logto
authentik
Our great sponsors
logto | authentik | |
---|---|---|
99 | 165 | |
7,236 | 6,762 | |
4.3% | 13.2% | |
9.9 | 10.0 | |
about 23 hours ago | 4 days ago | |
TypeScript | Go | |
Mozilla Public License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
logto
- Logto v1.12.0 - Organizations, SSO, and MFA
-
10 Issues That Will Help You Grow as a top contributor in Opensource 🏅🏅
feature request: add suspend user event for webhook #4297
-
Logto Cloud is officially launched!
We'd like also invite you to take a look at our new website and explore the features of Logto Cloud.
-
How we support an array of diverse connectors
Want to give it a try? Go to Logto Cloud and pick a connector.
-
Our SaaS product has just unveiled its pricing model and we welcome any feedback or suggestions from you
Thanks for the great feedback :)! We're pleased to confirm that we do offer support for our Hobby plan. However, if you're looking for premium support with a response time of 48 hours, that's part of our Pro Plan. Additionally, Logto has a vibrant community that is always ready to assist with any issues you may encounter. When it comes to pricing, ours is based on Monthly Active Users (MAU) and user engagement. For an app with around 10k MAUs, you can expect an approximate cost of $100 per month, based on our prediction and industry benchmarks. We make a point of being transparent about our pricing on our website, so our customers can make informed decisions with confidence. In terms of cost, we believe our prices are competitive within the industry. As a SaaS company, we specialize in providing comprehensive identity management services. Our solutions adhere to open standards and cover essential aspects like user sign-in/sign-up and user management features such as role-based access control. If our Freemium or Hobby plans don't meet your needs, we also offer a fully open-source version. This option is highly regarded within the open-source community and might be a suitable choice for you. https://github.com/logto-io/logto
-
The essential security checklist for user identity
Security is a complex topic, and it is impossible to cover everything in a single article. We hope that this article has helped you build a stronger sense of security for yourself or your team. If you are building a new app, you may also want to check out Logto, a platform that helps you develop, manage, and secure your product's user identities with minimal effort.
-
Tackle social login experience: Unlocking the power of convenience
Learn more details in the blog: 👉 Tackle social login experience: Unlocking the power of convenience. From the perspective of Increase Conversion, Get Quality Data, and Retain Users, I explored the benefits of Social Login and offer some tips with comparative case studies. Additionally, you can experience the seamless sign-in experience configuration firsthand within Logto Cloud Console. Value your insights if you have any better suggestions.
- Show HN: Logto v1.5.0 – Comprehensive Auth with Webhooks
-
Simplify Outline authentication with Logto
Logto is an effortless identity solution with all the features you need. It supports various sign-in methods, including username, email, phone number, and popular social sign-ins like Google and GitHub.
- Supertokens: Open-Source Alternative to Auth0 / Firebase Auth / AWS Cognito
authentik
-
Show HN: Stack, the open-source Clerk/Firebase Auth alternative
If you're looking for a system that has more features, is user friendly, a nice admin ui and easy deployments compared to Keycloak. Please give https://goauthentik.io/ a shot. Not affiliated in any way, just a very happy user.
It has
-an admin UI
- Supports (LDAP, SAML, OAUTH, social logins)
- MFA, Passkeys
- Application access based on user groups etc
- immich SSO with Authentik
-
Show HN: Auth0 OSS alternative Ory Kratos now with passwordless and SMS support
Hey, for authentik this is actually something we're actively working on: https://github.com/goauthentik/authentik/pull/8330, and this will be included in our next feature release in April!
(Disclaimer, I am founder and CTO of authentik)
-
Keycloak SSO with Docker Compose and Nginx
See here for the fix, which both implements the workaround suggested in the issue and also a much more standard-compliant method: https://github.com/goauthentik/authentik/pull/8471
-
Has anyone had any success setting Authentik up behind Caddy for a reverse proxy?
Ask in the correct places for support: https://github.com/goauthentik/authentik/discussions and https://github.com/caddyserver/caddy/issues
-
Authentik setup via Portainer?
I've been searching around for a while now, and struggling with getting Authentik setup on my NAS. I'd like to deploy via Portainer, but getting lost in the documentation just to deploy.
-
Show HN: Obligator – An OpenID Connect server for self-hosters
Personally I went with Keycloak, because it's fairly well documented and also has Docker images available: https://www.keycloak.org/getting-started/getting-started-doc... although the fact that they want you to create an "optimized" image yourself and have a long build/setup process on startup instead is slightly annoying: https://www.keycloak.org/server/containers
Regardless, with something like mod_auth_openidc or another Relying Party implementation, all of the sudden authn/authz becomes easier to manage (you can literally get user information including roles in headers that are passed from your gateway/relying party to apps behind the reverse proxy), regardless of what you have actually running in your APIs: https://github.com/OpenIDC/mod_auth_openidc (there are other options, of course, but I went with that because I already use mod_md).
It's actually cool that there are plentiful options in the space, since OIDC is pretty complex in of itself and attempts at creating something pleasant to actually use are always welcome, I've also heard good things about Authentik: https://goauthentik.io/
-
Issues with authentik
Hello ! I am hosting a server under NixOS with multiple services, and to simply the identity management, I use authentik (https://goauthentik.io/) which can be compared to keycloak. Everything works fine until I try to enable mastodon to host an instance : authentik returns an error 400 and nothing changes this but disabling mastodon. Does anyone have an idea of what could be the cause of this ?
-
HAProxy with Forward Auth to Authentik
For Authentik, it looks like they are not interested to write how to configure HAProxy with it https://github.com/goauthentik/authentik/issues/5768
- Authentik reverse proxy vs swag
What are some alternatives?
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
authelia - The Single Sign-On Multi-Factor portal for web apps
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
SuperTokens Community - Open source alternative to Auth0 / Firebase Auth / AWS Cognito
oauth4webapi - OAuth 2 / OpenID Connect for JavaScript Runtimes
keycloak-operator - ARCHIVED Kubernetes Operator for the no longer supported WildFly distribution of Keycloak
jellyfin-plugin-ldapauth - LDAP Authentication for Jellyfin
AppAuth-JS - JavaScript client SDK for communicating with OAuth 2.0 and OpenID Connect providers.
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.