An open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for web applications.
Authelia is an open-source authentication and authorization server that provides single sign-on (SSO) and two-factor authentication (2FA) for web applications. It acts as a security companion for reverse proxies, centralizing access control and enhancing security for internal services. The project is OpenID Certified™ and supports modern protocols like OAuth 2.0 and WebAuthn.
System administrators, DevOps engineers, and security-conscious teams who need to secure internal web applications with SSO and 2FA. It is ideal for homelabs, enterprise environments, and Kubernetes deployments.
Developers choose Authelia for its comprehensive feature set, broad proxy compatibility, and open-source transparency. It offers enterprise-grade security without licensing costs, supports self-hosting, and integrates seamlessly with existing infrastructure.
The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Authelia is certified for multiple OpenID Connect profiles, ensuring reliable SSO and OAuth 2.0 compliance for modern identity management, as highlighted in the README.
Supports FIDO2 WebAuthn security keys, TOTP, and Duo push notifications, enabling passwordless authentication and robust security tailored to user preferences.
Integrates seamlessly with nginx, Traefik, Caddy, Envoy, HAProxy, and Skipper, making it adaptable to diverse existing infrastructures without vendor lock-in.
Offers rules-based policies matching criteria like subdomain, user group, and request method, allowing precise authorization for internal applications.
The README explicitly warns that Authelia is under active development with breaking changes, forcing users to pin versions and manually manage upgrades, which can disrupt operations.
Configuration requires deep integration with reverse proxies and databases like Redis for sessions, resulting in a steep learning curve and time investment for deployment.
Kubernetes support, including Helm charts, is labeled as beta, indicating instability and potential unsuitability for production-critical environments without additional testing.