1. Packages
  2. Authentik Provider
  3. API Docs
  4. ProviderProxy
authentik 2025.2.0 published on Monday, Mar 24, 2025 by goauthentik

authentik.ProviderProxy

Explore with Pulumi AI

authentik logo
authentik 2025.2.0 published on Monday, Mar 24, 2025 by goauthentik

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as authentik from "@pulumi/authentik";
    
    const default_authorization_flow = authentik.getFlow({
        slug: "default-provider-authorization-implicit-consent",
    });
    const nameProviderProxy = new authentik.ProviderProxy("nameProviderProxy", {
        internalHost: "http://foo.bar.baz",
        externalHost: "http://internal.service",
        authorizationFlow: default_authorization_flow.then(default_authorization_flow => default_authorization_flow.id),
    });
    const nameApplication = new authentik.Application("nameApplication", {
        slug: "test-app",
        protocolProvider: nameProviderProxy.providerProxyId,
    });
    
    import pulumi
    import pulumi_authentik as authentik
    
    default_authorization_flow = authentik.get_flow(slug="default-provider-authorization-implicit-consent")
    name_provider_proxy = authentik.ProviderProxy("nameProviderProxy",
        internal_host="http://foo.bar.baz",
        external_host="http://internal.service",
        authorization_flow=default_authorization_flow.id)
    name_application = authentik.Application("nameApplication",
        slug="test-app",
        protocol_provider=name_provider_proxy.provider_proxy_id)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/authentik/v2025/authentik"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		default_authorization_flow, err := authentik.LookupFlow(ctx, &authentik.LookupFlowArgs{
    			Slug: pulumi.StringRef("default-provider-authorization-implicit-consent"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		nameProviderProxy, err := authentik.NewProviderProxy(ctx, "nameProviderProxy", &authentik.ProviderProxyArgs{
    			InternalHost:      pulumi.String("http://foo.bar.baz"),
    			ExternalHost:      pulumi.String("http://internal.service"),
    			AuthorizationFlow: pulumi.String(default_authorization_flow.Id),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = authentik.NewApplication(ctx, "nameApplication", &authentik.ApplicationArgs{
    			Slug:             pulumi.String("test-app"),
    			ProtocolProvider: nameProviderProxy.ProviderProxyId,
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Authentik = Pulumi.Authentik;
    
    return await Deployment.RunAsync(() => 
    {
        var default_authorization_flow = Authentik.GetFlow.Invoke(new()
        {
            Slug = "default-provider-authorization-implicit-consent",
        });
    
        var nameProviderProxy = new Authentik.ProviderProxy("nameProviderProxy", new()
        {
            InternalHost = "http://foo.bar.baz",
            ExternalHost = "http://internal.service",
            AuthorizationFlow = default_authorization_flow.Apply(default_authorization_flow => default_authorization_flow.Apply(getFlowResult => getFlowResult.Id)),
        });
    
        var nameApplication = new Authentik.Application("nameApplication", new()
        {
            Slug = "test-app",
            ProtocolProvider = nameProviderProxy.ProviderProxyId,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.authentik.AuthentikFunctions;
    import com.pulumi.authentik.inputs.GetFlowArgs;
    import com.pulumi.authentik.ProviderProxy;
    import com.pulumi.authentik.ProviderProxyArgs;
    import com.pulumi.authentik.Application;
    import com.pulumi.authentik.ApplicationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var default-authorization-flow = AuthentikFunctions.getFlow(GetFlowArgs.builder()
                .slug("default-provider-authorization-implicit-consent")
                .build());
    
            var nameProviderProxy = new ProviderProxy("nameProviderProxy", ProviderProxyArgs.builder()
                .internalHost("http://foo.bar.baz")
                .externalHost("http://internal.service")
                .authorizationFlow(default_authorization_flow.id())
                .build());
    
            var nameApplication = new Application("nameApplication", ApplicationArgs.builder()
                .slug("test-app")
                .protocolProvider(nameProviderProxy.providerProxyId())
                .build());
    
        }
    }
    
    resources:
      nameProviderProxy:
        type: authentik:ProviderProxy
        properties:
          internalHost: http://foo.bar.baz
          externalHost: http://internal.service
          authorizationFlow: ${["default-authorization-flow"].id}
      nameApplication:
        type: authentik:Application
        properties:
          slug: test-app
          protocolProvider: ${nameProviderProxy.providerProxyId}
    variables:
      default-authorization-flow:
        fn::invoke:
          function: authentik:getFlow
          arguments:
            slug: default-provider-authorization-implicit-consent
    

    Create ProviderProxy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ProviderProxy(name: string, args: ProviderProxyArgs, opts?: CustomResourceOptions);
    @overload
    def ProviderProxy(resource_name: str,
                      args: ProviderProxyArgs,
                      opts: Optional[ResourceOptions] = None)
    
    @overload
    def ProviderProxy(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      external_host: Optional[str] = None,
                      invalidation_flow: Optional[str] = None,
                      authorization_flow: Optional[str] = None,
                      internal_host_ssl_validation: Optional[bool] = None,
                      jwks_sources: Optional[Sequence[str]] = None,
                      basic_auth_username_attribute: Optional[str] = None,
                      cookie_domain: Optional[str] = None,
                      basic_auth_enabled: Optional[bool] = None,
                      intercept_header_auth: Optional[bool] = None,
                      internal_host: Optional[str] = None,
                      access_token_validity: Optional[str] = None,
                      authentication_flow: Optional[str] = None,
                      basic_auth_password_attribute: Optional[str] = None,
                      jwt_federation_providers: Optional[Sequence[float]] = None,
                      jwt_federation_sources: Optional[Sequence[str]] = None,
                      mode: Optional[str] = None,
                      name: Optional[str] = None,
                      property_mappings: Optional[Sequence[str]] = None,
                      provider_proxy_id: Optional[str] = None,
                      refresh_token_validity: Optional[str] = None,
                      skip_path_regex: Optional[str] = None)
    func NewProviderProxy(ctx *Context, name string, args ProviderProxyArgs, opts ...ResourceOption) (*ProviderProxy, error)
    public ProviderProxy(string name, ProviderProxyArgs args, CustomResourceOptions? opts = null)
    public ProviderProxy(String name, ProviderProxyArgs args)
    public ProviderProxy(String name, ProviderProxyArgs args, CustomResourceOptions options)
    
    type: authentik:ProviderProxy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ProviderProxyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ProviderProxyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ProviderProxyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ProviderProxyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ProviderProxyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var providerProxyResource = new Authentik.ProviderProxy("providerProxyResource", new()
    {
        ExternalHost = "string",
        InvalidationFlow = "string",
        AuthorizationFlow = "string",
        InternalHostSslValidation = false,
        JwksSources = new[]
        {
            "string",
        },
        BasicAuthUsernameAttribute = "string",
        CookieDomain = "string",
        BasicAuthEnabled = false,
        InterceptHeaderAuth = false,
        InternalHost = "string",
        AccessTokenValidity = "string",
        AuthenticationFlow = "string",
        BasicAuthPasswordAttribute = "string",
        JwtFederationProviders = new[]
        {
            0,
        },
        JwtFederationSources = new[]
        {
            "string",
        },
        Mode = "string",
        Name = "string",
        PropertyMappings = new[]
        {
            "string",
        },
        ProviderProxyId = "string",
        RefreshTokenValidity = "string",
        SkipPathRegex = "string",
    });
    
    example, err := authentik.NewProviderProxy(ctx, "providerProxyResource", &authentik.ProviderProxyArgs{
    	ExternalHost:              pulumi.String("string"),
    	InvalidationFlow:          pulumi.String("string"),
    	AuthorizationFlow:         pulumi.String("string"),
    	InternalHostSslValidation: pulumi.Bool(false),
    	JwksSources: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	BasicAuthUsernameAttribute: pulumi.String("string"),
    	CookieDomain:               pulumi.String("string"),
    	BasicAuthEnabled:           pulumi.Bool(false),
    	InterceptHeaderAuth:        pulumi.Bool(false),
    	InternalHost:               pulumi.String("string"),
    	AccessTokenValidity:        pulumi.String("string"),
    	AuthenticationFlow:         pulumi.String("string"),
    	BasicAuthPasswordAttribute: pulumi.String("string"),
    	JwtFederationProviders: pulumi.Float64Array{
    		pulumi.Float64(0),
    	},
    	JwtFederationSources: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Mode: pulumi.String("string"),
    	Name: pulumi.String("string"),
    	PropertyMappings: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	ProviderProxyId:      pulumi.String("string"),
    	RefreshTokenValidity: pulumi.String("string"),
    	SkipPathRegex:        pulumi.String("string"),
    })
    
    var providerProxyResource = new ProviderProxy("providerProxyResource", ProviderProxyArgs.builder()
        .externalHost("string")
        .invalidationFlow("string")
        .authorizationFlow("string")
        .internalHostSslValidation(false)
        .jwksSources("string")
        .basicAuthUsernameAttribute("string")
        .cookieDomain("string")
        .basicAuthEnabled(false)
        .interceptHeaderAuth(false)
        .internalHost("string")
        .accessTokenValidity("string")
        .authenticationFlow("string")
        .basicAuthPasswordAttribute("string")
        .jwtFederationProviders(0)
        .jwtFederationSources("string")
        .mode("string")
        .name("string")
        .propertyMappings("string")
        .providerProxyId("string")
        .refreshTokenValidity("string")
        .skipPathRegex("string")
        .build());
    
    provider_proxy_resource = authentik.ProviderProxy("providerProxyResource",
        external_host="string",
        invalidation_flow="string",
        authorization_flow="string",
        internal_host_ssl_validation=False,
        jwks_sources=["string"],
        basic_auth_username_attribute="string",
        cookie_domain="string",
        basic_auth_enabled=False,
        intercept_header_auth=False,
        internal_host="string",
        access_token_validity="string",
        authentication_flow="string",
        basic_auth_password_attribute="string",
        jwt_federation_providers=[0],
        jwt_federation_sources=["string"],
        mode="string",
        name="string",
        property_mappings=["string"],
        provider_proxy_id="string",
        refresh_token_validity="string",
        skip_path_regex="string")
    
    const providerProxyResource = new authentik.ProviderProxy("providerProxyResource", {
        externalHost: "string",
        invalidationFlow: "string",
        authorizationFlow: "string",
        internalHostSslValidation: false,
        jwksSources: ["string"],
        basicAuthUsernameAttribute: "string",
        cookieDomain: "string",
        basicAuthEnabled: false,
        interceptHeaderAuth: false,
        internalHost: "string",
        accessTokenValidity: "string",
        authenticationFlow: "string",
        basicAuthPasswordAttribute: "string",
        jwtFederationProviders: [0],
        jwtFederationSources: ["string"],
        mode: "string",
        name: "string",
        propertyMappings: ["string"],
        providerProxyId: "string",
        refreshTokenValidity: "string",
        skipPathRegex: "string",
    });
    
    type: authentik:ProviderProxy
    properties:
        accessTokenValidity: string
        authenticationFlow: string
        authorizationFlow: string
        basicAuthEnabled: false
        basicAuthPasswordAttribute: string
        basicAuthUsernameAttribute: string
        cookieDomain: string
        externalHost: string
        interceptHeaderAuth: false
        internalHost: string
        internalHostSslValidation: false
        invalidationFlow: string
        jwksSources:
            - string
        jwtFederationProviders:
            - 0
        jwtFederationSources:
            - string
        mode: string
        name: string
        propertyMappings:
            - string
        providerProxyId: string
        refreshTokenValidity: string
        skipPathRegex: string
    

    ProviderProxy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ProviderProxy resource accepts the following input properties:

    AuthorizationFlow string
    ExternalHost string
    InvalidationFlow string
    AccessTokenValidity string
    Defaults to minutes=10.
    AuthenticationFlow string
    BasicAuthEnabled bool
    Defaults to false.
    BasicAuthPasswordAttribute string
    BasicAuthUsernameAttribute string
    CookieDomain string
    InterceptHeaderAuth bool
    Defaults to true.
    InternalHost string
    InternalHostSslValidation bool
    Defaults to true.
    JwksSources List<string>
    Deprecated. Use jwt_federation_sources instead.
    JwtFederationProviders List<double>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    JwtFederationSources List<string>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    Mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    Name string
    PropertyMappings List<string>
    ProviderProxyId string
    RefreshTokenValidity string
    Defaults to days=30.
    SkipPathRegex string
    AuthorizationFlow string
    ExternalHost string
    InvalidationFlow string
    AccessTokenValidity string
    Defaults to minutes=10.
    AuthenticationFlow string
    BasicAuthEnabled bool
    Defaults to false.
    BasicAuthPasswordAttribute string
    BasicAuthUsernameAttribute string
    CookieDomain string
    InterceptHeaderAuth bool
    Defaults to true.
    InternalHost string
    InternalHostSslValidation bool
    Defaults to true.
    JwksSources []string
    Deprecated. Use jwt_federation_sources instead.
    JwtFederationProviders []float64
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    JwtFederationSources []string
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    Mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    Name string
    PropertyMappings []string
    ProviderProxyId string
    RefreshTokenValidity string
    Defaults to days=30.
    SkipPathRegex string
    authorizationFlow String
    externalHost String
    invalidationFlow String
    accessTokenValidity String
    Defaults to minutes=10.
    authenticationFlow String
    basicAuthEnabled Boolean
    Defaults to false.
    basicAuthPasswordAttribute String
    basicAuthUsernameAttribute String
    cookieDomain String
    interceptHeaderAuth Boolean
    Defaults to true.
    internalHost String
    internalHostSslValidation Boolean
    Defaults to true.
    jwksSources List<String>
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders List<Double>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources List<String>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode String
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name String
    propertyMappings List<String>
    providerProxyId String
    refreshTokenValidity String
    Defaults to days=30.
    skipPathRegex String
    authorizationFlow string
    externalHost string
    invalidationFlow string
    accessTokenValidity string
    Defaults to minutes=10.
    authenticationFlow string
    basicAuthEnabled boolean
    Defaults to false.
    basicAuthPasswordAttribute string
    basicAuthUsernameAttribute string
    cookieDomain string
    interceptHeaderAuth boolean
    Defaults to true.
    internalHost string
    internalHostSslValidation boolean
    Defaults to true.
    jwksSources string[]
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders number[]
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources string[]
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name string
    propertyMappings string[]
    providerProxyId string
    refreshTokenValidity string
    Defaults to days=30.
    skipPathRegex string
    authorization_flow str
    external_host str
    invalidation_flow str
    access_token_validity str
    Defaults to minutes=10.
    authentication_flow str
    basic_auth_enabled bool
    Defaults to false.
    basic_auth_password_attribute str
    basic_auth_username_attribute str
    cookie_domain str
    intercept_header_auth bool
    Defaults to true.
    internal_host str
    internal_host_ssl_validation bool
    Defaults to true.
    jwks_sources Sequence[str]
    Deprecated. Use jwt_federation_sources instead.
    jwt_federation_providers Sequence[float]
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwt_federation_sources Sequence[str]
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode str
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name str
    property_mappings Sequence[str]
    provider_proxy_id str
    refresh_token_validity str
    Defaults to days=30.
    skip_path_regex str
    authorizationFlow String
    externalHost String
    invalidationFlow String
    accessTokenValidity String
    Defaults to minutes=10.
    authenticationFlow String
    basicAuthEnabled Boolean
    Defaults to false.
    basicAuthPasswordAttribute String
    basicAuthUsernameAttribute String
    cookieDomain String
    interceptHeaderAuth Boolean
    Defaults to true.
    internalHost String
    internalHostSslValidation Boolean
    Defaults to true.
    jwksSources List<String>
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders List<Number>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources List<String>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode String
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name String
    propertyMappings List<String>
    providerProxyId String
    refreshTokenValidity String
    Defaults to days=30.
    skipPathRegex String

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ProviderProxy resource produces the following output properties:

    ClientId string
    Generated.
    Id string
    The provider-assigned unique ID for this managed resource.
    ClientId string
    Generated.
    Id string
    The provider-assigned unique ID for this managed resource.
    clientId String
    Generated.
    id String
    The provider-assigned unique ID for this managed resource.
    clientId string
    Generated.
    id string
    The provider-assigned unique ID for this managed resource.
    client_id str
    Generated.
    id str
    The provider-assigned unique ID for this managed resource.
    clientId String
    Generated.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ProviderProxy Resource

    Get an existing ProviderProxy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ProviderProxyState, opts?: CustomResourceOptions): ProviderProxy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_token_validity: Optional[str] = None,
            authentication_flow: Optional[str] = None,
            authorization_flow: Optional[str] = None,
            basic_auth_enabled: Optional[bool] = None,
            basic_auth_password_attribute: Optional[str] = None,
            basic_auth_username_attribute: Optional[str] = None,
            client_id: Optional[str] = None,
            cookie_domain: Optional[str] = None,
            external_host: Optional[str] = None,
            intercept_header_auth: Optional[bool] = None,
            internal_host: Optional[str] = None,
            internal_host_ssl_validation: Optional[bool] = None,
            invalidation_flow: Optional[str] = None,
            jwks_sources: Optional[Sequence[str]] = None,
            jwt_federation_providers: Optional[Sequence[float]] = None,
            jwt_federation_sources: Optional[Sequence[str]] = None,
            mode: Optional[str] = None,
            name: Optional[str] = None,
            property_mappings: Optional[Sequence[str]] = None,
            provider_proxy_id: Optional[str] = None,
            refresh_token_validity: Optional[str] = None,
            skip_path_regex: Optional[str] = None) -> ProviderProxy
    func GetProviderProxy(ctx *Context, name string, id IDInput, state *ProviderProxyState, opts ...ResourceOption) (*ProviderProxy, error)
    public static ProviderProxy Get(string name, Input<string> id, ProviderProxyState? state, CustomResourceOptions? opts = null)
    public static ProviderProxy get(String name, Output<String> id, ProviderProxyState state, CustomResourceOptions options)
    resources:  _:    type: authentik:ProviderProxy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessTokenValidity string
    Defaults to minutes=10.
    AuthenticationFlow string
    AuthorizationFlow string
    BasicAuthEnabled bool
    Defaults to false.
    BasicAuthPasswordAttribute string
    BasicAuthUsernameAttribute string
    ClientId string
    Generated.
    CookieDomain string
    ExternalHost string
    InterceptHeaderAuth bool
    Defaults to true.
    InternalHost string
    InternalHostSslValidation bool
    Defaults to true.
    InvalidationFlow string
    JwksSources List<string>
    Deprecated. Use jwt_federation_sources instead.
    JwtFederationProviders List<double>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    JwtFederationSources List<string>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    Mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    Name string
    PropertyMappings List<string>
    ProviderProxyId string
    RefreshTokenValidity string
    Defaults to days=30.
    SkipPathRegex string
    AccessTokenValidity string
    Defaults to minutes=10.
    AuthenticationFlow string
    AuthorizationFlow string
    BasicAuthEnabled bool
    Defaults to false.
    BasicAuthPasswordAttribute string
    BasicAuthUsernameAttribute string
    ClientId string
    Generated.
    CookieDomain string
    ExternalHost string
    InterceptHeaderAuth bool
    Defaults to true.
    InternalHost string
    InternalHostSslValidation bool
    Defaults to true.
    InvalidationFlow string
    JwksSources []string
    Deprecated. Use jwt_federation_sources instead.
    JwtFederationProviders []float64
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    JwtFederationSources []string
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    Mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    Name string
    PropertyMappings []string
    ProviderProxyId string
    RefreshTokenValidity string
    Defaults to days=30.
    SkipPathRegex string
    accessTokenValidity String
    Defaults to minutes=10.
    authenticationFlow String
    authorizationFlow String
    basicAuthEnabled Boolean
    Defaults to false.
    basicAuthPasswordAttribute String
    basicAuthUsernameAttribute String
    clientId String
    Generated.
    cookieDomain String
    externalHost String
    interceptHeaderAuth Boolean
    Defaults to true.
    internalHost String
    internalHostSslValidation Boolean
    Defaults to true.
    invalidationFlow String
    jwksSources List<String>
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders List<Double>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources List<String>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode String
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name String
    propertyMappings List<String>
    providerProxyId String
    refreshTokenValidity String
    Defaults to days=30.
    skipPathRegex String
    accessTokenValidity string
    Defaults to minutes=10.
    authenticationFlow string
    authorizationFlow string
    basicAuthEnabled boolean
    Defaults to false.
    basicAuthPasswordAttribute string
    basicAuthUsernameAttribute string
    clientId string
    Generated.
    cookieDomain string
    externalHost string
    interceptHeaderAuth boolean
    Defaults to true.
    internalHost string
    internalHostSslValidation boolean
    Defaults to true.
    invalidationFlow string
    jwksSources string[]
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders number[]
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources string[]
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode string
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name string
    propertyMappings string[]
    providerProxyId string
    refreshTokenValidity string
    Defaults to days=30.
    skipPathRegex string
    access_token_validity str
    Defaults to minutes=10.
    authentication_flow str
    authorization_flow str
    basic_auth_enabled bool
    Defaults to false.
    basic_auth_password_attribute str
    basic_auth_username_attribute str
    client_id str
    Generated.
    cookie_domain str
    external_host str
    intercept_header_auth bool
    Defaults to true.
    internal_host str
    internal_host_ssl_validation bool
    Defaults to true.
    invalidation_flow str
    jwks_sources Sequence[str]
    Deprecated. Use jwt_federation_sources instead.
    jwt_federation_providers Sequence[float]
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwt_federation_sources Sequence[str]
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode str
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name str
    property_mappings Sequence[str]
    provider_proxy_id str
    refresh_token_validity str
    Defaults to days=30.
    skip_path_regex str
    accessTokenValidity String
    Defaults to minutes=10.
    authenticationFlow String
    authorizationFlow String
    basicAuthEnabled Boolean
    Defaults to false.
    basicAuthPasswordAttribute String
    basicAuthUsernameAttribute String
    clientId String
    Generated.
    cookieDomain String
    externalHost String
    interceptHeaderAuth Boolean
    Defaults to true.
    internalHost String
    internalHostSslValidation Boolean
    Defaults to true.
    invalidationFlow String
    jwksSources List<String>
    Deprecated. Use jwt_federation_sources instead.
    jwtFederationProviders List<Number>
    JWTs issued by any of the configured providers can be used to authenticate on behalf of this provider.
    jwtFederationSources List<String>
    JWTs issued by keys configured in any of the selected sources can be used to authenticate on behalf of this provider.
    mode String
    Allowed values: - proxy - forward_single - forward_domain Defaults to proxy.
    name String
    propertyMappings List<String>
    providerProxyId String
    refreshTokenValidity String
    Defaults to days=30.
    skipPathRegex String

    Package Details

    Repository
    authentik goauthentik/terraform-provider-authentik
    License
    Notes
    This Pulumi package is based on the authentik Terraform Provider.
    authentik logo
    authentik 2025.2.0 published on Monday, Mar 24, 2025 by goauthentik