Replies: 1 comment 4 replies
-
For instance check out the difference in the debug logs, I see: Accessed through route 1: or server-1 | {"auth_via": "unauthenticated", "domain_url": "[route 1 domain name]", "event": "flow_by_policy: flow passing", "flow": "<Flow: Flow custom_passwordless_flow (custom_passwordless_flow)>", "host": "[route 1 domain name]", "level": "debug", "logger": "authentik.flows.views.executor", "pid": 9669, "request_id": "ac9532b737cd787fabed9daae7942da7", "schema_name": "public", "timestamp": "2025-02-14T10:57:09.625518"} Accessed through route 2: Route 1 always uses custom_passwordless_flow whereas route 2 correctly uses default-authentication-flow |
Beta Was this translation helpful? Give feedback.
-
Hi
Is there something obviously wrong I'm doing in the following setup, because I experience very different behaviour when I access authentik through route 1 compared to route 2.
For example Authentik returns different default flows when you enter https://[domain name]/flows/-/default/authentication/?next=/ depending on the domain name entered. In route 1 I get the username + password + option for webauthn. In route 2 I just get webauthn straight away.
In route 1 I get no applications displayed after login but with route 2 I get all the applications showed as expected. This is the same login details and the same authentik instance. So I must be doing something wrong? I'm not using any outposts if thats relevant, its a very simple setup. I've tried bypassing the cache in cloudflare, setting cache headers in apache, and everything in between, but I can't work out the strange behaviour.
Route 1: Public domain -> Cloudflare proxy -> Apache reverse proxy -> Authentik.
Route 2: Local domain -> Caddy - > Authentik (the same instance as route 1).
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions