts: + - + annotations: + cert-manager.io/cluster-issuer: "letsencrypt-production" + tls: + - hosts: + - + secretName: authentik-tls + +postgresql: + enabled: true + auth: + password: