lldap | authentik | |
---|---|---|
80 | 177 | |
4,949 | 15,857 | |
3.6% | 4.7% | |
9.1 | 10.0 | |
2 days ago | 1 day ago | |
Rust | Go | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
lldap
-
March 2025 Java Key Updates in Boot, Security, and More
A new LLdapDockerComposeConnectionDetailsFactory class for Light LDAP Implementation for Authentication.
- Lldap Release v0.6.0
- Lldap: Light LDAP Implementation
- Identity: Self-Hosted or in the Cloud?
-
Keycloak SSO with Docker Compose and Nginx
Good to hear, I think it'll make many users happy. For me, I've migrated back to Authelia. I moved to authentik because at the time Authelia had no user management. After all of authentik's sharp edges, I've found lldap[0], and was able to implement a pilot in a few hours. I haven't looked back, since everything was converted.
[0]: https://github.com/lldap/lldap
-
Ask HN: What apps have you created for your own use?
I wrote LLDAP (https://github.com/lldap/lldap) after struggling to install and configure openLdap on my homelab.
-
Anyone else using LLDAP and if so... (can it do TrueNAS & Linux User/Login authentication?)
I've recently installed and configured LLDAP (Lightweight LDAP) - More details here if you've never heard of it before: GitHub - lldap/lldap: Light LDAP implementation
- Lldap Release 0.5.0
-
🆕 Cosmos 0.8.0 - All in one secure Reverse-proxy, container manager and authentication provider has a brand new App Marketplace to share compose file! Also added home customization
I've an LLDAP instance running to make managing users easier.
- Simple AD for testing stuff in homelab?
authentik
-
Down the Rabbit Hole of creating a Home Lab
Authentik - Open-source Identity Provider focused on flexibility and versatility.
-
Windows 2000 Server named peak Microsoft. Readers say all downhill since Clippy
> Honest to god, if an IdP like Okta made an Active Directory replacement that ran via container
https://goauthentik.io/ can run in docker. It can be paired in with openldap containers, too.
-
Dear hosters, you are selling wood, not furniture
> If someone tries to program this themselves, they either do it incorrectly (or not well enough) or keep an expert busy for weeks and weeks.
Or they could set up something like https://goauthentik.io/? (Shameless plug: if you use my Docker dashboard, https://lunni.dev/, you can install it in a couple clicks from the Marketplace.) Or any other open source option – there are dozens at this point.
And honestly speaking, auth isn’t that hard in the first place. You do have to remember a few things, but if you follow something like https://lucia-auth.com/ it shouldn’t take you more than an hour to set up some decent auth with 2FA and OIDC support. A bit more time to implement sign-in rate limiting and email verification and you have a robust system that (a) works in a way that you understand and (b) you can reuse between projects without paying a dime.
-
A powerful free and open source WAF – UUSEC WAF
Those guys are also opening "ad" issues on unrelated repositories[0]. Adding that to what others mentioned, it really doesn't inspire confidence in the software
https://github.com/goauthentik/authentik/issues/13521
- Red Hat to contribute container tech (Podman, bootc, ComposeFS, etc.) to CNCF
- Ask HN: What type of Auth are you using on your side projects?
- Paperless-ngx: scan, index and archive all your physical documents
- Authentik: An open-source Identity Provider
-
Authelia and Lldap: Authentication, SSO, User Management[ ] for Home Networks
While authelia is quite cool "infra-as-code" tool, since you have your entire configuration in yaml form, for those not willing to spend a few evenings configuring SSO, there is authentik [1] which features management UI.
Offers similar feature set, also self-hostable, but most importantly - simple to set-up. I've spent 8h on authelia deployment, where 30 minutes in authentik would be sufficient. But both are good options, pick what you prefer.
1: https://goauthentik.io/
-
Ask HN: Who is hiring? (June 2024)
Authentik Security | Engineer | US | REMOTE (anywhere) | Full-time
Authentik Security (https://goauthentik.io) is the company behind authentik (https://github.com/goauthentik/authentik), an open source identity provider with over 250k+ unique installations and 12M+ downloads. Help us replace Okta/Auth0, Ping Identity, and Microsoft Entra with modern, secure identity for all!
We are a small remote team, looking to scale up with a couple experienced software engineers, primarily with a backend focus. Bonus points if you have significant experience with identity/SSO standards and/or Django/Python.
There is also the opportunity to be "forward deployed" spending 15-20% of time with enterprise customers (remotely) on configuration best practices and rollout strategies, _if_ that is of interest to the right candidate.
To apply, please use: https://forms.gle/TjRuTCec8M6UaN2Q8
What are some alternatives?
glauth - A lightweight LDAP server for development, home use, or CI
authelia - The Single Sign-On Multi-Factor portal for web apps
ntfy - Send push notifications to your phone or desktop using PUT/POST
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
oidc - Easy to use OpenID Connect client and server library written for Go and certified by the OpenID Foundation
Keycloak - Open Source Identity and Access Management For Modern Applications and Services