SSO for all the services?

This page summarizes the projects mentioned and recommended in the original post on /r/selfhosted

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • vouch-proxy

    an SSO and OAuth / OIDC login solution for Nginx using the auth_request module

  • Vouch proxy

  • docker-fusiondirectory

    Dockerized web based LDAP manager

  • I have docker images for the following: Fusion Directory - A web based LDAP front end for user/group management OpenLDAP w/FusionDirectory Schemas - The Backend LDAP server that can be communicated to via your applications and also The front end above. LemnonLDAP:NG - Portal of Applications, OIDC, SAML, 2FA (TOTP and Yukikey) and Headers authentication powerhouse. Ties into the above quite nicely along with password resets, password policies, etc.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • docker-openldap-fusiondirectory

    Dockerized OpenLDAP server with FusionDirectory Schema Support

  • I have docker images for the following: Fusion Directory - A web based LDAP front end for user/group management OpenLDAP w/FusionDirectory Schemas - The Backend LDAP server that can be communicated to via your applications and also The front end above. LemnonLDAP:NG - Portal of Applications, OIDC, SAML, 2FA (TOTP and Yukikey) and Headers authentication powerhouse. Ties into the above quite nicely along with password resets, password policies, etc.

  • docker-lemonldap

    Dockerized authentication server with Single Sign On SAML, OpenID Connect, CAS, and Header support

  • I have docker images for the following: Fusion Directory - A web based LDAP front end for user/group management OpenLDAP w/FusionDirectory Schemas - The Backend LDAP server that can be communicated to via your applications and also The front end above. LemnonLDAP:NG - Portal of Applications, OIDC, SAML, 2FA (TOTP and Yukikey) and Headers authentication powerhouse. Ties into the above quite nicely along with password resets, password policies, etc.

  • docker-nginx

    Dockerized webserver with many customizable options (by tiredofit)

  • Limiting an application can be interesting as some applications don't have support for automatic login via SSO, but you can certainly protect it. I have another image which is simply Nginx that allows yout o authenticate via Basic Auth against an LDAP server, or against your LemonLDAP:NG instance. (Single Sign on) At that point you would just proxy over to your application and after your session expired or if it was removed/disabled you would no longer be able to access those applications even if the account still existed on them due to the way the "handlers" work. All my other images work in the same fashion.

  • DuoUniversalKeycloakAuthenticator

    Keycloak Authenticator for Duo's new Universal Prompt

  • The other is the newer universal prompt (https://github.com/instipod/DuoUniversalKeycloakAuthenticator).

  • ldap-user-manager

    A PHP web-based interface for LDAP user account management and self-service password change.

  • The LDAP users and groups are managed with ldap-user-manager which makes the creation of users and groups a breeze.

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • xsrv

    [mirror] Install and manage self-hosted services/applications, on your own server(s) - ansible collection and utilities

  • It's not "hard" but understanding the concepts (DIT, common name, distinguished name...) helps. Check https://github.com/nodiscc/xsrv/tree/master/roles/openldap the tasks at https://github.com/nodiscc/xsrv/blob/master/roles/openldap/tasks/openldap.yml and https://github.com/nodiscc/xsrv/blob/master/roles/openldap/tasks/populate.yml should give you a breakdown of what needs to be done to get a minimal LDAP server running

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts