diff --git a/.mkdocs.yml b/.mkdocs.yml
index 07b0332..71c1c77 100644
--- a/.mkdocs.yml
+++ b/.mkdocs.yml
@@ -69,6 +69,7 @@ nav:
- reference/auth/ldap.md
- reference/auth/dovecot_sasl.md
- reference/auth/plain_separate.md
+ - reference/auth/netauth.md
- reference/config-syntax.md
- Integration with software:
- third-party/dovecot.md
diff --git a/docs/reference/auth/netauth.md b/docs/reference/auth/netauth.md
new file mode 100644
index 0000000..84458e4
--- /dev/null
+++ b/docs/reference/auth/netauth.md
@@ -0,0 +1,47 @@
+# Native NetAuth
+
+maddy supports authentication via NetAuth using direct entity
+authentication checks. Passwords are verified by the NetAuth server.
+
+maddy needs to know the Entity ID to use for authentication. It must
+match the string the user provides for the Local Atom part of their
+mail address.
+
+Note that storage backends conventionally use email addresses. Since
+NetAuth recommends *nix compatible usernames, you will need to map the
+email identifiers to NetAuth Entity IDs using auth\_map (see
+documentation page for used storage backend).
+
+auth.netauth also can be used as a table module. This way you can
+check whether the account exists.
+
+Note that the configuration fragment provided below is very sparse.
+This is because NetAuth expects to read most of its common
+configuration values from the system NetAuth config file located at
+`/etc/netauth/config.toml`.
+
+```
+auth.netauth {
+ require_group "maddy-users"
+ debug off
+}
+```
+
+```
+auth.netauth {}
+```
+
+## Configuration directives
+
+**Syntax:** require\_group _group_
+
+OPTIONAL.
+
+Group that entities must posess to be able to use maddy services.
+This can be used to provide email to just a subset of the entities
+present in NetAuth.
+
+**Syntax** debug off
+debug on
+debug off
+**Default:** off