Migrations

Storage migrations are important for keeping your database compatible with Authelia. Authelia will automatically upgrade your schema on startup. However, if you wish to use an older version of Authelia you may be required to manually downgrade your schema with a version of Authelia that supports your current schema.

Schema Version to Authelia Version map

This table contains a list of schema versions and the corresponding release of Authelia that shipped with that version. This means all Authelia versions between two schema versions use the first schema version.

For example for version pre1, it is used for all versions between it and the version 1 schema, so 4.0.0 to 4.32.2. In this instance if you wanted to downgrade to pre1 you would need to use an Authelia binary with version 4.33.0 or higher.

Schema VersionAuthelia VersionNotes
pre14.0.0Downgrading to this version requires you use the –pre1 flag on Authelia 4.37.2
14.33.0Initial migration managed version
24.34.0WebAuthn - added webauthn_devices table, altered totp_config to include device created/used dates
34.34.2WebAuthn - fix V2 migration kid column length and provide migration path for anyone on V2
44.35.0Added OpenID Connect 1.0 storage tables and opaque user identifier tables
54.35.1Fixed the oauth2_consent_session table to accept NULL subjects for users who are not yet signed in
64.37.0Adjusted the OpenID Connect 1.0 tables to allow pre-configured consent improvements
74.37.3Fixed some schema inconsistencies most notably the MySQL/MariaDB Engine and Collation
84.38.0OpenID Connect 1.0 Pushed Authorization Requests
94.38.0Fix a PostgreSQL NOT NULL constraint issue on the aaguid column of the webauthn_devices table
104.38.0Fix constraints on the oauth2_access_token_session table for the client credentials grant
114.38.0Adjust constraints for JWT Profile for OAuth 2.0 Access Tokens (RFC9068)
124.38.0WebAuthn adjustments for multi-cookie domain changes
134.38.0One-Time Password for Identity Verification via Email Changes
144.38.0Revoke Reset Password Token
154.38.0Time-based One-Time Password security enhancement
164.39.0OAuth 2.0 Allow Consent Subject NULL
174.39.0OpenID Connect 1.0 Claims Parameter
184.39.0OAuth 2.0 Device Code Flow
194.39.0WebAuthn Passkeys
204.39.0Regulation Rework
214.39.1MySQL Specific Fix for WebAuthn MDS
224.39.2OAuth 2.0 Consent Session Expiration Time instead of Subject Binding
234.39.12OAuth 2.0 Device Code Flow Null Constraints