nginx-openid-connect
authentik
nginx-openid-connect | authentik | |
---|---|---|
9 | 165 | |
188 | 6,831 | |
1.1% | 7.1% | |
2.5 | 10.0 | |
17 days ago | 1 day ago | |
JavaScript | Go | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nginx-openid-connect
-
OIDC filter
Could you please suggest an OIDC filter/side-car which is capable of configure it with a custom IDP? Nginx Plus has a OIDC filter https://github.com/nginxinc/nginx-openid-connect and looking for a similar solution. I am planning to use AKS for api and Web compute. Thanks!
-
Keycloak – Open-Source Identity and Access Management Interview
> With both Apache and Nginx you can let the web server do all the OpenID Connect work for you for paths you specify.
Seems like at least the official nginx solution for this requires their paid subscription: https://github.com/nginxinc/nginx-openid-connect
Got any tips for how to do it with their open-source solution?
- User friendly reverse proxy suitable for production
-
Cosmos-Server now in version 0.3.0 with 2 Factor Authentication: A User-Friendly, Self-Hosted Alternative to using Cloudflare Tunnel to secure your applications
It's not a matter of better or worst security than Traefik or NGINX, it's that if you do not have entreprise level licence for those software, you don't actually have the security modules that protect your services (ex. https://www.nginx.com/products/nginx/) Cosmos includes a WAF by default without subscription
- Microsites/apps (?) with NextJS
-
Where and how do you store your access_token and refresh_token in Oauth2.0 authorization flow?
You can scale up it with side car pattern with K8. One product you can use is https://github.com/nginxinc/nginx-openid-connect and if you Azure they have a built in capability as well. I haven't worked with AWS for a while but probably they will have an equal solution.
- Proper way to proxy all calls to an external API through the Next.js server? (Make SSR components work with client auth cookies)
-
Is it possible to control some parameters of Nginx programatically
You could purchase NGINX Plus which allows many things to be configured via API calls.
-
Azure AD Authentication
If you have an active Nginx plus subscription the OIDC implementation will help. https://github.com/nginxinc/nginx-openid-connect
authentik
-
Show HN: Stack, the open-source Clerk/Firebase Auth alternative
If you're looking for a system that has more features, is user friendly, a nice admin ui and easy deployments compared to Keycloak. Please give https://goauthentik.io/ a shot. Not affiliated in any way, just a very happy user.
It has
-an admin UI
- Supports (LDAP, SAML, OAUTH, social logins)
- MFA, Passkeys
- Application access based on user groups etc
- immich SSO with Authentik
-
Show HN: Auth0 OSS alternative Ory Kratos now with passwordless and SMS support
Hey, for authentik this is actually something we're actively working on: https://github.com/goauthentik/authentik/pull/8330, and this will be included in our next feature release in April!
(Disclaimer, I am founder and CTO of authentik)
-
Keycloak SSO with Docker Compose and Nginx
See here for the fix, which both implements the workaround suggested in the issue and also a much more standard-compliant method: https://github.com/goauthentik/authentik/pull/8471
-
Has anyone had any success setting Authentik up behind Caddy for a reverse proxy?
Ask in the correct places for support: https://github.com/goauthentik/authentik/discussions and https://github.com/caddyserver/caddy/issues
-
Authentik setup via Portainer?
I've been searching around for a while now, and struggling with getting Authentik setup on my NAS. I'd like to deploy via Portainer, but getting lost in the documentation just to deploy.
-
Show HN: Obligator – An OpenID Connect server for self-hosters
Personally I went with Keycloak, because it's fairly well documented and also has Docker images available: https://www.keycloak.org/getting-started/getting-started-doc... although the fact that they want you to create an "optimized" image yourself and have a long build/setup process on startup instead is slightly annoying: https://www.keycloak.org/server/containers
Regardless, with something like mod_auth_openidc or another Relying Party implementation, all of the sudden authn/authz becomes easier to manage (you can literally get user information including roles in headers that are passed from your gateway/relying party to apps behind the reverse proxy), regardless of what you have actually running in your APIs: https://github.com/OpenIDC/mod_auth_openidc (there are other options, of course, but I went with that because I already use mod_md).
It's actually cool that there are plentiful options in the space, since OIDC is pretty complex in of itself and attempts at creating something pleasant to actually use are always welcome, I've also heard good things about Authentik: https://goauthentik.io/
-
Issues with authentik
Hello ! I am hosting a server under NixOS with multiple services, and to simply the identity management, I use authentik (https://goauthentik.io/) which can be compared to keycloak. Everything works fine until I try to enable mastodon to host an instance : authentik returns an error 400 and nothing changes this but disabling mastodon. Does anyone have an idea of what could be the cause of this ?
-
HAProxy with Forward Auth to Authentik
For Authentik, it looks like they are not interested to write how to configure HAProxy with it https://github.com/goauthentik/authentik/issues/5768
- Authentik reverse proxy vs swag
What are some alternatives?
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
authelia - The Single Sign-On Multi-Factor portal for web apps
cloudfront-auth - An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
crossplane - Quick and reliable way to convert NGINX configurations into JSON and back.
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
lua-resty-openidc - OpenID Connect Relying Party and OAuth 2.0 Resource Server implementation in Lua for NGINX / OpenResty
keycloak-operator - ARCHIVED Kubernetes Operator for the no longer supported WildFly distribution of Keycloak
keycloak-config-cli - Import YAML/JSON-formatted configuration files into Keycloak - Configuration as Code for Keycloak.
jellyfin-plugin-ldapauth - LDAP Authentication for Jellyfin
nginx-wrapper - NGINX Event Process Wrapper
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.