casdoor-js-sdk
authentik
casdoor-js-sdk | authentik | |
---|---|---|
7 | 167 | |
29 | 7,594 | |
- | 11.0% | |
5.0 | 10.0 | |
about 1 month ago | 1 day ago | |
TypeScript | Go | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
casdoor-js-sdk
- Casdoor: An open-source Identity and Access Management (IAM) / Single-Sign-On (SSO) platform and AI gateway with web UI supporting OAuth 2.0, OIDC, SAML and OpenAI ChatGPT
-
🚀 ZITADEL v2.19.1 is out!
How much memory does it use per default and how does it resource usage compare to Authelia or casdoor?
- I created Atomic: Self Hosted Open Source Alternative to Reclaim, Clockwise & Motion
-
ElasticJob UI now supports Auth 2.0, OIDC and SAML single sign-on thanks to Casdoor
The source code of Casdoor is on GitHub, and its boot mode includes development mode and production mode. The development mode is taken as an example here. Please refer to this link for more details.
-
Rebuiding my entire server - Looking for advises to start on a right foot
And there are other solutions instead of Keycloak like Authelia (roughly 20MB at all times and temporary 1GB for Argon2did on sign ins), Zitadel or Casdoor. Authentik has a nice GUI but uses a lot of resources.
- Casdoor: an open-source SSO & IAM platform with beautiful web UI supporting connecting to Google, GitHub, Azure accounts and protocols like OAuth, OIDC, SAML, CAS
- casdoor-js-sdk: Javascript client SDK for Casdoor IAM platform
authentik
-
Ask HN: Who is hiring? (June 2024)
Authentik Security | Engineer | US | REMOTE (anywhere) | Full-time
Authentik Security (https://goauthentik.io) is the company behind authentik (https://github.com/goauthentik/authentik), an open source identity provider with over 250k+ unique installations and 12M+ downloads. Help us replace Okta/Auth0, Ping Identity, and Microsoft Entra with modern, secure identity for all!
We are a small remote team, looking to scale up with a couple experienced software engineers, primarily with a backend focus. Bonus points if you have significant experience with identity/SSO standards and/or Django/Python.
There is also the opportunity to be "forward deployed" spending 15-20% of time with enterprise customers (remotely) on configuration best practices and rollout strategies, _if_ that is of interest to the right candidate.
To apply, please use: https://forms.gle/TjRuTCec8M6UaN2Q8
-
Show HN: Stack, the open-source Clerk/Firebase Auth alternative
If you're looking for a system that has more features, is user friendly, a nice admin ui and easy deployments compared to Keycloak. Please give https://goauthentik.io/ a shot. Not affiliated in any way, just a very happy user.
It has
-an admin UI
- Supports (LDAP, SAML, OAUTH, social logins)
- MFA, Passkeys
- Application access based on user groups etc
- immich SSO with Authentik
-
Show HN: Auth0 OSS alternative Ory Kratos now with passwordless and SMS support
Hey, for authentik this is actually something we're actively working on: https://github.com/goauthentik/authentik/pull/8330, and this will be included in our next feature release in April!
(Disclaimer, I am founder and CTO of authentik)
-
Keycloak SSO with Docker Compose and Nginx
See here for the fix, which both implements the workaround suggested in the issue and also a much more standard-compliant method: https://github.com/goauthentik/authentik/pull/8471
-
Has anyone had any success setting Authentik up behind Caddy for a reverse proxy?
Ask in the correct places for support: https://github.com/goauthentik/authentik/discussions and https://github.com/caddyserver/caddy/issues
-
Authentik setup via Portainer?
I've been searching around for a while now, and struggling with getting Authentik setup on my NAS. I'd like to deploy via Portainer, but getting lost in the documentation just to deploy.
-
Show HN: Obligator – An OpenID Connect server for self-hosters
Personally I went with Keycloak, because it's fairly well documented and also has Docker images available: https://www.keycloak.org/getting-started/getting-started-doc... although the fact that they want you to create an "optimized" image yourself and have a long build/setup process on startup instead is slightly annoying: https://www.keycloak.org/server/containers
Regardless, with something like mod_auth_openidc or another Relying Party implementation, all of the sudden authn/authz becomes easier to manage (you can literally get user information including roles in headers that are passed from your gateway/relying party to apps behind the reverse proxy), regardless of what you have actually running in your APIs: https://github.com/OpenIDC/mod_auth_openidc (there are other options, of course, but I went with that because I already use mod_md).
It's actually cool that there are plentiful options in the space, since OIDC is pretty complex in of itself and attempts at creating something pleasant to actually use are always welcome, I've also heard good things about Authentik: https://goauthentik.io/
-
Issues with authentik
Hello ! I am hosting a server under NixOS with multiple services, and to simply the identity management, I use authentik (https://goauthentik.io/) which can be compared to keycloak. Everything works fine until I try to enable mastodon to host an instance : authentik returns an error 400 and nothing changes this but disabling mastodon. Does anyone have an idea of what could be the cause of this ?
-
HAProxy with Forward Auth to Authentik
For Authentik, it looks like they are not interested to write how to configure HAProxy with it https://github.com/goauthentik/authentik/issues/5768
What are some alternatives?
next-auth - Authentication for the Web.
authelia - The Single Sign-On Multi-Factor portal for web apps
atomic - Chat with and teach your calendar to solve your scheduling & time problems
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
jellyfin-plugin-sso - This plugin allows users to sign in through an SSO provider (such as Google, Microsoft, or your own provider). This enables one-click signin.
keycloak-operator - ARCHIVED Kubernetes Operator for the no longer supported WildFly distribution of Keycloak
casbin - An authorization library that supports access control models like ACL, RBAC, ABAC in Golang: https://discord.gg/S5UjpzGZjN
jellyfin-plugin-ldapauth - LDAP Authentication for Jellyfin
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.