Authelia
The Single Sign-On Multi-Factor portal for web apps. An open-source authentication and authorization server providing 2FA and SSO via web portal.
Configuration
services:
authelia:
image: authelia/authelia:latest
restart: unless-stopped
volumes:
- authelia_config:/config
- ../files/configuration.yml:/config/configuration.yml:ro
- ../files/users_database.yml:/config/users_database.yml
environment:
AUTHELIA_JWT_SECRET: $JWT_SECRET
AUTHELIA_SESSION_SECRET: $SESSION_SECRET
AUTHELIA_STORAGE_ENCRYPTION_KEY: $STORAGE_ENCRYPTION_KEY
AUTHELIA_STORAGE_POSTGRES_PASSWORD: $POSTGRES_PASSWORD
depends_on:
redis:
condition: service_healthy
postgres:
condition: service_healthy
ports:
- 9091
redis:
image: redis:7-alpine
restart: unless-stopped
volumes:
- redis_data:/data
command: redis-server --save 60 1 --loglevel warning --requirepass $REDIS_PASSWORD
environment:
REDIS_PASSWORD: $REDIS_PASSWORD
healthcheck:
test: ["CMD", "redis-cli", "--raw", "incr", "ping"]
interval: 10s
timeout: 3s
retries: 5
postgres:
image: postgres:16-alpine
restart: unless-stopped
volumes:
- postgres_data:/var/lib/postgresql/data
environment:
POSTGRES_DB: authelia
POSTGRES_USER: authelia
POSTGRES_PASSWORD: $POSTGRES_PASSWORD
healthcheck:
test: ["CMD-SHELL", "pg_isready -U authelia -d authelia"]
interval: 10s
timeout: 5s
retries: 5
start_period: 30s
volumes:
authelia_config:
redis_data:
postgres_data:[variables]
main_domain = "${domain}"
jwt_secret = "${password:64}"
session_secret = "${password:64}"
storage_encryption_key = "${password:64}"
redis_password = "${password:32}"
postgres_password = "${password:32}"
admin_username = "${username}"
admin_email = "${email}"
admin_password = "AdminPass123!"
admin_password_hash = "$argon2id$v=19$m=65536,t=3,p=4$170PGJ1MskQyxfFknfBPFQ$VqD1/pqC3fBHo+Zk58bC2xQm1ltOFTr0w2wx93vJgC4"
[config]
[[config.domains]]
serviceName = "authelia"
port = 9091
host = "${main_domain}"
path = "/"
[config.env]
JWT_SECRET = "${jwt_secret}"
SESSION_SECRET = "${session_secret}"
STORAGE_ENCRYPTION_KEY = "${storage_encryption_key}"
REDIS_PASSWORD = "${redis_password}"
POSTGRES_PASSWORD = "${postgres_password}"
admin_username = "${admin_username}"
admin_email = "${admin_email}"
[[config.mounts]]
filePath = "configuration.yml"
content = """
###############################################################
# Authelia configuration #
###############################################################
# DEFAULT ADMIN CREDENTIALS:
# Username: (auto-generated, check users_database.yml)
# Password: AdminPass123!
# Email: (auto-generated)
#
# IMPORTANT: Change the password after first login!
# SECURITY NOTE: This template starts with one-factor auth for easier setup.
# After configuring SMTP/notifications, change the policy to 'two_factor'
# Server Configuration
server:
address: 'tcp://0.0.0.0:9091'
headers:
csp_template: ''
# Log Configuration
log:
level: info
format: text
# Theme
theme: auto
# TOTP Configuration
totp:
disable: false
issuer: authelia.com
algorithm: sha1
digits: 6
period: 30
skew: 1
secret_size: 32
# WebAuthn/FIDO2 Configuration
webauthn:
disable: false
timeout: 60s
display_name: Authelia
attestation_conveyance_preference: indirect
user_verification: preferred
# NTP Configuration
ntp:
address: 'time.cloudflare.com:123'
version: 4
max_desync: 3s
disable_startup_check: false
disable_failure: false
# Authentication Backend Configuration
authentication_backend:
password_reset:
disable: false
custom_url: ''
refresh_interval: 5m
file:
path: /config/users_database.yml
watch: false
search:
email: false
case_insensitive: false
password:
algorithm: argon2
argon2:
variant: argon2id
iterations: 3
memory: 65536
parallelism: 4
key_length: 32
salt_length: 16
# Password Policy
password_policy:
standard:
enabled: false
min_length: 8
max_length: 0
require_uppercase: true
require_lowercase: true
require_number: true
require_special: true
zxcvbn:
enabled: false
min_score: 3
# Session Configuration
session:
name: authelia_session
domain: ${main_domain}
same_site: lax
secret: ${session_secret}
expiration: 1h
inactivity: 5m
remember_me_duration: 1M
redis:
host: redis
port: 6379
password: ${redis_password}
database_index: 0
maximum_active_connections: 8
minimum_idle_connections: 0
# Storage Configuration
storage:
encryption_key: ${storage_encryption_key}
postgres:
host: postgres
port: 5432
database: authelia
schema: public
username: authelia
password: ${postgres_password}
timeout: 5s
# Notifier Configuration
notifier:
disable_startup_check: true
filesystem:
filename: /config/notification.txt
# Regulation Configuration
regulation:
max_retries: 3
find_time: 10m
ban_time: 12h
# Access Control Configuration - MODIFIED FOR EASIER INITIAL SETUP
access_control:
default_policy: deny
rules:
- domain: ${main_domain}
policy: one_factor # Changed from one_factor to two_factor for production
"""
[[config.mounts]]
filePath = "users_database.yml"
content = """
###############################################################
# Users Database #
###############################################################
# DEFAULT LOGIN CREDENTIALS:
# Username: (generated from username helper)
# Password: AdminPass123!
# Email: (generated from email helper)
#
# IMPORTANT: Change the default password after first login!
# To generate a new password hash, run:
# docker run authelia/authelia:latest authelia hash-password 'your-new-password'
users:
${admin_username}:
disabled: false
displayname: "Authelia Admin"
password: "${admin_password_hash}"
email: ${admin_email}
groups:
- admins
- dev
"""Base64
To import this template in Dokploy: create a Compose service → Advanced → Base64 import and paste the content below:
{
  "compose": "services:\n  authelia:\n    image: authelia/authelia:latest\n    restart: unless-stopped\n    volumes:\n      - authelia_config:/config\n      - ../files/configuration.yml:/config/configuration.yml:ro\n      - ../files/users_database.yml:/config/users_database.yml\n    environment:\n      AUTHELIA_JWT_SECRET: $JWT_SECRET\n      AUTHELIA_SESSION_SECRET: $SESSION_SECRET\n      AUTHELIA_STORAGE_ENCRYPTION_KEY: $STORAGE_ENCRYPTION_KEY\n      AUTHELIA_STORAGE_POSTGRES_PASSWORD: $POSTGRES_PASSWORD\n    depends_on:\n      redis:\n        condition: service_healthy\n      postgres:\n        condition: service_healthy\n    ports:\n      - 9091\n\n  redis:\n    image: redis:7-alpine\n    restart: unless-stopped\n    volumes:\n      - redis_data:/data\n    command: redis-server --save 60 1 --loglevel warning --requirepass $REDIS_PASSWORD\n    environment:\n      REDIS_PASSWORD: $REDIS_PASSWORD\n    healthcheck:\n      test: [\"CMD\", \"redis-cli\", \"--raw\", \"incr\", \"ping\"]\n      interval: 10s\n      timeout: 3s\n      retries: 5\n\n  postgres:\n    image: postgres:16-alpine\n    restart: unless-stopped\n    volumes:\n      - postgres_data:/var/lib/postgresql/data\n    environment:\n      POSTGRES_DB: authelia\n      POSTGRES_USER: authelia\n      POSTGRES_PASSWORD: $POSTGRES_PASSWORD\n    healthcheck:\n      test: [\"CMD-SHELL\", \"pg_isready -U authelia -d authelia\"]\n      interval: 10s\n      timeout: 5s\n      retries: 5\n      start_period: 30s\n\nvolumes:\n  authelia_config:\n  redis_data:\n  postgres_data:",
  "config": "[variables]\nmain_domain = \"${domain}\"\njwt_secret = \"${password:64}\"\nsession_secret = \"${password:64}\"\nstorage_encryption_key = \"${password:64}\"\nredis_password = \"${password:32}\"\npostgres_password = \"${password:32}\"\nadmin_username = \"${username}\"\nadmin_email = \"${email}\"\nadmin_password = \"AdminPass123!\"\nadmin_password_hash = \"$argon2id$v=19$m=65536,t=3,p=4$170PGJ1MskQyxfFknfBPFQ$VqD1/pqC3fBHo+Zk58bC2xQm1ltOFTr0w2wx93vJgC4\"\n\n[config]\n[[config.domains]]\nserviceName = \"authelia\"\nport = 9091\nhost = \"${main_domain}\"\npath = \"/\"\n\n[config.env]\nJWT_SECRET = \"${jwt_secret}\"\nSESSION_SECRET = \"${session_secret}\"\nSTORAGE_ENCRYPTION_KEY = \"${storage_encryption_key}\"\nREDIS_PASSWORD = \"${redis_password}\"\nPOSTGRES_PASSWORD = \"${postgres_password}\"\nadmin_username = \"${admin_username}\"\nadmin_email = \"${admin_email}\"\n\n[[config.mounts]]\nfilePath = \"configuration.yml\"\ncontent = \"\"\"\n###############################################################\n#                   Authelia configuration                    #\n###############################################################\n\n# DEFAULT ADMIN CREDENTIALS:\n# Username: (auto-generated, check users_database.yml)\n# Password: AdminPass123!\n# Email: (auto-generated)\n#\n# IMPORTANT: Change the password after first login!\n# SECURITY NOTE: This template starts with one-factor auth for easier setup.\n# After configuring SMTP/notifications, change the policy to 'two_factor'\n\n# Server Configuration\nserver:\n  address: 'tcp://0.0.0.0:9091'\n  headers:\n    csp_template: ''\n\n# Log Configuration\nlog:\n  level: info\n  format: text\n\n# Theme\ntheme: auto\n\n# TOTP Configuration\ntotp:\n  disable: false\n  issuer: authelia.com\n  algorithm: sha1\n  digits: 6\n  period: 30\n  skew: 1\n  secret_size: 32\n\n# WebAuthn/FIDO2 Configuration\nwebauthn:\n  disable: false\n  timeout: 60s\n  display_name: Authelia\n  attestation_conveyance_preference: indirect\n  user_verification: preferred\n\n# NTP Configuration\nntp:\n  address: 'time.cloudflare.com:123'\n  version: 4\n  max_desync: 3s\n  disable_startup_check: false\n  disable_failure: false\n\n# Authentication Backend Configuration\nauthentication_backend:\n  password_reset:\n    disable: false\n    custom_url: ''\n  refresh_interval: 5m\n  file:\n    path: /config/users_database.yml\n    watch: false\n    search:\n      email: false\n      case_insensitive: false\n    password:\n      algorithm: argon2\n      argon2:\n        variant: argon2id\n        iterations: 3\n        memory: 65536\n        parallelism: 4\n        key_length: 32\n        salt_length: 16\n\n# Password Policy\npassword_policy:\n  standard:\n    enabled: false\n    min_length: 8\n    max_length: 0\n    require_uppercase: true\n    require_lowercase: true\n    require_number: true\n    require_special: true\n  zxcvbn:\n    enabled: false\n    min_score: 3\n\n# Session Configuration\nsession:\n  name: authelia_session\n  domain: ${main_domain}\n  same_site: lax\n  secret: ${session_secret}\n  expiration: 1h\n  inactivity: 5m\n  remember_me_duration: 1M\n  redis:\n    host: redis\n    port: 6379\n    password: ${redis_password}\n    database_index: 0\n    maximum_active_connections: 8\n    minimum_idle_connections: 0\n\n# Storage Configuration\nstorage:\n  encryption_key: ${storage_encryption_key}\n  postgres:\n    host: postgres\n    port: 5432\n    database: authelia\n    schema: public\n    username: authelia\n    password: ${postgres_password}\n    timeout: 5s\n\n# Notifier Configuration\nnotifier:\n  disable_startup_check: true\n  filesystem:\n    filename: /config/notification.txt\n\n# Regulation Configuration\nregulation:\n  max_retries: 3\n  find_time: 10m\n  ban_time: 12h\n\n# Access Control Configuration - MODIFIED FOR EASIER INITIAL SETUP\naccess_control:\n  default_policy: deny\n  rules:\n    - domain: ${main_domain}\n      policy: one_factor  # Changed from one_factor to two_factor for production\n\"\"\"\n\n[[config.mounts]]\nfilePath = \"users_database.yml\"\ncontent = \"\"\"\n###############################################################\n#                         Users Database                     #\n###############################################################\n\n# DEFAULT LOGIN CREDENTIALS:\n# Username: (generated from username helper)\n# Password: AdminPass123!\n# Email: (generated from email helper)\n#\n# IMPORTANT: Change the default password after first login!\n# To generate a new password hash, run:\n# docker run authelia/authelia:latest authelia hash-password 'your-new-password'\n\nusers:\n  ${admin_username}:\n    disabled: false\n    displayname: \"Authelia Admin\"\n    password: \"${admin_password_hash}\"\n    email: ${admin_email}\n    groups:\n      - admins\n      - dev\n\"\"\"\n"
}Links
Tags
authentication, authorization, 2fa, sso, security, reverse-proxy, ldap
Version: latest
Audiobookshelf
Audiobookshelf is a self-hosted server designed to manage and play your audiobooks and podcasts. It works best when you have an organized directory structure.
Authentik
Authentik is an open-source Identity Provider for authentication and authorization. It provides a comprehensive solution for managing user authentication, authorization, and identity federation with support for SAML, OAuth2, OIDC, and more.