Portabase Logo
Portabase DashboardInstallationAuthenticationOpenID ConnectExamples

Authentik

Configuration guide for Authentik via OIDC in Portabase.

The integration of Authentik offers a modern authentication solution, ideal for self-hosting your Portabase instance.

Configuration Steps

Choose a provider type

Choose OAuth2/OpenID Provider.

Authentik - Choose a provider type

Configure OAuth2 provider

Set the authorized redirect URL to allow returning to Portabase after logging in:

Authentik - Configure OAuth2 provider

Environment Variables

Configure Portabase with the following values. This example uses the dynamic AUTH_OIDC_AUTHENTIK_ prefix to isolate the configuration.

# Identifier and Title
AUTH_OIDC_AUTHENTIK_ID="authentik"
AUTH_OIDC_AUTHENTIK_TITLE="Authentik"
AUTH_OIDC_AUTHENTIK_DESC="Login via my Authentik instance"

# OIDC Credentials
AUTH_OIDC_AUTHENTIK_CLIENT="portabase"
AUTH_OIDC_AUTHENTIK_SECRET="your-authentik-secret"
AUTH_OIDC_AUTHENTIK_ISSUER_URL="https://authentik.your-domain.com"
AUTH_OIDC_AUTHENTIK_HOST="authentik:3000" # If in the same Docker network or authentik.your-domain.com

# Advanced Settings
AUTH_OIDC_AUTHENTIK_SCOPES="openid profile email groups"
AUTH_OIDC_AUTHENTIK_PKCE=true

# Role Mapping
AUTH_OIDC_AUTHENTIK_ROLE_MAP="admin:admin,default:user"

AUTH_OIDC_AUTHENTIK_ALLOW_UNLINKING=false

Specific Endpoints (Optional)

If automatic discovery doesn't work, you can manually specify the endpoints:

AUTH_OIDC_AUTHENTIK_DISCOVERY_ENDPOINT="https://authentik.your-domain.com/.well-known/openid-configuration"
AUTH_OIDC_AUTHENTIK_JWKS_ENDPOINT="https://authentik.your-domain.com/.well-known/jwks.json"

On this page