Skip to main content

16 docs tagged with "policy"

View all tags

Device compliance policy

Device compliance policies are used to limit access to authentik and applications based on Device Compliance information.

Ensure unique email addresses

By default, authentik does not require email addresses to be unique. If you want to enforce uniqueness, use an expression policy during enrollment or profile-edit flows.

Event Matcher Policy

Use an Event Matcher policy when you want to match authentik events by a small set of built-in fields instead of writing a custom expression.

Expression Policies

Expression policies let you write custom Python for cases where the built-in policy types are not enough.

GeoIP Policy

Use a GeoIP policy when you want to make access decisions based on where a request appears to come from.

Password Policy

Use a Password policy when you want to validate a password entered in a prompt stage.

Password Uniqueness Policy

The Password Uniqueness policy is an enterprise policy that prevents users from reusing previously used passwords.

Policies

Policies are reusable decisions in authentik. They let you control whether a user can access an application, whether a stage in a flow should run, whether a source can be used, or whether data entered in a prompt stage is valid.

Policy Bindings and Evaluation

For a high-level overview of the available policy types, see Policies. This page focuses on the mechanics: where policies are attached, how bindings work, and how authentik evaluates multiple results.

Policy Types

Policy types are the built-in policy objects you can create in authentik.

Reputation Policy

Use a Reputation policy when you want authentik to react to repeated failed authentication attempts from a username, a client IP, or both.