casdoor
lldap
casdoor | lldap | |
---|---|---|
37 | 76 | |
8,028 | 3,532 | |
- | 4.6% | |
0.0 | 9.1 | |
3 months ago | 10 days ago | |
Go | Rust | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
casdoor
-
Keycloak open redirect: wildcard redirect URIs can be exploited to steal tokens
I'm using Casdoor: https://github.com/casbin/casdoor and glad to see it only has ~77,000 LOC according to the shared link.
Keycloak was good but has too much legacy for 10+ years. Casdoor is pretty new and has become a good replacement for Keycloak for me with more functionalities.
- CSRF Vulnerability Leads to Account Takeover in Casdoor IdP
- Casdoor: Open source Payment Gateway (PayPal, Stripe), SSO and SaaS subscription management platform in Golang
- 📦⚡️ Casdoor
-
Help needed - is there a product that provides the auth functionality we need?
Access keys & secrets are supported: https://github.com/casdoor/casdoor/pull/1971
-
Keycloak – Open-Source Identity and Access Management Interview
Looking at your username, it would be nice to mention that you are one of the main developers behind the tool instead of making it sound like you are unrelated: https://github.com/casbin/casbin/graphs/contributors https://github.com/casdoor/casdoor/graphs/contributors
-
Casdoor: a new open source SSO/IAM written in Go, with beautiful web UI, OIDC, OAuth 2.0, SAML, CAS, LDAP, WebAuthn and 2FA
Apparently they even removed the Chinese Tracker to Baidu now.
- An open-source Identity and Access Management (IAM) / Single-Sign-On (SSO) SaaS platform with web UI supporting OAuth 2.0, OIDC, SAML, CAS, SMS, 2FA, Captcha, Casbin and subscription management
- Casdoor: an open-source Identity and Access Management (IAM) platform with beautiful web UI supporting OAuth 2.0, OIDC, SAML and CAS
lldap
-
Keycloak SSO with Docker Compose and Nginx
Good to hear, I think it'll make many users happy. For me, I've migrated back to Authelia. I moved to authentik because at the time Authelia had no user management. After all of authentik's sharp edges, I've found lldap[0], and was able to implement a pilot in a few hours. I haven't looked back, since everything was converted.
[0]: https://github.com/lldap/lldap
-
Ask HN: What apps have you created for your own use?
I wrote LLDAP (https://github.com/lldap/lldap) after struggling to install and configure openLdap on my homelab.
-
Anyone else using LLDAP and if so... (can it do TrueNAS & Linux User/Login authentication?)
I've recently installed and configured LLDAP (Lightweight LDAP) - More details here if you've never heard of it before: GitHub - lldap/lldap: Light LDAP implementation
- Lldap Release 0.5.0
-
🆕 Cosmos 0.8.0 - All in one secure Reverse-proxy, container manager and authentication provider has a brand new App Marketplace to share compose file! Also added home customization
I've an LLDAP instance running to make managing users easier.
- Simple AD for testing stuff in homelab?
-
LDAP resources/recommendations question
I'm trying to integrate LDAP into my small homelab but I'm extreme noobie in it. So far I've tried: 1. OpenLDAP - not so resource heavy but I found it difficult go get working correctly with NextCloud, Keycloak and Jellyfin. Maybe someone could recommend an easy to follow guide? 2. LLDAP - honestly it's almost prefect. Nice clean UI, great guides how to setup with everything I need, but it's a read-only LDAP, so I cannot create or manage users with Keycloak or NC, that's about the only downside and probably bugs me more than it should. 3. 389ds - has everything I need (and probably some more), super easy to setup with this guide but the elephant in the room is that it uses 700MiB of RAM (whereas LLDAP uses only 7-8MiB). That's a big difference which really makes me question whether I want to use this particular solution.
-
Keycloak – Open-Source Identity and Access Management Interview
Note that if you want to use KeyCloak for the OpenID but want to still have a LDAP source of truth, you can use LLDAP + KeyCloak together, with LLDAP as the source of truth and KeyCloak giving you the fancy features: https://github.com/lldap/lldap/blob/main/example_configs/key...
- 🆕 Cosmos 0.6.0 - All in one secure Reverse-proxy, container manager and authentication provider now supports OpenID! Guides available in the documentation on how to setup Nextcloud, Minio and Gitea easily from the UI.
-
How do you organize accounts and passwords in your self-hosted environment?
To be fair, their respective documentations (here and here) are pretty comprehensive.
What are some alternatives?
casbin - An authorization library that supports access control models like ACL, RBAC, ABAC in Golang: https://discord.gg/S5UjpzGZjN
glauth - A lightweight LDAP server for development, home use, or CI
Ory Hydra - OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.
ntfy - Send push notifications to your phone or desktop using PUT/POST
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
authentik - The authentication glue you need.
authelia - The Single Sign-On Multi-Factor portal for web apps
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
Grant - OAuth Proxy
pwm - pwm
pam-keycloak-oidc - PAM module connecting to Keycloak for user authentication using OpenID Connect/OAuth2, with MFA/2FA/TOTP support
PropertyWebBuilder - Create a fully featured real estate website on Rails in minutes! ⛺