Dokploy

Authelia

The Single Sign-On Multi-Factor portal for web apps. An open-source authentication and authorization server providing 2FA and SSO via web portal.

Authelia logo

Configuration

services:
  authelia:
    image: authelia/authelia:latest
    restart: unless-stopped
    volumes:
      - authelia_config:/config
      - ../files/configuration.yml:/config/configuration.yml:ro
      - ../files/users_database.yml:/config/users_database.yml
    environment:
      AUTHELIA_JWT_SECRET: $JWT_SECRET
      AUTHELIA_SESSION_SECRET: $SESSION_SECRET
      AUTHELIA_STORAGE_ENCRYPTION_KEY: $STORAGE_ENCRYPTION_KEY
      AUTHELIA_STORAGE_POSTGRES_PASSWORD: $POSTGRES_PASSWORD
    depends_on:
      redis:
        condition: service_healthy
      postgres:
        condition: service_healthy
    ports:
      - 9091

  redis:
    image: redis:7-alpine
    restart: unless-stopped
    volumes:
      - redis_data:/data
    command: redis-server --save 60 1 --loglevel warning --requirepass $REDIS_PASSWORD
    environment:
      REDIS_PASSWORD: $REDIS_PASSWORD
    healthcheck:
      test: ["CMD", "redis-cli", "--raw", "incr", "ping"]
      interval: 10s
      timeout: 3s
      retries: 5

  postgres:
    image: postgres:16-alpine
    restart: unless-stopped
    volumes:
      - postgres_data:/var/lib/postgresql/data
    environment:
      POSTGRES_DB: authelia
      POSTGRES_USER: authelia
      POSTGRES_PASSWORD: $POSTGRES_PASSWORD
    healthcheck:
      test: ["CMD-SHELL", "pg_isready -U authelia -d authelia"]
      interval: 10s
      timeout: 5s
      retries: 5
      start_period: 30s

volumes:
  authelia_config:
  redis_data:
  postgres_data:
[variables]
main_domain = "${domain}"
jwt_secret = "${password:64}"
session_secret = "${password:64}"
storage_encryption_key = "${password:64}"
redis_password = "${password:32}"
postgres_password = "${password:32}"
admin_username = "${username}"
admin_email = "${email}"
admin_password = "AdminPass123!"
admin_password_hash = "$argon2id$v=19$m=65536,t=3,p=4$170PGJ1MskQyxfFknfBPFQ$VqD1/pqC3fBHo+Zk58bC2xQm1ltOFTr0w2wx93vJgC4"

[config]
[[config.domains]]
serviceName = "authelia"
port = 9091
host = "${main_domain}"
path = "/"

[config.env]
JWT_SECRET = "${jwt_secret}"
SESSION_SECRET = "${session_secret}"
STORAGE_ENCRYPTION_KEY = "${storage_encryption_key}"
REDIS_PASSWORD = "${redis_password}"
POSTGRES_PASSWORD = "${postgres_password}"
admin_username = "${admin_username}"
admin_email = "${admin_email}"

[[config.mounts]]
filePath = "configuration.yml"
content = """
###############################################################
#                   Authelia configuration                    #
###############################################################

# DEFAULT ADMIN CREDENTIALS:
# Username: (auto-generated, check users_database.yml)
# Password: AdminPass123!
# Email: (auto-generated)
#
# IMPORTANT: Change the password after first login!
# SECURITY NOTE: This template starts with one-factor auth for easier setup.
# After configuring SMTP/notifications, change the policy to 'two_factor'

# Server Configuration
server:
  address: 'tcp://0.0.0.0:9091'
  headers:
    csp_template: ''

# Log Configuration
log:
  level: info
  format: text

# Theme
theme: auto

# TOTP Configuration
totp:
  disable: false
  issuer: authelia.com
  algorithm: sha1
  digits: 6
  period: 30
  skew: 1
  secret_size: 32

# WebAuthn/FIDO2 Configuration
webauthn:
  disable: false
  timeout: 60s
  display_name: Authelia
  attestation_conveyance_preference: indirect
  user_verification: preferred

# NTP Configuration
ntp:
  address: 'time.cloudflare.com:123'
  version: 4
  max_desync: 3s
  disable_startup_check: false
  disable_failure: false

# Authentication Backend Configuration
authentication_backend:
  password_reset:
    disable: false
    custom_url: ''
  refresh_interval: 5m
  file:
    path: /config/users_database.yml
    watch: false
    search:
      email: false
      case_insensitive: false
    password:
      algorithm: argon2
      argon2:
        variant: argon2id
        iterations: 3
        memory: 65536
        parallelism: 4
        key_length: 32
        salt_length: 16

# Password Policy
password_policy:
  standard:
    enabled: false
    min_length: 8
    max_length: 0
    require_uppercase: true
    require_lowercase: true
    require_number: true
    require_special: true
  zxcvbn:
    enabled: false
    min_score: 3

# Session Configuration
session:
  name: authelia_session
  domain: ${main_domain}
  same_site: lax
  secret: ${session_secret}
  expiration: 1h
  inactivity: 5m
  remember_me_duration: 1M
  redis:
    host: redis
    port: 6379
    password: ${redis_password}
    database_index: 0
    maximum_active_connections: 8
    minimum_idle_connections: 0

# Storage Configuration
storage:
  encryption_key: ${storage_encryption_key}
  postgres:
    host: postgres
    port: 5432
    database: authelia
    schema: public
    username: authelia
    password: ${postgres_password}
    timeout: 5s

# Notifier Configuration
notifier:
  disable_startup_check: true
  filesystem:
    filename: /config/notification.txt

# Regulation Configuration
regulation:
  max_retries: 3
  find_time: 10m
  ban_time: 12h

# Access Control Configuration - MODIFIED FOR EASIER INITIAL SETUP
access_control:
  default_policy: deny
  rules:
    - domain: ${main_domain}
      policy: one_factor  # Changed from one_factor to two_factor for production
"""

[[config.mounts]]
filePath = "users_database.yml"
content = """
###############################################################
#                         Users Database                     #
###############################################################

# DEFAULT LOGIN CREDENTIALS:
# Username: (generated from username helper)
# Password: AdminPass123!
# Email: (generated from email helper)
#
# IMPORTANT: Change the default password after first login!
# To generate a new password hash, run:
# docker run authelia/authelia:latest authelia hash-password 'your-new-password'

users:
  ${admin_username}:
    disabled: false
    displayname: "Authelia Admin"
    password: "${admin_password_hash}"
    email: ${admin_email}
    groups:
      - admins
      - dev
"""

Base64

To import this template in Dokploy: create a Compose service → AdvancedBase64 import and paste the content below:

{
  "compose": "services:\n  authelia:\n    image: authelia/authelia:latest\n    restart: unless-stopped\n    volumes:\n      - authelia_config:/config\n      - ../files/configuration.yml:/config/configuration.yml:ro\n      - ../files/users_database.yml:/config/users_database.yml\n    environment:\n      AUTHELIA_JWT_SECRET: $JWT_SECRET\n      AUTHELIA_SESSION_SECRET: $SESSION_SECRET\n      AUTHELIA_STORAGE_ENCRYPTION_KEY: $STORAGE_ENCRYPTION_KEY\n      AUTHELIA_STORAGE_POSTGRES_PASSWORD: $POSTGRES_PASSWORD\n    depends_on:\n      redis:\n        condition: service_healthy\n      postgres:\n        condition: service_healthy\n    ports:\n      - 9091\n\n  redis:\n    image: redis:7-alpine\n    restart: unless-stopped\n    volumes:\n      - redis_data:/data\n    command: redis-server --save 60 1 --loglevel warning --requirepass $REDIS_PASSWORD\n    environment:\n      REDIS_PASSWORD: $REDIS_PASSWORD\n    healthcheck:\n      test: [\"CMD\", \"redis-cli\", \"--raw\", \"incr\", \"ping\"]\n      interval: 10s\n      timeout: 3s\n      retries: 5\n\n  postgres:\n    image: postgres:16-alpine\n    restart: unless-stopped\n    volumes:\n      - postgres_data:/var/lib/postgresql/data\n    environment:\n      POSTGRES_DB: authelia\n      POSTGRES_USER: authelia\n      POSTGRES_PASSWORD: $POSTGRES_PASSWORD\n    healthcheck:\n      test: [\"CMD-SHELL\", \"pg_isready -U authelia -d authelia\"]\n      interval: 10s\n      timeout: 5s\n      retries: 5\n      start_period: 30s\n\nvolumes:\n  authelia_config:\n  redis_data:\n  postgres_data:",
  "config": "[variables]\nmain_domain = \"${domain}\"\njwt_secret = \"${password:64}\"\nsession_secret = \"${password:64}\"\nstorage_encryption_key = \"${password:64}\"\nredis_password = \"${password:32}\"\npostgres_password = \"${password:32}\"\nadmin_username = \"${username}\"\nadmin_email = \"${email}\"\nadmin_password = \"AdminPass123!\"\nadmin_password_hash = \"$argon2id$v=19$m=65536,t=3,p=4$170PGJ1MskQyxfFknfBPFQ$VqD1/pqC3fBHo+Zk58bC2xQm1ltOFTr0w2wx93vJgC4\"\n\n[config]\n[[config.domains]]\nserviceName = \"authelia\"\nport = 9091\nhost = \"${main_domain}\"\npath = \"/\"\n\n[config.env]\nJWT_SECRET = \"${jwt_secret}\"\nSESSION_SECRET = \"${session_secret}\"\nSTORAGE_ENCRYPTION_KEY = \"${storage_encryption_key}\"\nREDIS_PASSWORD = \"${redis_password}\"\nPOSTGRES_PASSWORD = \"${postgres_password}\"\nadmin_username = \"${admin_username}\"\nadmin_email = \"${admin_email}\"\n\n[[config.mounts]]\nfilePath = \"configuration.yml\"\ncontent = \"\"\"\n###############################################################\n#                   Authelia configuration                    #\n###############################################################\n\n# DEFAULT ADMIN CREDENTIALS:\n# Username: (auto-generated, check users_database.yml)\n# Password: AdminPass123!\n# Email: (auto-generated)\n#\n# IMPORTANT: Change the password after first login!\n# SECURITY NOTE: This template starts with one-factor auth for easier setup.\n# After configuring SMTP/notifications, change the policy to 'two_factor'\n\n# Server Configuration\nserver:\n  address: 'tcp://0.0.0.0:9091'\n  headers:\n    csp_template: ''\n\n# Log Configuration\nlog:\n  level: info\n  format: text\n\n# Theme\ntheme: auto\n\n# TOTP Configuration\ntotp:\n  disable: false\n  issuer: authelia.com\n  algorithm: sha1\n  digits: 6\n  period: 30\n  skew: 1\n  secret_size: 32\n\n# WebAuthn/FIDO2 Configuration\nwebauthn:\n  disable: false\n  timeout: 60s\n  display_name: Authelia\n  attestation_conveyance_preference: indirect\n  user_verification: preferred\n\n# NTP Configuration\nntp:\n  address: 'time.cloudflare.com:123'\n  version: 4\n  max_desync: 3s\n  disable_startup_check: false\n  disable_failure: false\n\n# Authentication Backend Configuration\nauthentication_backend:\n  password_reset:\n    disable: false\n    custom_url: ''\n  refresh_interval: 5m\n  file:\n    path: /config/users_database.yml\n    watch: false\n    search:\n      email: false\n      case_insensitive: false\n    password:\n      algorithm: argon2\n      argon2:\n        variant: argon2id\n        iterations: 3\n        memory: 65536\n        parallelism: 4\n        key_length: 32\n        salt_length: 16\n\n# Password Policy\npassword_policy:\n  standard:\n    enabled: false\n    min_length: 8\n    max_length: 0\n    require_uppercase: true\n    require_lowercase: true\n    require_number: true\n    require_special: true\n  zxcvbn:\n    enabled: false\n    min_score: 3\n\n# Session Configuration\nsession:\n  name: authelia_session\n  domain: ${main_domain}\n  same_site: lax\n  secret: ${session_secret}\n  expiration: 1h\n  inactivity: 5m\n  remember_me_duration: 1M\n  redis:\n    host: redis\n    port: 6379\n    password: ${redis_password}\n    database_index: 0\n    maximum_active_connections: 8\n    minimum_idle_connections: 0\n\n# Storage Configuration\nstorage:\n  encryption_key: ${storage_encryption_key}\n  postgres:\n    host: postgres\n    port: 5432\n    database: authelia\n    schema: public\n    username: authelia\n    password: ${postgres_password}\n    timeout: 5s\n\n# Notifier Configuration\nnotifier:\n  disable_startup_check: true\n  filesystem:\n    filename: /config/notification.txt\n\n# Regulation Configuration\nregulation:\n  max_retries: 3\n  find_time: 10m\n  ban_time: 12h\n\n# Access Control Configuration - MODIFIED FOR EASIER INITIAL SETUP\naccess_control:\n  default_policy: deny\n  rules:\n    - domain: ${main_domain}\n      policy: one_factor  # Changed from one_factor to two_factor for production\n\"\"\"\n\n[[config.mounts]]\nfilePath = \"users_database.yml\"\ncontent = \"\"\"\n###############################################################\n#                         Users Database                     #\n###############################################################\n\n# DEFAULT LOGIN CREDENTIALS:\n# Username: (generated from username helper)\n# Password: AdminPass123!\n# Email: (generated from email helper)\n#\n# IMPORTANT: Change the default password after first login!\n# To generate a new password hash, run:\n# docker run authelia/authelia:latest authelia hash-password 'your-new-password'\n\nusers:\n  ${admin_username}:\n    disabled: false\n    displayname: \"Authelia Admin\"\n    password: \"${admin_password_hash}\"\n    email: ${admin_email}\n    groups:\n      - admins\n      - dev\n\"\"\"\n"
}

Tags

authentication, authorization, 2fa, sso, security, reverse-proxy, ldap


Version: latest

On this page