Important Announcement: The Future of Authelia

May 18, 2025 in News, Announcements by James Elliott 6 minutes

This is a very important announcement about the future of the Authelia project.

I have been actively involved with the Authelia project for over 5 years now; in that time I’ve made over 2,200 commits, with those contributions modifying over 900,000 lines of code. This is something that has only recently dawned on me now that I have more time to do the things I am passionate about.

I have had the privilege of working closely with many talented individuals who have taught me a lot, as well as collaborating with major outside parties in integrating Authelia and other projects that offer similar functionalities into their products. I’ve met so many incredible people through Authelia, and I couldn’t be more grateful for their involvement and support. I’ve also made some great friends along the way; some of whom, I suspect, are for life.

What I’m about to announce may not excite everyone, and I doubt anyone is as thrilled as I have been (and continue to be). But I am sure most people will be able to see why I am excited about it.

That said, every project like Authelia eventually reaches a point where decisions must be made about its future direction. I believe we’re at one of those inflection points now, with a number of factors aligning that prompt deeper reflection.

These decisions have to be weighed against what’s best for the project, what’s best for the individual’s directly involved in the project, and what’s best for the users. So while sometimes they can be easy to decide sometimes they are more challenging unfortunately.

The Announcement

Well I suppose it’s crystal clear to everyone right now what I’ve been talking about, so I may as well just lay it all out for you.

Authelia is now OpenID Certified™ for the Basic OP, Implicit OP, Hybrid OP, Form Post OP, and Config OP profiles of the OpenID Connect™ protocol. This means our OpenID Connect 1.0 Provider implementation has officially passed the certification process and is verified to conform to the specification in all areas that we’ve implemented and those that have conformance testing. Many providers don’t reach this level of validation, so I’m especially proud and excited about this milestone.

I’d like to sincerely thank the OpenID Foundation and its members for being so helpful and welcoming during the certification process; and for promptly fixing an issue with the conformance suite when it was reported. I was completely flawed seeing the time between the issue being reported, a pull request being drafted, the fix being released, and the new release being published; was no more than 24 hours.

I fully intend to pursue conformance for the remaining outstanding profiles; 3rd Party-Init OP, Dynamic OP, Session OP, Front-Channel OP, Back-Channel OP, and RP-Initiated OP; as soon as we implement the necessary underlying features.

The Future

Now, I must admit: I intentionally subverted expectations. Certification has long been a goal of the team and myself. There are several areas of OpenID Connect 1.0 that we support (and all of those are certified) but there are a number we do not yet support.

The OpenID Connect 1.0 Protocol Suite, image is a trademark of the OpenID Foundation, click the image for the source.

The elements we support are Core, Discovery, and the Form Post Response Mode. The two major remaining elements Dynamic Client Registration and Session Management are obvious goals. While they’re not required they are certainly useful. We’re making steps towards both of these in the next release.

While we haven’t finalized the next steps, I believe the path ahead (especially around SSO) is gaining significant clarity. That said, everything is still subject to change and discussions with the team. I just wanted to make this announcement a surprise for them as well.

Here are some key areas of focus (specifically surrounding SSO):

  1. Finish the OpenID Connect 1.0 implementation. The certification is great but there are a few things on my mind that ideally need to be addressed before we remove the experimental / beta status, most of which are traditionally breaking changes:
    • Consent Policies need to be reworked. Specifically we should make them reusable like other policies, and we should ensure it clearly represents only the default behavior when the client does not request something that explicitly requires some behavior. For example the prompt parameter can require the display of a login, account selection, consent, or require nothing is shown visually to the user.
    • We need to implement multi-issuer configuration to compliment the multi-domain configuration. Each domain should require an explicit OpenID Connect 1.0 configuration if you want to use it on that domain.
    • Database Storage of Issuers and Clients. This has become an obvious requirement. We don’t want to remove the option for users to configure this via the config file but there are several features that will rely on it being an option.
  2. Implement High-Impact OpenID Connect 1.0 Specification Extensions:
    • We plan to implement several impactful extensions; many of which should be straightforward, though we can reassess if needed (I don’t think we want to delay OpenID Connect 1.0 Relying Party support too long):
      • Dynamic Client Registration (Dynamic OP Profile)
      • Session Management (Session OP Profile)
      • Front-Channel Logout (Front-Channel OP Profile)
      • Back-Channel Logout (Back-Channel OP Profile)
      • RP-Initiated Logout (RP-Initiated OP Profile)
      • Client Initiated Backchannel Authentication Flow (3rd Party-Init OP Profile)
      • OAuth 2.0 Token Exchange
  3. In No Particular Order:
    • Fully implement authentication method references:
      • By allowing customized authorization policies using authentication method references we unlock a large future potential for Authelia and allow administrators fine-grained control over authorization.
    • WebFinger
    • Federated Credential Management (FedCM)
    • Implement the OpenID Connect 1.0 Relying Party role:
      • Allow users to link their social accounts to other OpenID Connect 1.0 Providers, and subsequently sign in with them.
      • Allow administrators to configure trusting the authentication method references from these providers allowing seamless SSO, and for those that are untrusted only assume the password was provided.
    • SAML 2.0:
      • This is a widely requested feature and we will absolutely implement it. We just wanted to ensure we had a strong foundation before we do so.

Specification Support

I have updated the OpenID Connect 1.0 Integration with a Support Chart which lists a majority of the OpenID Connect 1.0 and OAuth 2.0 specifications that are somewhat relevant and are more likely to have a future within Authelia. This combined with the Roadmap serve as documentation for our future developments within OpenID Connect 1.0.

This should give you a decent comparison for any other project that wishes to be transparent about its support level by including a similar chart.

Join the Discussion and Show Your Support

Feel free to discuss this awesome news in our Discussion Forum, or in one of our many Chat Methods.

You can show your support for the Authelia project by giving us a star on GitHub.