authelia
zitadel
Our great sponsors
authelia | zitadel | |
---|---|---|
174 | 9 | |
19,523 | 403 | |
3.2% | - | |
9.9 | 9.7 | |
5 days ago | almost 2 years ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
authelia
-
Keycloak SSO with Docker Compose and Nginx
It's me and two others though I'm definitely the most active. We put a lot of effort into security best practices and one of my co-developers is currently reviewing the 4.38.0 release. It's a fairly major release with a lot of important code paths that have been improved for the future.
Our official docs can be found at https://www.authelia.com and you can find docs for a particular PR in the relevant PR. We've also linked the pre-release docs in the pre-release discussions which can be found here: https://github.com/authelia/authelia/discussions/categories/...
-
Protecting WebUI on public IP?
I use NGINX proxy with Authelia in between. Authelia blocks and blacklists faulty logins.
-
Why would anyone need AD/AAD when you can manage devices through Saltstack?
https://github.com/saltstack/salt https://github.com/chocolatey/choco https://github.com/nextcloud https://github.com/authelia/authelia https://github.com/grafana/grafana
- Give this project some luv: Single Sign-On Multi-Factor portal for web apps
-
HAProxy with Forward Auth to Authentik
If you are using HAProxy on PfSense/OPNSense, see my issue https://github.com/authelia/authelia/issues/2696
- Keycloak – Open-Source Identity and Access Management Interview
-
LDAP or AD for selfhosted
https://github.com/lldap/lldap is a very simple and lightweight LDAP solution. Works flawless with https://www.authelia.com/
-
Authelia/SSO With Caddy In Docker Compose?
Ah yeah, so I guess it's been a while since I tried and I forgot where I got stuck last time. Authelia's config.yml is absolutely massive and I'm not sure which section of their guide I should be following. In The Docker Compose section, there's "Unbundled", "Lite", and "Local". I think I want to be running the "lite" bundle, but their example compose file has a ton of Traefik stuff in it. I know I wouldn't keep the Traefik services, but do I need either secure or public?
-
How do you secure your webpages that have no protection?
Authelia supports SSO. If you are behind a reverse proxy it’s quite straightforward to integrate.
-
GitLab behind Authelia
This should probably also be mentioned in the documentation so maybe consider mentioning this on their discussion page.
zitadel
-
My Work
Im one of the authors of ZITADEL the open source identity and access management solution.
-
Authentik or Keycloak
An other Keycloak alternative would be our (I am one of the founders) project ZITADEL.
-
OS Alternative to gcp identity plattform?
You could take a look at https://zitadel.ch/ Or curity https://curity.io/product/
-
What's the biggest missing piece of the puzzle in the self-hosted universe?
I'm biased since I work for ZITADEL (https://github.com/caos/zitadel). Passwordless with FIDO2 has been baked in since the beginning. I reckon that the major Open Source alternatives provide support as well. FIDO2 should work on all major OS and browsers.
-
Event-driven architecture resources
And a bigger project i know is zitadel (https://github.com/caos/zitadel)
-
Fintech startup essentials: free and freemium tools to help you build your fintech company
https://zitadel.ch/ https://github.com/caos/zitadel/
-
Successful SaaS founders: How do you handle auth?
Full disclosure: My company is building ZITADEL, an open source alternative for Auth0 or Keycloak (both still very good, with some drawbacks). https://github.com/caos/zitadel/
-
Okta Signs Definitive Agreement to Acquire Auth0
We are building a cloud-native IAM over here https://github.com/caos/zitadel
It is written in Go and built around event sourcing for a great audit trail. We already support OIDC, Passwordless, RBAC and working on more features each day.
For those who want to run it on-prem we have a kubernetes operator ready in the next few weeks who also manages the database (cockroach).
We run our own service here https://zitadel.ch with a free tier as well
Feel free to engage with us on GitHub discussions.
-
Thinking about User <> Auth modelling in Go
I'm not sure if it makes sense to build your own oauth/oidc server. It's fun to learn all these techniques but you have to maintain much more code. You also have to implement security mechanisms from dev and ops perspectives. There are existing implementations. If you want to check out an existing open source implementation in go you could take a look at the implementaion of my company called zitadel. I would love to answer question if there are any.
What are some alternatives?
authentik - The authentication glue you need.
wordpress-proxy-auth-plugin - The Wordpress Proxy Auth Plugin helps developers/DevOps/admins easily implement authentication and authorization for WordPress by using a JWT token provided by a reverse proxy.
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
haproxy-lua-oauth - JWT Validation implementation for HAProxy Lua host
oauth2 - Go OAuth2
awesome-iam - 👤 Identity and Access Management knowledge for cloud platforms
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
angular-auth-oidc-client - npm package for OpenID Connect, OAuth Code Flow with PKCE, Refresh tokens, Implicit Flow
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
LDAP Account Manager (LAM) - LDAP Account Manager
dex - OpenID Connect (OIDC) identity and OAuth 2.0 provider with pluggable connectors
S.S.Octopus - sso, aka S.S.Octopus, aka octoboi, is a single sign-on solution for securing internal services