Skip to content

Conversation

PeshekDotDev
Copy link
Contributor

Details

Docs update for single logout


Checklist

  • Local tests pass (ak test authentik/)
  • The code has been formatted (make lint-fix)

If an API change has been made

  • The API schema has been updated (make gen-build)

If changes to the frontend have been made

  • The code has been formatted (make web)

If applicable

  • The documentation has been updated
  • The documentation has been formatted (make docs)

@PeshekDotDev PeshekDotDev requested a review from a team as a code owner October 1, 2025 08:15
Copy link

netlify bot commented Oct 1, 2025

Deploy Preview for authentik-storybook canceled.

Name Link
🔨 Latest commit b9a96cf
🔍 Latest deploy log https://app.netlify.com/projects/authentik-storybook/deploys/68efc4e0825c8a00089e112e

Copy link

netlify bot commented Oct 1, 2025

Deploy Preview for authentik-docs ready!

Name Link
🔨 Latest commit b9a96cf
🔍 Latest deploy log https://app.netlify.com/projects/authentik-docs/deploys/68efc4e0e6509500088a4f43
😎 Deploy Preview https://deploy-preview-17169--authentik-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link

netlify bot commented Oct 1, 2025

Deploy Preview for authentik-integrations ready!

Name Link
🔨 Latest commit b9a96cf
🔍 Latest deploy log https://app.netlify.com/projects/authentik-integrations/deploys/68efc4e0746b8500094531db
😎 Deploy Preview https://deploy-preview-17169--authentik-integrations.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link

codecov bot commented Oct 1, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 92.97%. Comparing base (b075056) to head (b9a96cf).
⚠️ Report is 50 commits behind head on main.
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #17169      +/-   ##
==========================================
+ Coverage   92.68%   92.97%   +0.29%     
==========================================
  Files         868      868              
  Lines       47841    47863      +22     
==========================================
+ Hits        44342    44502     +160     
+ Misses       3499     3361     -138     
Flag Coverage Δ
e2e 45.27% <ø> (+1.16%) ⬆️
integration 23.17% <ø> (-0.01%) ⬇️
unit 91.07% <ø> (+0.01%) ⬆️
unit-migrate 91.11% <ø> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

github-actions bot commented Oct 1, 2025

authentik PR Installation instructions

Instructions for docker-compose

Add the following block to your .env file:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-b9a96cf791328ae2bfc9c877f62a32661b4c2ee6
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

Afterwards, run the upgrade commands from the latest release notes.

Instructions for Kubernetes

Add the following block to your values.yml file:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
    image:
        repository: ghcr.io/goauthentik/dev-server
        tag: gh-b9a96cf791328ae2bfc9c877f62a32661b4c2ee6

Afterwards, run the upgrade commands from the latest release notes.

Copy link
Contributor

@dewi-tik dewi-tik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Absolutely awesome docs. Great job!

Copy link
Contributor

@dewi-tik dewi-tik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Absolutely awesome docs. Great job and great features to add.

@PeshekDotDev
Copy link
Contributor Author

Absolutely awesome docs. Great job and great features to add.

Thank you Dewi :)

Copy link
Contributor

@tanberry tanberry left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this awesome documentation to go with your awesome feature, @PeshekDotDev !

I've finished reviewing, so after those and the other editors changes are in LGTM!

Copy link
Member

@dominic-r dominic-r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great doc, but just a few comments that would need resolution before merging

3. For each logout method with active sessions, the appropriate logout stage is injected:
- **iframe logout stage** - Injected at index 1 (immediately after the logout stage) for front-channel iframe logout
- **Native logout stage** - Injected at index 2 (after iframe logout, if present) for front-channel native logout
- **Back-channel logout** - Executed server-side without injecting additional stages
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

also i'd probably do

  • thing: other thing

instead of using -s

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not me literally looking for where the -s is...

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this looks completed

@dewi-tik
Copy link
Contributor

dewi-tik commented Oct 8, 2025

I like Dominic's suggestions. Added a few notes on a few of them. Once those are merged we can make one final pass and this should be good to go.

@dominic-r dominic-r requested a review from tanberry October 8, 2025 23:53
For more information about single logout across all providers, see the [Single Logout (SLO) Overview](../single-logout/index.md).

:::warning
Your OAuth application (Relying Party) must explicitly support OpenID Connect front-channel logout or back-channel logout to properly handle logout requests. Not all OAuth applications support these features, so compatibility should be verified.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Your OAuth application (Relying Party) must explicitly support OpenID Connect front-channel logout or back-channel logout to properly handle logout requests. Not all OAuth applications support these features, so compatibility should be verified.
Your Relying Party (OAuth application) must explicitly support OpenID Connect front-channel logout or back-channel logout to properly handle logout requests. Not all OAuth applications support these features, so compatibility should be verified.

might be best to introduce the technical element first and then say what it is. but that's my opinion


## Overview

OAuth2/OIDC logout is a security feature defined in the OpenID Connect specification. It allows an OIDC Provider (OP), such as authentik, to notify Relying Parties (RPs) when a user session ends. This ensures that all associated applications can properly terminate the user's session.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should spell it out and acronym it on first reference in () like:

Suggested change
OAuth2/OIDC logout is a security feature defined in the OpenID Connect specification. It allows an OIDC Provider (OP), such as authentik, to notify Relying Parties (RPs) when a user session ends. This ensures that all associated applications can properly terminate the user's session.
OAuth2/OpenID Connect (OIDC) logout is a security feature defined in the OpenID Connect specification. It allows an OIDC Provider (OP), such as authentik, to notify Relying Parties (RPs) when a user session ends. This ensures that all associated applications can properly terminate the user's session.


## Requirements

Your OAuth application (Relying Party) must:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Your OAuth application (Relying Party) must:
Your Relying Party (OAuth application) must:

Same as above


### Front-channel logout

With front-channel logout, authentik injects an iframe logout stage into the logout flow. This stage loads the RP's (relying party) front-channel logout URL in a hidden iframe within the user's browser. The logout URL includes session information as query parameters, such as:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
With front-channel logout, authentik injects an iframe logout stage into the logout flow. This stage loads the RP's (relying party) front-channel logout URL in a hidden iframe within the user's browser. The logout URL includes session information as query parameters, such as:
With front-channel logout, authentik automatically injects an iframe logout stage into the logout flow. This stage loads the RP's (relying party) front-channel logout URL in a hidden iframe within the user's browser. The logout URL includes session information as query parameters, such as:

Just to make it extra clear I think

Copy link
Member

@dominic-r dominic-r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

An easy LGTM on my side. Looks great!

@PeshekDotDev PeshekDotDev merged commit 734de9b into main Oct 15, 2025
137 of 139 checks passed
@PeshekDotDev PeshekDotDev deleted the slo-docs branch October 15, 2025 16:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants