2018-08-26 21:46:15 +00:00
# Features in details
2019-12-05 20:52:04 +00:00
## 1-Factor (1FA) using a LDAP server
2018-08-26 21:46:15 +00:00
**Authelia** uses an LDAP server as the backend for storing credentials.
When authentication is needed, the user is redirected to the login page which
corresponds to the first factor. **Authelia** tries to bind the username and
password against the configured LDAP backend.
You can find an example of the configuration of the LDAP backend in
[config.template.yml].
< p align = "center" >
2019-12-05 20:52:04 +00:00
< img src = "../docs/images/1FA.png" width = "400" >
2018-08-26 21:46:15 +00:00
< / p >
2019-12-05 20:52:04 +00:00
## 2-Factor (2FA)
2018-08-26 21:46:15 +00:00
2019-03-24 17:45:32 +00:00
**Authelia** comes with three kind of second factor.
2018-08-26 21:46:15 +00:00
2019-03-24 17:45:32 +00:00
* Security keys like [Yubikey]. More info [here ](./2factor/security-key.md ).
* One-Time Passwords generated by [Google Authenticator]. More info [here ](./2factor/time-based-one-time-password.md ).
* Duo Push Notifications to use with [Duo mobile application ](https://play.google.com/store/apps/details?id=com.duosecurity.duomobile&hl=en ) available on Android, iOS and Windows. More info [here ](./2factor/duo-push-notifications.md ).
2018-08-26 21:46:15 +00:00
< p align = "center" >
2019-12-05 20:52:04 +00:00
< img src = "../docs/images/2FA-METHODS.png" width = "400" >
2018-08-26 21:46:15 +00:00
< / p >
## Password reset
With **Authelia** , you can also reset your password in no time. Click on the
**Forgot password?** link in the login page, provide the username of the user
requiring a password reset and **Authelia** will send an email a confirmation
email to the user email address.
Proceed with the password reset form and validate to reset your password.
< p align = "center" >
2019-12-05 20:52:04 +00:00
< img src = "../docs/images/RESET-PASSWORD-STEP1.png" width = "400" >
2018-08-26 21:46:15 +00:00
< / p >
## Access Control
With **Authelia** , you can define your own access control rules for finely
restricting user access to some resources and subdomains. Those rules are
defined and fully documented in the configuration file. They can apply to
users, groups or everyone.
Check out [config.template.yml] to see how they are defined.
## Single factor authentication
**Authelia** allows you to customize the authentication method to use for each
subdomain. The supported methods are either "single_factor" or "two_factor".
Please check [config.template.yml] to see an example of configuration.
It is also possible to use [basic authentication] to access a resource
protected by a single factor.
2019-03-22 14:01:05 +00:00
Please note that Authelia uses the *Proxy-Authorization* header and not
*Authorization* since one might be willing to authenticate against both
Authelia and the proxy. For instance you can use the following command to
access your service:
2019-12-05 20:52:04 +00:00
$ curl -H "Proxy-Authorization: Basic am9objpwYXNzd29yZA==" https://myservice.example.com"
2019-03-22 14:01:05 +00:00
2018-08-26 21:46:15 +00:00
## Session management with Redis
When your users authenticate against Authelia, sessions are stored in a
Redis key/value store. You can specify your own Redis instance in
[config.template.yml].
[basic authentication]: https://en.wikipedia.org/wiki/Basic_access_authentication
2019-12-24 02:14:52 +00:00
[config.template.yml]: https://github.com/authelia/authelia/blob/master/config.template.yml
2018-08-26 21:46:15 +00:00
[Yubikey]: https://www.yubico.com/products/yubikey-hardware/yubikey4/
2019-03-24 17:45:32 +00:00
[Google Authenticator]: https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2& hl=en