node-oidc-provider
dex
node-oidc-provider | dex | |
---|---|---|
15 | 37 | |
3,056 | 9,120 | |
- | 1.0% | |
8.2 | 9.5 | |
8 days ago | 5 days ago | |
JavaScript | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
node-oidc-provider
-
Question regarding IDAAS
I don't have a direct answer for your questions but do suggest the canonical OAuth 2.0 implementation may be helpful for your learning too. LMK your thoughts. ➔ https://github.com/panva/node-oidc-provider
-
Show HN: Obligator – An OpenID Connect server for self-hosters
I could recommend https://github.com/panva/node-oidc-provider supports most of the oidc/oauth 2 rabbit hole specs.
-
What tools do you use for developing logins, registrations and my account -pages
This library forms the basis of a number of OIDC providers we, err, provide to our users.
-
FastAPI as a authentication provider
You can also easily setup an OIDC server in Node using a certified OIDC lib like oidc-provider.
-
JWT/Auth flow
If it's nodejs auth servers you're after, look no further than here. Use it as-is, or as a library to build your own richer app.
-
Anyone know a 100% self hosted pure node.js authentication solution similar to Keycloak?
You can take a look on node-oidc-provider
-
Should I use passport.js to implement an OpenID Connect server in node.js?
I am a little confused on how to implement an Auth server in node.js. There are plenty of libs that seem to do just that (ex: https://github.com/panva/node-oidc-provider) and then there's passport, which seems to be a full-fledged authentication framework? Will it serve my purpose or would it be overkill and I should just stick with simple libs like the one I mentionned. I can't seem to understand the difference between the two. Can someone explain?
-
Ask HN: Freelancer? Seeking freelancer? (November 2022)
SEEKING FREELANCER | Remote | NodeJS Dev with OpenID Connect experience
Looking for a NodeJS developer with OpenID / OAuth 2.0 experience to help with upgrading an OpenID Connect implementation. Specifically, the OpenID service depends on v6 of this library: https://github.com/panva/node-oidc-provider
We would like a review of our current implementation, and help with finishing a mostly-completed upgrade to v7 before we onboard 3rd-parties to our authentication and authorization infrastructure. We estimate the contract length to be between 1 - 2 months, part-time. To apply, send your CV and hourly rate to [email protected]. Please be sure to highlight your experience with the relevant technologies and protocols.
-
Dear Auth0: Fuck you and fuck your new pricing model
Have you looked for other OIDC/OAuth2 packages. Here's one in Node. That seems very interesting. https://github.com/panva/node-oidc-provider
-
Show HN: Open-Source Identity Server Written in Go (Ory Kratos)
I'm passing familiar with this area, but not as familiar as I should be...
How does this compare to something like this - https://github.com/panva/node-oidc-provider
Are they addressing the same need? Is Ory looking to get certified in these area? (Is it already?)
dex
-
Navigating Identity Authentication: From LDAP to Modern Protocols
Dex: https://dexidp.io
-
Keycloak SSO with Docker Compose and Nginx
Recently I looked into having a relatively simple SSO setup for my homelab. My main objective is that I could easily login with Google or GitHub auth. At my previous job I used both JetBrains Hub [1] and Keycloak but I found both of them a bit of a PITA to setup.
JetBrains Hub was really, really easy to get going. As was my previous experience with them. The only thing that annoyed me was the lack of a latest tag on their Docker registry. Don't get me wrong, pinned versions are great, but for my personal use I mostly just want to update all my Docker containers in one go.
On the other hand I found Keycloak very cumbersome to get going. It was pretty easy in dev mode, but I stumbled to get it going in production. AFAIK it had something to do with the wildcard Let's Encrypt cert that I tried to use. But after a couple of hours, I just gave up.
I finally went with Dex [2]. I had previously put it off because of the lack of documentation, but in the end it was extremely easy to setup. It just required some basic YAML, a SQLite database and a (sub)domain. I combined Dex with the excellent OAuth2 Proxy and a custom Nginx (Proxy Manager) template for an easy two line SSO configuration on all of my internal services.
In addition to this setup, I also added Cloudflare Access and WAF outside of my home to add some security. I only want to add some CrowdSec to get a little more insights.
1. https://www.jetbrains.com/hub/
2. https://dexidp.io/
3. https://github.com/oauth2-proxy/oauth2-proxy
3. https://github.com/alex3305/unraid-docker-templates
-
Sign in with GitHub in Go
Another great option is to use https://github.com/dexidp/dex in an authentication setup. In your app, you federate the authentication to dex using OAuth2. Dex then has a pluggable architecture with built-in connectors for many established identity providers using a variety of protocols: Among others OAuth2, SAML 2 but also GitHub, Google, Gitea and so forth.
- Show HN: Obligator – An OpenID Connect server for self-hosters
-
I made a small program that makes it easier to run commands inside containers
dex is well-known: https://github.com/dexidp/dex
-
Keycloak – Open-Source Identity and Access Management Interview
We used keycloak for openid identity provider as well. It is fine to setup keycloak once. But it is painful share the setup with other engineers.
For local development, we end up using dex (https://dexidp.io). When we need support group/role, we use dex and glauth(https://glauth.github.io). Both dex and glauth can be configured with yaml files. We just created a few yaml files and a docker compose file, every engineer can be brought up the whole environment in a few seconds.
Also https://www.authelia.com and https://github.com/goauthentik/authentik look pretty promising, if you need more advanced features from them.
-
dex VS boruta-server - a user suggested alternative
2 projects | 22 May 2023
-
Have you convinced anyone to use Nix or NixOS? Friends? Coworkers?
I added it as an available option (flake) in Dex: https://github.com/dexidp/dex
- Okta Access Gateway Alternatives
- Is there a good example of an open source non-trivial (DB connection, authentication, authorization, data validation, tests, etc...) Go API?
What are some alternatives?
IdentityServer - The most flexible and standards-compliant OpenID Connect and OAuth 2.x framework for ASP.NET Core
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
Ory Hydra - OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.
authelia - The Single Sign-On Multi-Factor portal for web apps
node-openid-client - OpenID Certified™ Relying Party (OpenID Connect/OAuth 2.0 Client) implementation for Node.js.
OpenUnison - Unified Identity Management
louketo-proxy - A OpenID / Proxy service
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
express-openid-connect - An Express.js middleware to protect OpenID Connect web applications.
caddy-auth-portal - Authentication Plugin for Caddy v2 implementing Form-Based, Basic, Local, LDAP, OpenID Connect, OAuth 2.0 (Github, Google, Facebook, Okta, etc.), SAML Authentication. MFA with App Authenticators and Yubico.