Skip to content

dhoppeIT/terraform-authentik-provider_proxy

Repository files navigation

terraform-authentik-provider_proxy

Terraform module to manage the following Twingate resources:

  • authentik_provider_proxy

Usage

Copy and paste the following code snippet to your Terraform configuration, specify the required variables and run the command terraform init.

module "authentik_provider_proxy" {
  source  = "gitlab.com/terraform-child-modules-48151/terraform-authentik-provider-proxy/local"
  version = "1.0.0"

  name               = "example-provider-proxy"
  external_host      = "https://example.com"
  authorization_flow = "8dd2dda7-5624-4f42-8984-04139ce50236"
  invalidation_flow  = "742a8bb5-3981-44ab-949f-dada3e92daf9"

  internal_host = "https://localhost"
}

Requirements

Name Version
terraform >= 1.0
authentik ~> 2025.0

Providers

Name Version
authentik ~> 2025.0

Modules

No modules.

Resources

Name Type
authentik_provider_proxy.this resource

Inputs

Name Description Type Default Required
access_token_validity How long access tokens are valid for string "minutes=10" no
authentication_flow Flow used for authentication when the associated application is accessed by an un-authenticated user string null no
authorization_flow Flow used when authorizing this provider string n/a yes
basic_auth_enabled Set a custom HTTP-Basic authentication header based on values from authentik bool false no
basic_auth_password_attribute User/Group attribute used for the password part of the HTTP-Basic header string null no
basic_auth_username_attribute User/Group attribute used for the username part of the HTTP-Basic header string null no
cookie_domain The domain you wish the authentication to be valid for string null no
external_host The external URL you will access the application at string n/a yes
intercept_header_auth When enabled, this provider will intercept the authorization header and authenticate requests based on it's value bool true no
internal_host Upstream host taht the requests are forwarded to string null no
internal_host_ssl_validation Validate SSL certificates of upstream servers bool true no
invalidation_flow Flow used ending the session from a provider string n/a yes
jwt_federation_providers JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider list(number) [] no
jwt_federation_sources JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider list(string) [] no
mode Enable support for ForwardAuth in Traefik and Nginx auth_request string "proxy" no
name Name of the provider string n/a yes
property_mappings List of properties to pass information to external applications list(string) [] no
refresh_token_validity How long refresh tokens are valid for string "days=30" no
skip_path_regex Regular expressions for which authentication is not required string null no

Outputs

Name Description
client_id The Client ID of the provider
id The ID of this resource

Authors

Created and maintained by Dennis Hoppe.

License

Apache 2 licensed. See LICENSE for full details.