Post-Tyranny-Tech-Infrastru.../ansible/roles/authentik/files
Pieter fcc5b7bca2 feat: Add password recovery flow with email notifications
ACHIEVEMENT: Password recovery via email is now fully working! 🎉

Implemented a complete password recovery flow that:
- Asks users for their email address
- Sends a recovery link via Mailgun SMTP
- Allows users to set a new password
- Expires recovery links after 30 minutes

Flow stages:
1. Identification stage - collects user email
2. Email stage - sends recovery link
3. Prompt stage - collects new password
4. User write stage - updates password

Features:
✓ Email sent via Mailgun (noreply@mg.vrije.cloud)
✓ 30-minute token expiry for security
✓ Set as default recovery flow in brand
✓ Clean, user-friendly interface
✓ Password confirmation required

Users can access recovery at:
https://auth.dev.vrije.cloud/if/flow/default-recovery-flow/

Files added:
- recovery-flow.yaml - Blueprint defining the complete flow
- update-recovery-flow.yml - Deployment playbook

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2026-01-15 13:36:43 +01:00
..
authentik_api.py feat: Complete Authentik SSO integration with automated OIDC setup 2026-01-08 16:56:19 +01:00
configure_2fa_enforcement.py Implement Authentik flow configuration via REST API 2026-01-14 08:40:00 +01:00
configure_invitation_flow.py Implement Authentik flow configuration via REST API 2026-01-14 08:40:00 +01:00
configure_recovery_flow.py Implement Authentik flow configuration via REST API 2026-01-14 08:40:00 +01:00
custom-flows.yaml feat: Implement Authentik flow configuration via blueprints 2026-01-14 14:15:58 +01:00
enrollment-flow.yaml fix: Set invitation-only enrollment flow as default in brand 2026-01-15 13:08:27 +01:00
invitation-flow.yaml feat: Add automated invitation stage configuration for Authentik 2026-01-14 16:17:44 +01:00
recovery-flow.yaml feat: Add password recovery flow with email notifications 2026-01-15 13:36:43 +01:00