keycloak-config-cli
authentik
keycloak-config-cli | authentik | |
---|---|---|
10 | 165 | |
672 | 6,762 | |
3.1% | 6.1% | |
8.1 | 10.0 | |
4 days ago | 7 days ago | |
Java | Go | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keycloak-config-cli
-
Beyond the login page
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for intranets/extranets, and companies now increasingly have their own identity providers or at a minimum have that in their roadmap. So YMMV.
-
Keycloak – Open-Source Identity and Access Management Interview
> But it is painful share the setup with other engineers.
We used keycloak-config-cli [1] it compares a config file stripped of IDs to your Keycloak installation and makes the relevant updates through the REST API.
[1] https://github.com/adorsys/keycloak-config-cli
- Keycloak with PostgreSQL on Kubernetes
-
Is Keycloak ready for Kubernetes?
As far as I know, the state of the art is https://github.com/adorsys/keycloak-config-cli , but I haven't played with that yet. It seems to be a big improvement over other solutions, because it can update configurations and the configurations can be "clean".
- Add keycloak configurations through script
-
Noob question about self-hosting on a VPS
One alternative is to use the admin APIs instead of the UI. You'd SSH into the host and then use curl or https://github.com/adorsys/keycloak-config-cli to configure keycloak. I use the keycloak-config-cli for my setup. It's both how I manage disaster recovery and make changes to configuration.
-
Keycloak; docker or dedicated?
I'm not saying that keycloak is always easy to work with. The thing I found hardest to figure out was how to automate disaster recovery. I want to be able to rebuild my entire auth configuration from scratch including users, default passwords, oauth clients, JWT mappings, etc. The only way I found to do this was to use https://github.com/adorsys/keycloak-config-cli. tl;dr It uses the admin API to provision items. You can export a configured realm, manually tweak some parts of it like enter passwords and add users, and then run it against a keycloak instance to restore everything.
-
Keycloak config management?
I've found this https://github.com/adorsys/keycloak-config-cli and it looks really promising. It can update the configs without a need to restart the whole keycloak instance.
-
Nginx auth_request and Keycloak?
If you do end up using a setup like this then I highly recommend that you look into https://github.com/adorsys/keycloak-config-cli. tl;dr You can export your realm configuration once set up and then use it to restore your system should you lose your keycloak data. It can also be used to provision users but you have to manually add them to the realm export because they are not included in an export for some reason. All the different objects it can manage are documented here: https://www.keycloak.org/docs-api/17.0/rest-api/index.html#_realmrepresentation.
authentik
-
Show HN: Stack, the open-source Clerk/Firebase Auth alternative
If you're looking for a system that has more features, is user friendly, a nice admin ui and easy deployments compared to Keycloak. Please give https://goauthentik.io/ a shot. Not affiliated in any way, just a very happy user.
It has
-an admin UI
- Supports (LDAP, SAML, OAUTH, social logins)
- MFA, Passkeys
- Application access based on user groups etc
- immich SSO with Authentik
-
Show HN: Auth0 OSS alternative Ory Kratos now with passwordless and SMS support
Hey, for authentik this is actually something we're actively working on: https://github.com/goauthentik/authentik/pull/8330, and this will be included in our next feature release in April!
(Disclaimer, I am founder and CTO of authentik)
-
Keycloak SSO with Docker Compose and Nginx
See here for the fix, which both implements the workaround suggested in the issue and also a much more standard-compliant method: https://github.com/goauthentik/authentik/pull/8471
-
Has anyone had any success setting Authentik up behind Caddy for a reverse proxy?
Ask in the correct places for support: https://github.com/goauthentik/authentik/discussions and https://github.com/caddyserver/caddy/issues
-
Authentik setup via Portainer?
I've been searching around for a while now, and struggling with getting Authentik setup on my NAS. I'd like to deploy via Portainer, but getting lost in the documentation just to deploy.
-
Show HN: Obligator – An OpenID Connect server for self-hosters
Personally I went with Keycloak, because it's fairly well documented and also has Docker images available: https://www.keycloak.org/getting-started/getting-started-doc... although the fact that they want you to create an "optimized" image yourself and have a long build/setup process on startup instead is slightly annoying: https://www.keycloak.org/server/containers
Regardless, with something like mod_auth_openidc or another Relying Party implementation, all of the sudden authn/authz becomes easier to manage (you can literally get user information including roles in headers that are passed from your gateway/relying party to apps behind the reverse proxy), regardless of what you have actually running in your APIs: https://github.com/OpenIDC/mod_auth_openidc (there are other options, of course, but I went with that because I already use mod_md).
It's actually cool that there are plentiful options in the space, since OIDC is pretty complex in of itself and attempts at creating something pleasant to actually use are always welcome, I've also heard good things about Authentik: https://goauthentik.io/
-
Issues with authentik
Hello ! I am hosting a server under NixOS with multiple services, and to simply the identity management, I use authentik (https://goauthentik.io/) which can be compared to keycloak. Everything works fine until I try to enable mastodon to host an instance : authentik returns an error 400 and nothing changes this but disabling mastodon. Does anyone have an idea of what could be the cause of this ?
-
HAProxy with Forward Auth to Authentik
For Authentik, it looks like they are not interested to write how to configure HAProxy with it https://github.com/goauthentik/authentik/issues/5768
- Authentik reverse proxy vs swag
What are some alternatives?
testcontainers-spring-boot - Container auto-configurations for Spring Boot based integration tests
authelia - The Single Sign-On Multi-Factor portal for web apps
nginx-openid-connect - Reference implementation of OpenID Connect integration for NGINX Plus
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
keycloak-operator - ARCHIVED Kubernetes Operator for the no longer supported WildFly distribution of Keycloak
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
jellyfin-plugin-ldapauth - LDAP Authentication for Jellyfin
component-keycloak - Commodore Component for Keycloak
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.