nginx-openid-connect
keycloak-clojure
nginx-openid-connect | keycloak-clojure | |
---|---|---|
9 | 1 | |
188 | 145 | |
1.1% | - | |
2.5 | 7.6 | |
18 days ago | 24 days ago | |
JavaScript | Clojure | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nginx-openid-connect
-
OIDC filter
Could you please suggest an OIDC filter/side-car which is capable of configure it with a custom IDP? Nginx Plus has a OIDC filter https://github.com/nginxinc/nginx-openid-connect and looking for a similar solution. I am planning to use AKS for api and Web compute. Thanks!
-
Keycloak – Open-Source Identity and Access Management Interview
> With both Apache and Nginx you can let the web server do all the OpenID Connect work for you for paths you specify.
Seems like at least the official nginx solution for this requires their paid subscription: https://github.com/nginxinc/nginx-openid-connect
Got any tips for how to do it with their open-source solution?
- User friendly reverse proxy suitable for production
-
Cosmos-Server now in version 0.3.0 with 2 Factor Authentication: A User-Friendly, Self-Hosted Alternative to using Cloudflare Tunnel to secure your applications
It's not a matter of better or worst security than Traefik or NGINX, it's that if you do not have entreprise level licence for those software, you don't actually have the security modules that protect your services (ex. https://www.nginx.com/products/nginx/) Cosmos includes a WAF by default without subscription
- Microsites/apps (?) with NextJS
-
Where and how do you store your access_token and refresh_token in Oauth2.0 authorization flow?
You can scale up it with side car pattern with K8. One product you can use is https://github.com/nginxinc/nginx-openid-connect and if you Azure they have a built in capability as well. I haven't worked with AWS for a while but probably they will have an equal solution.
- Proper way to proxy all calls to an external API through the Next.js server? (Make SSR components work with client auth cookies)
-
Is it possible to control some parameters of Nginx programatically
You could purchase NGINX Plus which allows many things to be configured via API calls.
-
Azure AD Authentication
If you have an active Nginx plus subscription the OIDC implementation will help. https://github.com/nginxinc/nginx-openid-connect
keycloak-clojure
-
Keycloak – Open-Source Identity and Access Management Interview
I use Keycloak a lot for authentication and authorisation and I like its flexibility and richness of features.
Running it in production is a no-brainer, the only problem we got was some bad behaviours of some clients that issue a token for every API call as it can put some stress on Keycloak, has to implements some rate limiting in front ok Keycloak to avoid that.
I try to ease its usage with Clojure with https://github.com/jgrodziski/keycloak-clojure
What are some alternatives?
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
casdoor - An open-source UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform with web UI supporting OAuth 2.0, OIDC, SAML, CAS, LDAP, SCIM, WebAuthn, TOTP, MFA and RADIUS [Moved to: https://github.com/casdoor/casdoor]
cloudfront-auth - An AWS CloudFront Lambda@Edge function to authenticate requests using Google Apps, Microsoft, Auth0, OKTA, and GitHub login
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
crossplane - Quick and reliable way to convert NGINX configurations into JSON and back.
connectivly - Add OAuth + OIDC to your app with a single callback
lua-resty-openidc - OpenID Connect Relying Party and OAuth 2.0 Resource Server implementation in Lua for NGINX / OpenResty
keycloak-config-cli - Import YAML/JSON-formatted configuration files into Keycloak - Configuration as Code for Keycloak.
terraform-provider-keycloak - Terraform provider for Keycloak
nginx-wrapper - NGINX Event Process Wrapper
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.