You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: .github/ISSUE_TEMPLATE/bug_report.md
+1-5
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,7 @@ Output of docker-compose logs or kubectl logs respectively
28
28
29
29
**Version and Deployment (please complete the following information):**
30
30
31
-
<!--
32
-
Notice: authentik supports installation via Docker, Kubernetes, and AWS CloudFormation only. Support is not available for other methods. For detailed installation and configuration instructions, please refer to the official documentation at https://docs.goauthentik.io/docs/install-config/.
Copy file name to clipboardexpand all lines: .github/ISSUE_TEMPLATE/question.md
+1-6
Original file line number
Diff line number
Diff line change
@@ -20,12 +20,7 @@ Output of docker-compose logs or kubectl logs respectively
20
20
21
21
**Version and Deployment (please complete the following information):**
22
22
23
-
<!--
24
-
Notice: authentik supports installation via Docker, Kubernetes, and AWS CloudFormation only. Support is not available for other methods. For detailed installation and configuration instructions, please refer to the official documentation at https://docs.goauthentik.io/docs/install-config/.
Copy file name to clipboardexpand all lines: SECURITY.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@ authentik takes security very seriously. We follow the rules of [responsible di
2
2
3
3
## Independent audits and pentests
4
4
5
-
We are committed to engaging in regular pentesting and security audits of authentik. Defining and adhering to a cadence of external testing ensures a stronger probability that our code base, our features, and our architecture is as secure and non-exploitable as possible. For more details about specific audits and pentests, refer to "Audits and Certificates" in our [Security documentation](https://docs.goauthentik.io/docs/security).
5
+
We are committed to engaging in regular pentesting and security audits of authentik. Defining and adhering to a cadence of external testing ensures a stronger probability that our code base, our features, and our architecture is as secure and non-exploitable as possible. For more details about specfic audits and pentests, refer to "Audits and Certificates" in our [Security documentation](https://docs.goauthentik.io/docs/security).
0 commit comments