Replies: 1 comment 4 replies
-
For instance check out the difference in the debug logs, I see: Accessed through route 1: or server-1 | {"auth_via": "unauthenticated", "domain_url": "[route 1 domain name]", "event": "flow_by_policy: flow passing", "flow": "<Flow: Flow custom_passwordless_flow (custom_passwordless_flow)>", "host": "[route 1 domain name]", "level": "debug", "logger": "authentik.flows.views.executor", "pid": 9669, "request_id": "ac9532b737cd787fabed9daae7942da7", "schema_name": "public", "timestamp": "2025-02-14T10:57:09.625518"} Accessed through route 2: Route 1 always uses custom_passwordless_flow whereas route 2 correctly uses default-authentication-flow |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi
Is there something obviously wrong I'm doing in the following setup, because I experience very different behaviour when I access authentik through route 1 compared to route 2.
For example Authentik returns different default flows when you enter https://[domain name]/flows/-/default/authentication/?next=/ depending on the domain name entered. In route 1 I get the username + password + option for webauthn. In route 2 I just get webauthn straight away.
In route 1 I get no applications displayed after login but with route 2 I get all the applications showed as expected. This is the same login details and the same authentik instance. So I must be doing something wrong? I'm not using any outposts if thats relevant, its a very simple setup. I've tried bypassing the cache in cloudflare, setting cache headers in apache, and everything in between, but I can't work out the strange behaviour.
Route 1: Public domain -> Cloudflare proxy -> Apache reverse proxy -> Authentik.
Route 2: Local domain -> Caddy - > Authentik (the same instance as route 1).
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions