Getting Started
You’ve ordered a managed Authentik from server.camp — congratulations! You’ve just laid the foundation for centralized, secure login management across your organization. This guide is written for freelancers and small to medium-sized businesses that want to manage their team members and apps from a single place — without complex IT expertise.
The reality in many SMBs: every app has its own user management. A new colleague gets a separate account for each tool — Mattermost, Nextcloud, GitLab, Paperless-ngx, the internal wiki. When they leave, their account has to be deactivated in every system individually — and that usually gets forgotten.
Authentik solves this: it’s a central Identity Provider (IdP) that all your apps consult to verify who’s signing in. Manage users, passwords, and permissions in one place.
Common use cases in SMBs:
- Onboarding: A new team member gets one account in Authentik — and instantly has access to all connected apps
- Offboarding: Deactivate the account in Authentik — access to all connected systems is blocked immediately
- Single sign-on (SSO): Sign in once, use every tool — no password overload
- Two-factor authentication (2FA): Configure it once for all apps instead of separately in each tool
- Secure external access: Suppliers, freelancers, or customers get temporary accounts with precisely defined permissions
- Enforce password policies: Central rules for all tools — minimum length, complexity, expiry
A few key terms to know:
- Provider — a connection method between Authentik and an app (e.g. OAuth2, SAML, LDAP, Proxy)
- Application — an app that uses Authentik for sign-in (e.g. “Nextcloud”, “Mattermost”)
- Flow — the steps a user goes through when signing in (e.g. “enter password → enter 2FA code”)
- Stage — a single step within a flow (e.g. “verify password”, “require TOTP code”)
- Policy — a rule that determines who gets access under which conditions
- Source — an external user directory from which Authentik imports users and groups (e.g. Active Directory, OpenLDAP)
- Brand — a branding profile that controls the look and behavior of the interface (logo, colors, background)
Getting startedYou don’t need to understand policies, flows, and stages in detail right away. To get started, just create users and groups and connect your apps. Authentik’s built-in default flows work for most organizations without any customization.
Before your team sees Authentik for the first time, customize the interface to match your brand. A login page with your logo and colors looks professional and builds trust — especially when external partners or customers also sign in through it.
- Open the Admin interface and go to System → Brands
- Click the edit icon next to the existing brand (or create a new one)
- Under Brand settings you’ll find:
- Branding title: The title shown in the browser tab and interface (e.g. your company name)
- Logo: Displayed in the top left — upload your company logo here
- Favicon: The small icon in the browser tab
Logo tipsUse SVG format for your logo — it scales perfectly at any screen size. Remove unnecessary whitespace around the logo and delete fixed width/height attributes from the SVG file so it adapts responsively to the available space. An SVG editor like Inkscape or Figma makes this easy.
The background image appears on the login page and all other flows (password reset, registration, etc.).
- Under System → Brands → Edit brand, use the Default flow background field
- Upload an image or provide a URL to an image
Background image per flowYou can also override the background image per flow — for example, if you want the login page to look different from the password reset page. Configure this under Flows & Stages → Flows → Edit flow → Background.
From Authentik 2025.4, you can add custom CSS directly in the admin interface without touching any server files:
- Go to System → Brands → Edit brand
- Scroll to the Custom CSS field
- Paste your CSS
To apply your brand’s primary color:
:root {
--pf-global--primary-color--100: #1a73e8; /* Your primary color */
--pf-global--primary-color--200: #1557b0; /* Slightly darker for hover */
}
Match your brand colorsThe CSS variables--pf-global--primary-color--100and--pf-global--primary-color--200control the accent color of buttons, links, and active elements. Replace the hex values with your brand colors for a consistent look across the entire login interface.
Change the text shown on the login page (e.g. “Welcome to authentik” or “Sign in”):
- Go to Flows & Stages → Flows
- Edit the relevant flow (e.g.
default-authentication-flow) - Update the Title — e.g. “Welcome to Acme Corp” or “Sign in — Your Organization”
So your users immediately recognize each tool on the “My applications” page, add an icon to each application:
- Under Applications → Applications, open the relevant app
- Upload a logo in the Icon field (e.g. the Nextcloud or Mattermost logo)
- Optionally add a Description (e.g. “Files & cloud storage”)
Multiple domains, different brandingAuthentik supports multiple brands for different domains. If you run one instance for your company and one for a customer, configure a separate logo, color scheme, and background for each domain under System → Brands → Create.
If your organization already runs Active Directory (AD) or an LDAP server, connect Authentik to it. Authentik automatically syncs users and groups from the existing directory — so your team can sign in to all Authentik-connected apps with their familiar AD credentials.
Before setting up the connection, make sure:
- Authentik can reach the LDAP/AD server over the network (VPN or firewall rules may be required)
- A service account exists in AD/LDAP that Authentik can use to read the directory (read-only permissions are enough for sync; write permissions are required for password writeback)
- You know the Base DN of your directory (e.g.
DC=company,DC=local) - For password writeback: LDAPS (port 636) must be enabled — unencrypted LDAP doesn’t support writing passwords back to AD
Network connectivity with managed hostingSince your Authentik instance is hosted at server.camp, your AD/LDAP server must be reachable from outside — either directly (e.g. via a fixed IP with firewall rules) or via a VPN tunnel. Contact our support team if you need help with the network setup.
- Open the Admin interface and go to Directory → Federation & Social Login
- Click Create and select LDAP Source
- Configure the connection settings:
| Field | Description | Example value |
|---|---|---|
| Name | A name of your choice | Active Directory Company |
| Server URI | Address of the LDAP/AD server | ldaps://dc01.company.local |
| Enable StartTLS | Enable only if LDAPS (port 636) is not being used | No (when using LDAPS) |
| Bind CN | Username of the service account | CN=svc-authentik,OU=Service Accounts,DC=company,DC=local or svc-authentik@company.local |
| Bind Password | Password of the service account | (your password) |
| Base DN | Base DN for all queries | DC=company,DC=local |
Multiple domain controllersFor high availability, enter multiple server URIs separated by commas — e.g.ldaps://dc01.company.local,ldaps://dc02.company.local. Authentik automatically picks an available server when connecting.
- Under Sync settings:
| Option | Recommendation | Explanation |
|---|---|---|
| Sync Users | Enable | Users are synced from AD/LDAP |
| Sync Groups | Enable | Groups are synced from AD/LDAP |
| User password writeback | As needed | When enabled, passwords changed in Authentik are written back to AD (requires LDAPS and write permissions) |
| Update internal password on login | Recommended | Stores the AD password as a hash in Authentik, enabling login even if AD is temporarily unreachable |
- Under Property Mappings:
- User Property Mappings: Select all mappings starting with
authentik default LDAPandauthentik default Active Directory - Group Property Mappings: Select
authentik default LDAP Mapping: Name
- Under Additional Settings (optional — adjust based on your AD structure):
| Field | Description | Default value |
|---|---|---|
| Addition User DN | Prepended to Base DN to narrow down the user search | (empty — searches the entire Base DN) |
| Addition Group DN | Prepended to Base DN to narrow down the group search | (empty) |
| User object filter | LDAP filter for user objects | (&(objectClass=user)(!(objectClass=computer))) |
| Group object filter | LDAP filter for group objects | (objectClass=group) |
| Group membership field | Attribute that defines group membership | member |
| Object uniqueness field | Unique identifier field | objectSid (for AD) |
| Parent Group | Optional parent group for all synced groups | e.g. a group imported-from-ad |
Narrow the sync scopeIf you don’t want to sync all users and groups from the entire AD, use Addition User DN and Addition Group DN to limit the sync to specific OUs. Example: set Addition User DN toOU=Employeesto sync only users from the “Employees” OU within the Base DN.
- Click Finish to save the LDAP source
After saving, Authentik automatically starts a background sync. Check the status:
- Go to Dashboards → System Tasks
- Look for the tasks
ldap_sync_usersandldap_sync_groups - See how many users and groups were synced — and whether any errors occurred
Synced users appear under Directory → Users, groups under Directory → Groups.
Sync intervalAuthentik syncs with the LDAP server on a regular schedule. Changes in AD (new users, deactivated accounts, group memberships) are picked up automatically on the next sync run. You can also trigger a sync manually: select the LDAP source under Directory → Federation & Social Login and click Sync.
To have password changes in Authentik written back to Active Directory:
- Confirm the connection runs over LDAPS (port 636) — password writeback only works over an encrypted connection
- The service account needs write permissions on the password attributes of user objects in AD
- Enable User password writeback in the LDAP source settings
Security note on passwordsWhen Update internal password on login is enabled, Authentik stores a hash of the AD password in its own database. This allows a fallback login when AD is unreachable. Note: if the password changes in AD, the old password remains valid in Authentik until the user signs in via LDAP again or the next sync runs.
| Problem | Likely cause | Solution |
|---|---|---|
| No users synced | Incorrect Base DN or user object filter | Check Base DN and filter; try removing Addition User DN to search more broadly |
| Connection failed | Network, firewall, or incorrect URI | Check that Authentik can reach the AD server; verify the LDAPS certificate |
| Groups missing | Group object filter doesn’t match | Check the filter; for AD, (objectClass=group) is standard |
| Login with AD password doesn’t work | LDAP backend not enabled in Password Stage | Under Flows & Stages → Stages, check the Password Stage and enable “authentik LDAP” |
| Password writeback fails | No LDAPS or insufficient write permissions | Enable LDAPS and check the service account’s permissions |
Note for LDAP/AD usersIf you sync users and groups from an existing Active Directory or LDAP (see above), they’re created in Authentik automatically. The steps below are primarily relevant for additional users that exist only in Authentik — e.g. external partners or freelancers without an AD account.
Manage users under Directory → Users. Click “Create” and fill in the required fields:
- Username — used for sign-in (e.g.
jane.smith) - Name — display name (e.g. “Jane Smith”)
- Email — for notifications and password reset
- Password — set it directly or invite the user to set their own via email
TipEstablish a consistent naming convention — e.g. alwaysfirstname.lastnameas the username. This makes management much easier as the team grows and ensures unique identifiers across all connected apps. When connecting AD, Authentik adopts the convention from AD (e.g.sAMAccountName).
Find groups under Directory → Groups. Create groups that reflect your organizational structure:
Recommended groups for SMBs:
| Group | Access to |
|---|---|
management |
All apps, admin areas |
accounting |
Paperless-ngx, Nextcloud (accounting folder) |
development |
GitLab, Mattermost, Nextcloud |
all-employees |
Mattermost, wiki, Nextcloud (general areas) |
external |
Only specific, approved apps |
Assign users to the appropriate groups. Many app integrations let you restrict access to specific groups — so not everyone automatically gets access to everything.
Use groups from ADWhen syncing groups from AD, use them directly in Authentik to control app access. You don’t need to create separate groups in Authentik — just use the existing AD groups. Optionally set a Parent Group (e.g.imported-from-ad) in the LDAP source so synced groups are clearly distinguishable from manually created ones.
The most important step: connect your existing tools to Authentik. Authentik supports several standards:
Recommended for modern apps like Nextcloud, Mattermost, Gitea/GitLab, Paperless-ngx, and many more. The pattern is always similar:
In Authentik:
- Under Applications → Providers, create a new “OAuth2/OpenID Connect Provider”
- Enter a name (e.g. “Nextcloud”)
- Add the Redirect URIs — these are the addresses Authentik redirects to after login (the app’s documentation specifies which URL to use)
- Client ID and Client Secret are generated automatically — you’ll need these for the app
In the app:
- Open the SSO settings in the app
- Enter the Client ID, Client Secret, and Authentik URL
- Done — the next login shows a “Sign in with Authentik” button
Restrict access to groupsWhen creating an Application in Authentik, use Policy / Group / User Bindings to specify which groups have access. For example, ensure only theaccountinggroup can access Paperless-ngx, whileall-employeescan access Mattermost and Nextcloud.
Older systems (e.g. certain VPN gateways, legacy ERP systems) use LDAP. Authentik can act as an LDAP server. This requires a bit more configuration — contact our support team if you need LDAP integration.
Authentik makes it easy to roll out 2FA for all connected apps — without configuring anything separately in each tool.
The most common method: a 6-digit code from an authenticator app (e.g. Aegis, Google Authenticator, Bitwarden Authenticator).
Enable TOTP for your users:
- Under Flows & Stages → Stages, create a new stage of type “Authenticator TOTP Setup Stage”
- Add this stage to the default enrollment flow or a custom flow
- On the next login, users are prompted to set up their authenticator
RecommendationMake 2FA mandatory for themanagementgroup and recommended for everyone else. Create policies that only allow access to specific apps when 2FA is active.
Every user can set up their own 2FA code, change their password, and see connected apps under Settings (top right in the user interface). You don’t need to act as admin for each individual user.
Instead of setting and distributing passwords yourself, invite users by email:
- Create a user and enter their email address
- Under Directory → Users, open the user
- Click “Create recovery link” — this lets the user set their own password
No passwords travel through email this way.
For freelancers, customers, or suppliers who need temporary access:
- Create a user and assign them to the
externalgroup - Set an account expiry date (under user profile → “Account Expiry”)
- Grant access only to the apps the external user needs — via group restrictions on the provider
Externals without an AD accountWhen connecting Active Directory, it often makes sense to keep external partners out of AD and create them as Authentik-only users. They stay separate from the internal directory and you can manage their access independently of AD.
When a team member leaves, one step is all it takes:
- Under Directory → Users, open the user
- Click “Deactivate”
The user can no longer sign in to any connected app — regardless of whether they still know their password. Active sessions expire on the next token refresh (typically within a few minutes to an hour, depending on the app’s configuration).
Immediate session terminationFor immediate termination of active sessions: go to Directory → Users → Tokens and revoke all active tokens for the user. This cuts off access even in currently active sessions.
Offboarding with ADWhen using Active Directory as a source, it’s usually enough to deactivate the account in AD. On the next sync run, Authentik picks up the status automatically and deactivates the user there too — no need to deactivate in two places.
Authentik logs all sign-ins and changes. Find the log under Events → Log. Useful for:
- Investigating security incidents (“Did someone sign in from an unknown country?”)
- Compliance requirements (evidence for ISO 27001, GDPR, etc.)
- Troubleshooting failed sign-ins
Authentik can act not just as a standalone Identity Provider, but also as a broker between external IdPs and your apps. This is useful if you already have an existing identity management system — such as Google Workspace, Microsoft 365/Azure AD, or another service.
How it works: Authentik connects to the external IdP (e.g. via OpenID Connect or SAML) and forwards sign-ins there. Users sign in with their Google or Microsoft account — while Authentik controls what happens: which groups does the user get? Which apps can they access? Do they also need to set up 2FA?
Supported external IdPs:
- Google Workspace (OAuth2/OIDC)
- Microsoft 365 / Azure Active Directory (OIDC or SAML)
- Okta, Auth0, OneLogin, JumpCloud
- Keycloak, AWS Cognito
- Any IdP that supports OAuth2, OIDC, or SAML
Typical scenarios:
- Your team already uses Google Workspace — team members sign in to all other apps (Mattermost, Nextcloud, etc.) with their Google account
- You want to use a Microsoft 365 account as the primary login but manage permissions and group rules centrally in Authentik
- You want to give a customer or partner access via their own IdP without creating an account for them on your side
Our support team is happy to help you set up an external IdP connection.
For a smooth setup, follow this sequence:
- Customize branding — configure logo, favicon, colors, and background so the login page looks professional from day one
- Connect LDAP/AD (if applicable) — sync users and groups from the existing directory
- Structure groups — use existing AD groups or create new groups in Authentik
- Connect applications — set up SSO for Nextcloud, Mattermost, and others; control access via groups
- Enable 2FA — mandatory for admins at minimum, recommended for everyone else
- Invite users — send password reset links so team members can set their own passwords
If you need help setting up SSO integrations, configuring 2FA, or connecting LDAP, reach out any time at support@server.camp.
Find answers to common questions on our product page.