okta-oidc-js
keycloak-community
Our great sponsors
okta-oidc-js | keycloak-community | |
---|---|---|
2 | 3 | |
387 | 225 | |
- | 1.8% | |
3.2 | 4.7 | |
almost 2 years ago | 4 months ago | |
TypeScript | HTML | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
okta-oidc-js
- Using Node.js and Okta authentication jwt verifier always returns errors
-
Okta to Acquire Auth0 for $6.5B
I hope this gives rise to a viable third party outside of Amazon, Google, and Microsoft. Perhaps I'm jaded, perhaps hopelessly biased - but I can only see this as a net negative.
Okta's open source packages receive a pitiful amount of attention (for example: https://github.com/okta/okta-oidc-js/issues?q=is%3Aissue+is%...) with forks almost becoming a requirement. Auth0 by contrast has been "on the ball" for a long time with their offerings. Okta's interfaces have been disjointed and inconsistent, confusing to users on a scale only surpassed by Jira, while Auth0's have always been pleasant to use from a user and developer perspective.
From a personnel perspective, the two companies couldn't be more different, with Auth0 embracing a remote-first-class culture with creative interview processes, and Okta (pre-covid) being very much the opposite. I interviewed with both, and the process at Auth0 had me walk away with respect, while contrasted with Okta that left me reminded that tech hiring is broken.
I'll hold my breath for a short time that Auth0 is allowed to operate independently. Sadly I feel it'll be inevitable that they're eventually swallowed up by the mothership.
keycloak-community
-
Create and manage your private WireGuard mesh with NetBird and Keycloak
The managed version still uses Auth0, and we plan to keep using it. We will add a Device Authorization Grant support to the self-hosted version that would allow adding machines to the WireGuard network with SSO using Keycloak (or any other IDP that supports it). This is how it looks for the hosted version -> video.
-
Okta to Acquire Auth0 for $6.5B
Lack of webauthn might be a stopper for some, but it's in the pipeline:
https://github.com/keycloak/keycloak-community/blob/master/d...
-
How to deploy a free Auth0 alternative to DigitalOcean in 5 minutes
Luckily, Keycloak provides a container, optimized and ready to go. It's rather new and called 'keycloak-x'. You can read more about it here. And more about it's configuration here.
What are some alternatives?
SuperTokens Community - Open source alternative to Auth0 / Firebase Auth / AWS Cognito
fusionauth-import-scripts - FusionAuth Import scripts for Auth0 and other examples
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
dashboard - NetBird Management Service Web UI Panel