Auth0

Best Self Hosted Alternatives to Auth0

A curated collection of the 20 best self hosted alternatives to Auth0.

Auth0 is a cloud identity platform that provides authentication and authorization for applications and APIs, offering user management, SSO, MFA, social and enterprise identity provider integrations, and standards support including OAuth2, OpenID Connect and SAML.

Alternatives List

#1
PocketBase

PocketBase

Open-source Go backend providing embedded SQLite, realtime (SSE) subscriptions, auth (JWT/OAuth2), file storage, admin UI and REST-style APIs for web and mobile apps.

PocketBase screenshot

PocketBase is a compact open-source backend written in Go that provides an embedded SQLite database, realtime subscriptions, user authentication, file storage and a built-in admin dashboard. It can be used as a standalone single-file executable or as an embeddable Go library for custom apps. (github.com)

Key Features

  • Embedded SQLite database with schema builder, validations and realtime change subscriptions (Server-Sent Events). (github.com)
  • Authentication and authorization: email/password, token-based (JWT) auth, OAuth2 provider integrations and auth token refresh/management. (pocketbase.io)
  • File storage with local or S3-compatible backends, file uploads attached to records and automatic thumbnail generation. (pocketbase.io)
  • Built-in Admin dashboard UI for managing collections, records, files and users; extendable via Go hooks and an embedded JavaScript VM. (github.com)
  • REST-style JSON APIs plus official SDKs (JavaScript, Dart) for quick client integration and realtime subscribe/unsubscribe helpers. (github.com)
  • Small footprint single binary distribution with cross-platform prebuilt executables and example starter projects. (pocketbase.io)

Use Cases

  • Prototyping and internal tools where a minimal backend (DB + auth + file storage + admin UI) is needed quickly.
  • Client-driven web or mobile apps (SPAs, PWAs, React/Flutter apps) that need realtime updates and a simple REST API.
  • Lightweight CMS-like applications, admin dashboards and hobby/side projects requiring a portable backend.

Limitations and Considerations

  • Single-server architecture with an embedded SQLite store; no built-in sharding or multi-node clustering, so horizontal scaling is limited. (github.com)
  • Realtime uses SSE (unidirectional) rather than WebSockets; reverse proxy configuration must support long-lived HTTP streams. (pocketbase.io)
  • Project is under active development and the maintainers note potential breaking changes before a stable v1.0; review changelogs and migration notes for production upgrades. (github.com)
  • Offline-first sync is not provided out-of-the-box; client-side handling is required for offline scenarios. (github.com)

PocketBase offers a pragmatic, compact backend for many web and mobile workflows where simplicity, portability and realtime updates matter. It is especially suited for prototypes, internal apps and small production services that accept the single-server SQLite tradeoffs.

55.3kstars
3kforks
#2
Keycloak

Keycloak

Keycloak is an open-source IAM server providing single sign-on, user federation, and centralized authentication and authorization using OIDC, OAuth 2.0, and SAML.

Keycloak screenshot

Keycloak is an open-source Identity and Access Management (IAM) server for modern applications and services. It centralizes authentication and authorization so applications can rely on standards-based SSO instead of implementing login, user storage, and session management.

Key Features

  • Single sign-on and single sign-out across multiple applications
  • Support for standard protocols: OpenID Connect, OAuth 2.0, and SAML 2.0
  • Identity brokering and social login via configurable identity providers
  • User federation with LDAP and Active Directory, with extensible provider support
  • Admin console for managing realms, clients, users, roles, sessions, and policies
  • Account management console for end users (profile, password changes, session management, and 2FA)
  • Fine-grained authorization services for policy-based access control

Use Cases

  • Centralized SSO for internal apps, APIs, and microservices
  • Replacing custom authentication with standards-based identity and token issuance
  • Integrating enterprise directories (LDAP/AD) and external identity providers into one login flow

Limitations and Considerations

  • Operating securely at scale requires careful configuration of realms, clients, token lifetimes, and session settings
  • Some advanced deployments may require external databases and clustering planning for high availability

Keycloak is widely used as a central identity provider to standardize authentication and access control across heterogeneous systems. It reduces application complexity while enabling consistent security policies and user management in one place.

32.3kstars
8kforks
#3
Authelia

Authelia

Authelia is an open-source IAM and authentication server providing SSO, MFA, and access control for web apps, with OpenID Connect/OAuth 2.0 and reverse-proxy integration.

Authelia screenshot

Authelia is an open-source authentication and authorization server that provides identity and access management (IAM) for web applications. It commonly sits behind a reverse proxy to enforce single sign-on (SSO), multi-factor authentication (MFA), and fine-grained access policies.

Key Features

  • OpenID Connect 1.0 provider (OpenID Certified) with OAuth 2.0 support for SSO integrations
  • Reverse-proxy companion mode to allow, deny, or redirect requests based on authentication state
  • Multiple MFA methods including TOTP and WebAuthn/FIDO2 security keys
  • Granular authorization policies based on users, groups, domains, and resources
  • Brute-force protection and login regulation/lockout controls
  • Password reset flows (including LDAP or internal users) with email validation
  • High availability-oriented design suitable for running multiple instances

Use Cases

  • Protect internal tools and self-hosted apps behind a reverse proxy with SSO and MFA
  • Provide an OIDC identity layer for applications that support OAuth2/OIDC login
  • Enforce access control policies for different user groups across multiple domains

Authelia is a lightweight, security-focused IAM component that can centralize authentication and authorization for many web applications. It is particularly well-suited for homelabs and organizations that want modern SSO and MFA without adopting a full enterprise directory suite.

26.4kstars
1.3kforks
#4
authentik

authentik

Open-source IdP delivering SSO, OAuth2/OIDC, SAML2, LDAP, RADIUS, MFA, WebAuthn, conditional access and application-proxy capabilities for self-hosted deployments.

authentik screenshot

authentik is an open-source Identity Provider designed for modern single sign-on and authentication workflows. It provides protocol support and configurable authentication flows to secure web, API, and remote-access use cases.

Key Features

  • Supports standard identity protocols: OAuth2 / OIDC, SAML2, LDAP, RADIUS, SCIM and Kerberos for broad application compatibility
  • Flexible multi-stage authentication flows, policy engine, and enrollment flows for MFA and conditional access (GeoIP, impossible-travel checks)
  • MFA and modern second-factor support including TOTP and WebAuthn (passkeys)
  • Application proxy / outpost model for protecting internal apps and enabling remote access (RDP, SSH, VNC) behind the IdP
  • Rich admin, user, and flow interfaces plus REST APIs and SDKs for automation and integration
  • Pluggable federation and social login sources, fine-grained policies, and templates for customizing login and enrollment behavior
  • Deployment options and tooling for Docker Compose, Kubernetes (Helm), and cloud templates; background workers and channel layers for scale
  • Caching and async task support via Redis; persistent storage and migrations for relational databases

Use Cases

  • Enterprise replacement or augmentation of commercial IdPs to provide SSO, delegated access, and centralized authentication for web and API applications
  • Protecting internal or home-lab applications using the outpost/application-proxy model to enforce authentication and authorization policies
  • Integrating existing LDAP/AD directories and provisioning flows (SCIM) to enable consolidated identity management and MFA across services

Limitations and Considerations

  • Some legacy native desktop or mobile clients that embed outdated browser engines may not support the full web-based login flow; a simplified flow executor (SFE) or alternate API-key approach may be required for such clients
  • Major-version upgrades can require careful attention to migrations and worker restarts; administrators should test upgrades in staging before production rollouts

authentik provides a comprehensive, protocol-rich IdP with configurable flows and deployment flexibility. It is suited for organizations that need a self-hosted, extensible SSO solution with enterprise-grade features and automation capabilities.

19.7kstars
1.4kforks
#5
OAuth2 Proxy

OAuth2 Proxy

OAuth2 Proxy is a reverse proxy and middleware that protects web apps with OAuth2/OIDC login and forwards authenticated user identity to upstream services.

OAuth2 Proxy screenshot

OAuth2 Proxy is a flexible reverse proxy and middleware component that adds OAuth2/OIDC authentication in front of web applications. It integrates with many identity providers and forwards verified identity information to your upstream services.

Key Features

  • Works as a standalone reverse proxy or as an authentication middleware in front of existing proxies/load balancers
  • Supports OAuth2 and OpenID Connect, including a generic OIDC provider and dedicated implementations for common providers
  • Validates users by email, domain, and (for supported providers) groups
  • Forwards authenticated identity details to upstream apps via HTTP headers (for example username and group information)
  • Can also serve static files when used as a standalone reverse proxy

Use Cases

  • Add single sign-on in front of internal tools without modifying the applications
  • Protect multiple services behind a central reverse proxy using a shared authentication layer
  • Gate access to dashboards and admin panels with provider-backed identity and group-based access

Limitations and Considerations

  • Requires correct reverse-proxy/header configuration to avoid trusting spoofed identity headers from untrusted networks
  • Provider feature support varies; group/role extraction depends on the chosen provider implementation

OAuth2 Proxy is commonly used to standardize authentication for self-hosted and internal web apps with minimal application changes. It is well-suited for environments that already rely on OAuth2/OIDC identity providers and need a lightweight authentication gateway.

13.6kstars
2kforks
#6
Casdoor

Casdoor

Casdoor is an open-source, UI-first IAM/SSO platform supporting OAuth 2.0, OIDC, SAML, LDAP, SCIM, WebAuthn and MFA, with an admin web UI and SDKs.

Casdoor is an open-source, UI-first Identity and Access Management (IAM) and Single Sign-On (SSO) platform that provides a web-based admin console for managing users, organizations, and authentication flows. It is designed to integrate with applications via standard identity protocols and offers extensible user authentication options.

Key Features

  • Web UI for user, organization, application and permission management
  • SSO and federation support via OAuth 2.0, OpenID Connect (OIDC), and SAML 2.0
  • Directory and provisioning integrations including LDAP and SCIM
  • Multiple authentication methods including WebAuthn and TOTP-based MFA
  • Built-in registration, email verification, and password recovery flows
  • Public REST API and SDKs to simplify application integration

Use Cases

  • Centralized login and SSO for internal apps and SaaS-style multi-tenant products
  • Adding MFA and modern authentication (OIDC/WebAuthn) to existing services
  • User lifecycle management and provisioning across connected systems

Casdoor fits teams that want an admin-friendly IAM/SSO solution with broad protocol support and a ready-to-use web console. It is especially useful when you need standards-based SSO plus flexible authentication methods in one deployable service.

12.9kstars
1.5kforks
#7
ZITADEL

ZITADEL

ZITADEL is an open source IAM/CIAM platform providing SSO, MFA, OIDC/OAuth2, SAML, user management, and multi-tenant organizations with audit logging.

ZITADEL is an identity and access management platform for authenticating users and securing applications. It provides hosted and custom login options, supports modern standards like OIDC/OAuth2 and SAML, and is designed with multi-tenancy in mind for B2B and CIAM scenarios.

Key Features

  • Multi-tenant organizations with team and project management
  • Single Sign-On with OpenID Connect and OAuth 2.x flows
  • SAML 2.0 support for enterprise federation
  • Multifactor authentication (OTP) and passkeys (FIDO2/WebAuthn)
  • Role-based access control (RBAC) and permission management
  • Self-service user registration and account management
  • API-first platform with gRPC and REST APIs
  • SCIM 2.0 server for automated user provisioning
  • Event-sourced architecture with an audit trail

Use Cases

  • Centralized authentication for web and mobile apps using OIDC/OAuth2
  • B2B SaaS user management with isolated organizations and delegated admin
  • Enterprise integrations via SAML and automated provisioning via SCIM

Limitations and Considerations

  • Requires PostgreSQL (commonly version 14+) as the primary storage backend

ZITADEL combines standards-based authentication with strong multi-tenancy and extensibility, making it suitable for both customer-facing and internal identity scenarios. It can be operated with a hosted login or integrated more deeply via APIs for fully custom experiences.

12.7kstars
916forks
#8
Logto

Logto

Open-source authentication and authorization infrastructure with OIDC/OAuth 2.1, SAML SSO, multi-tenancy, MFA, and RBAC for SaaS and AI apps.

Logto is an open-source identity and access management platform for adding authentication and authorization to web, mobile, and API-based products. It provides standards-based login, enterprise SSO, and scalable multi-tenant identity management for SaaS and AI applications.

Key Features

  • OAuth 2.1 and OpenID Connect provider for apps, SPAs, and APIs
  • SAML-based enterprise SSO with common external IdPs
  • Multi-tenancy via organizations, including invitations and provisioning flows
  • Role-based access control for global and organization-scoped permissions
  • Multiple sign-in methods: password, passwordless (email/SMS codes), and social login
  • Multi-factor authentication options including passkeys, authenticator apps, and backup codes
  • Customizable, pre-built sign-in experience and broad SDK/framework support
  • Admin console for managing apps, users, roles, and authentication settings

Use Cases

  • Add secure login and token-based API access to a SaaS product
  • Implement enterprise-ready SSO and org-level access controls for B2B apps
  • Centralize identity for multi-app ecosystems, including AI agents and tools

Limitations and Considerations

  • Running at scale typically requires operating and tuning PostgreSQL and the service stack
  • Advanced enterprise/security expectations may require careful configuration of SSO, MFA, and authorization models

Logto is a strong fit when you want a modern, standards-based auth system with multi-tenancy, SSO, and RBAC built in. It helps teams ship production-ready identity features without building and maintaining custom auth infrastructure from scratch.

11.4kstars
687forks
#9
Tinyauth

Tinyauth

Tinyauth is a lightweight auth middleware that adds a login screen, OAuth, or LDAP authentication in front of your apps via common reverse proxies.

Tinyauth screenshot

Tinyauth is a simple authentication middleware that sits in front of your web applications and provides a login screen or single sign-on via external identity providers. It is designed to be lightweight and easy to configure, making it well-suited for homelabs and small-to-medium self-hosted setups.

Key Features

  • Adds an authentication layer in front of existing apps without modifying them
  • Supports a built-in login screen with username/password
  • OAuth / OIDC authentication with providers such as Google and GitHub (and others)
  • LDAP authentication against a centralized directory
  • Two-factor authentication support via TOTP
  • Designed to integrate with popular reverse proxies such as Traefik, Nginx, and Caddy
  • Ships as a single statically linked binary and is typically configured via environment variables

Use Cases

  • Protect internal dashboards and admin tools behind a single login page
  • Add SSO to self-hosted services that lack native authentication
  • Gate access to homelab services exposed through a reverse proxy

Limitations and Considerations

  • In active development; configuration and behavior may change between releases

Tinyauth provides a pragmatic way to add authentication in front of multiple services with minimal overhead. It is especially useful when you want a small, dependency-light component that works with common proxy-based deployments.

6.8kstars
213forks
#10
Pocket ID

Pocket ID

Pocket ID is a simple self-hosted OpenID Connect (OIDC) provider that lets users sign in to apps using passkeys instead of passwords.

Pocket ID screenshot

Pocket ID is a lightweight OpenID Connect (OIDC) identity provider designed for simple deployments. It focuses on passwordless authentication by using passkeys, enabling users to sign in securely without managing passwords.

Key Features

  • OpenID Connect provider for authenticating users to compatible services
  • Passkey-only (passwordless) authentication flow
  • Designed to be simpler to operate than larger IAM suites for small setups
  • Web-based admin/user interface for managing the identity provider
  • Container-friendly deployment options for straightforward installation

Use Cases

  • Centralized login (OIDC) for homelab and self-hosted applications
  • Passwordless sign-in using hardware keys (for example, security keys)
  • Lightweight alternative for small teams that only need OIDC authentication

Limitations and Considerations

  • Passkey-only approach may not fit environments that require passwords or multiple auth methods

Pocket ID is a good fit when you want an OIDC provider with minimal complexity and a strong passwordless stance. It prioritizes ease of use and modern authentication for smaller, focused deployments.

6.2kstars
186forks
#11
Cosmos Cloud

Cosmos Cloud

Cosmos Cloud is a security-focused self-hosting platform that provides an app store, reverse proxy with automatic HTTPS, SSO/MFA, container management, backups, and monitoring.

Cosmos Cloud screenshot

Cosmos Cloud is a self-hosting platform designed to run and secure home servers, NAS devices, and small business deployments. It combines an application gateway, app management, and built-in security controls to protect services that may not be hardened by default.

Key Features

  • App store for installing and managing self-hosted applications, plus support for importing Docker Compose stacks
  • Reverse proxy for routing to containers or external services, with automatic HTTPS certificate provisioning
  • Built-in authentication server with SSO (OpenID Connect) and multi-factor authentication
  • SmartShield protections including anti-bot and anti-DDoS features, plus security-focused access controls
  • Container management and updates, with security auditing for managed apps
  • Built-in VPN for secure remote access without exposing services directly to the internet
  • Backup system with incremental, encrypted backups and support for remote targets (using restic)
  • Monitoring with historical metrics, real-time status, and customizable alerts/notifications
  • User management and identity-provider style features (invites, account recovery workflows)

Use Cases

  • Securely publish multiple homelab services behind a single gateway with SSO and HTTPS
  • Provide a private “personal cloud” experience for families with centralized access and user accounts
  • Deploy and operate internal web apps for small organizations with tighter access controls

Limitations and Considerations

  • License is “available source” (Commons Clause), which may not meet some organizations’ open-source requirements

Cosmos Cloud is best suited for users who want an integrated control plane for apps, networking, and security rather than assembling separate components. It aims to simplify deployment while adding protective layers for commonly self-hosted services.

5.5kstars
198forks
#12
Pomerium

Pomerium

Pomerium is an identity-aware access proxy that provides zero trust, per-request authorization to internal web apps and services without a traditional VPN.

Pomerium screenshot

Pomerium is an identity- and context-aware access proxy that sits in front of applications to enforce Zero Trust access. It enables clientless access to internal web apps and services, applying policy to every request rather than relying on network perimeter trust.

Key Features

  • Identity-aware access proxy for internal web apps and services
  • Per-request authorization with continuous policy enforcement (not just session-based)
  • Context-aware policies using signals like identity, time, and device context
  • Works across cloud, hybrid, and on-prem environments without re-architecting apps
  • Supports multiple identity types, including humans and non-human/service identities
  • Audit-focused logging of access decisions to support compliance and investigations

Use Cases

  • Replace or reduce reliance on traditional VPN access for internal applications
  • Secure legacy apps that lack built-in authentication/authorization
  • Enforce consistent, centralized access policy across mixed environments

Limitations and Considerations

  • Requires integration with an identity provider and careful policy design to avoid overly-broad access
  • Introducing a proxy layer may require planning for routing, certificates, and high availability in production

Pomerium is well-suited for teams that want identity-first, policy-based access controls for internal services. It provides a consistent way to secure applications and improve auditability while avoiding blanket network access typical of VPN-based approaches.

4.6kstars
321forks
#13
Kanidm

Kanidm

Kanidm is a secure identity management platform providing SSO, passkeys (WebAuthn), and integrations like OAuth2/OIDC, RADIUS, and LDAP gateway for legacy apps.

Kanidm screenshot

Kanidm is an identity management platform that centralizes users, groups, and authentication for your applications and infrastructure. It focuses on secure defaults, simple operations, and built-in capabilities so services can offload identity and access management to a single provider.

Key Features

  • OAuth2/OIDC provider for single sign-on (SSO)
  • WebAuthn passkeys support, including attested passkeys for higher assurance
  • Application portal for launching and accessing linked applications
  • Linux/Unix integration, including offline authentication support
  • SSH public key distribution for Unix systems
  • RADIUS support for network and VPN authentication
  • Read-only LDAPS gateway for legacy LDAP-dependent systems
  • Administration via CLI tooling plus Web UI for user self-service
  • Two-node high availability using database replication

Use Cases

  • Replace fragmented credentials with centralized SSO for internal web apps
  • Provide strong phishing-resistant authentication using passkeys
  • Manage Unix fleet access with centralized identities and SSH key delivery

Limitations and Considerations

  • Administrative workflows are primarily CLI-driven, while the Web UI is focused on end-user self-service

Kanidm is a strong fit when you want a unified identity provider with modern authentication (passkeys) plus practical infrastructure integrations (Unix, SSH, RADIUS). It aims to deliver enterprise-grade capabilities with a streamlined operational model and secure-by-default design.

4.5kstars
284forks
#14
Cerbos

Cerbos

Cerbos is a scalable, language-agnostic authorization layer for defining and evaluating context-aware access control policies via a dedicated Policy Decision Point (PDP) API.

Cerbos is a language-agnostic authorization layer that externalizes permissions into context-aware policies evaluated by a stateless Policy Decision Point (PDP). It is designed to support least-privilege access control across applications, APIs, services, and modern workloads.

Key Features

  • Policy-based authorization using simple YAML policies for resources, actions, and principals
  • Context-aware decisions with conditional rules and attribute-based access control (ABAC)
  • Derived roles and principal-specific policies for dynamic and exception-driven authorization
  • Stateless PDP service exposing APIs for authorization checks and query planning
  • Multiple policy storage backends (e.g., local disk, Git-based workflows, and supported databases)
  • Designed for scalable, highly available deployments (service, sidecar, or other runtime patterns)

Use Cases

  • Centralize authorization for microservices, APIs, and web applications with consistent rules
  • Implement fine-grained RBAC/ABAC for multi-tenant or enterprise software
  • Offload authorization logic from application code to a dedicated decision service

Cerbos helps teams manage authorization as code, enabling clearer permission logic, easier auditing of intent, and safer evolution of access rules as systems grow.

4.2kstars
171forks
#15
Defguard

Defguard

Enterprise-grade zero-trust access management platform providing WireGuard VPN with true protocol-level 2FA/MFA, plus integrated OpenID Connect SSO and user/device controls.

Defguard screenshot

Defguard is an enterprise-grade zero-trust access management platform centered on WireGuard VPN with multi-factor authentication enforced at the VPN protocol level. It also provides integrated identity and SSO capabilities, designed for auditable, private deployments without relying on third-party cloud services.

Key Features

  • WireGuard VPN with true connection-level 2FA/MFA (TOTP/email tokens, pre-shared keys) rather than web-only MFA
  • Built-in OpenID Connect identity provider for SSO, plus support for external OIDC providers
  • LDAP/Active Directory integration with synchronization for users and groups
  • User, device, and group management with policy controls (RBAC-style administration)
  • Remote user enrollment and onboarding flows, including client configuration distribution
  • Forward-auth support for protecting applications behind reverse proxies
  • Audit-focused operations with logs and visibility into connected users/devices

Use Cases

  • Secure remote workforce access to private networks using WireGuard with enforced MFA
  • Replace or complement an existing IdP by acting as an OIDC provider for internal apps
  • Centralize user/device onboarding and access policies for multi-site VPN deployments

Defguard fits organizations that need a modern WireGuard-based VPN with strong identity and access controls, while keeping authentication and configuration fully under their own infrastructure.

2.5kstars
83forks
#16
VoidAuth

VoidAuth

VoidAuth is a self-hosted SSO provider with OpenID Connect, ForwardAuth proxy auth, and built-in user and group management plus MFA and passkeys.

VoidAuth screenshot

VoidAuth is an open-source authentication and user management service designed to sit in front of your self-hosted applications. It provides Single Sign-On via OpenID Connect and can also protect apps through a reverse-proxy ForwardAuth flow.

Key Features

  • OpenID Connect (OIDC) identity provider for SSO integrations
  • ForwardAuth-style proxy authentication for protecting apps behind a reverse proxy
  • Built-in user and group management with an admin panel
  • User invitations and optional self-registration
  • Multi-factor authentication support, including passkeys (WebAuthn)
  • Secure password reset via email verification
  • Customization for branding and emails (logo, title, theme color, email templates)
  • Encryption at rest with PostgreSQL or SQLite-backed storage

Use Cases

  • Centralized login for a homelab or self-hosted app suite using OIDC
  • Protecting internal dashboards and services via reverse-proxy ForwardAuth
  • Lightweight IAM for small teams with groups and invitation-based onboarding

Limitations and Considerations

  • The project notes it has not been security audited; evaluate risk and keep dependencies updated

VoidAuth fits users who want a modern, self-hosted SSO solution with both OIDC-based federation and reverse-proxy authentication, plus practical account management features. It is especially suited for homelabs and small organizations standardizing authentication across multiple services.

1.7kstars
50forks
#17
Authgear

Authgear

Open-source Auth0/Clerk/Firebase Auth alternative with passkeys, MFA, SSO (OIDC/SAML), user management portal, and extensible auth flows for web and mobile apps.

Authgear screenshot

Authgear is an identity and authentication platform for consumer and B2B applications, providing hosted login, user management, and standards-based SSO. It can be deployed for self-hosting and is designed to support modern authentication methods across web and mobile.

Key Features

  • Pre-built, customizable signup/login and account settings UI
  • Passwordless authentication (magic link / OTP via email and SMS) and passkeys (WebAuthn)
  • Multi-factor authentication (TOTP, email OTP, SMS OTP)
  • SSO and federated identity via OAuth 2.0 / OIDC and SAML 2.0
  • Admin portal for configuration, user/session management, and operational insights (e.g., logs)
  • Admin API with GraphQL for managing auth resources and automation
  • Extensibility via webhooks and server-side hooks for custom auth logic
  • Enterprise-oriented controls such as audit logs, rate limiting, and brute-force protection

Use Cases

  • Add authentication to SaaS products and multi-app ecosystems with a unified identity layer
  • Implement enterprise SSO for B2B customers using OIDC/SAML and directory integrations
  • Roll out phishing-resistant sign-in using passkeys plus MFA for higher assurance logins

Authgear combines turnkey UI components with protocol support and administrative tooling, making it suitable for teams that want a customizable IAM foundation without building auth from scratch. Its API and hooks enable deeper integration while keeping authentication flows consistent across platforms.

1.2kstars
81forks
#18
Mozilla Accounts (FxA)

Mozilla Accounts (FxA)

Mozilla Accounts (FxA) is an account and authentication service used by Mozilla clients, providing login, session management, and account-related APIs for Mozilla products.

Mozilla Accounts (FxA) screenshot

Mozilla Accounts (formerly Firefox Accounts, often abbreviated as FxA) is the account system used by Mozilla products to handle user sign-in and account lifecycle. It provides authentication flows and account-related services that Mozilla clients can integrate with.

Key Features

  • User authentication and session management for Mozilla applications
  • Account lifecycle features such as sign-up, sign-in, and account recovery flows
  • APIs and service components designed to support Mozilla client integrations
  • Monorepo structure that groups multiple account-related services and packages

Use Cases

  • Providing a centralized login for Mozilla applications and services
  • Managing user sessions and account data across multiple Mozilla clients
  • Developing and testing account-related backend services in a unified codebase

Limitations and Considerations

  • The service is primarily intended for Mozilla’s internal clients, and external relying-party integrations may be limited

Mozilla Accounts is suited to organizations that need an integrated account system with consistent authentication flows across multiple clients. It is most relevant when you specifically need compatibility with Mozilla’s ecosystem and existing FxA-based clients.

663stars
217forks
#19
Melody Auth

Melody Auth

Turnkey OAuth 2.0/OIDC authentication system with admin panel, REST APIs, RBAC, MFA, social login, and flexible deployment on Cloudflare Workers or Node.js.

Melody Auth screenshot

Melody Auth is a turnkey OAuth 2.0 and authentication system you can run on Cloudflare Workers (with D1 and KV) or self-host on Node.js with Redis and PostgreSQL. It provides a complete auth server, management UI, and developer-facing APIs and SDKs for integrating secure login flows into applications.

Key Features

  • OAuth 2.0 flows including authorization, token exchange, refresh token revoke, scopes, consent, and user info retrieval
  • OpenID Connect support (discovery/openid configuration) and JWT/JWKS-based authentication with key rotation
  • Multi-factor authentication options including email/OTP/SMS, passkeys, recovery codes, and “remember device”
  • External identity providers including social login (Google, GitHub, Discord, Apple, etc.) and OIDC providers; SAML SSO in Node.js deployments
  • Role-based access control (RBAC), user attributes, account linking, organizations and groups
  • Admin panel for managing users, apps, roles/scopes, organizations, IdPs, and logs (including impersonation)
  • Server-to-server REST API plus embedded auth API and frontend SDKs for web, React, Angular, and Vue
  • Brute-force protection and security-focused logging for sign-in and verification flows

Use Cases

  • Ship OAuth/OIDC authentication for new products with a built-in admin console
  • Add MFA, passkeys, and social login to existing apps without building auth from scratch
  • Run an internal identity provider for multiple apps with RBAC, org/group management, and audit-friendly logs

Melody Auth is well-suited for teams that want a complete, customizable auth stack with minimal operational overhead on the edge or full control in a traditional server deployment.

580stars
53forks
#20
nforwardauth

nforwardauth

A minimal, Rust-based forward authentication middleware for reverse proxies (Traefik, Caddy, nginx) using a passwd file and signed auth tokens.

nforwardauth is a lightweight forward authentication service written in Rust that provides a single auth middleware for reverse proxies. It validates requests, issues signed auth tokens (cookies), and redirects unauthenticated users to a simple login page.

Key Features

  • Forward-auth middleware compatible with common reverse proxies such as Traefik, Caddy, and nginx
  • Uses a passwd file of usernames and hashed passwords (sha-512) for credential storage
  • Issues signed authentication tokens/cookies using a configurable TOKEN_SECRET
  • Optional downstream header (X-Forwarded-User) to pass authenticated identity
  • Configurable cookie name, domain, secure flag, port, and pass-through behavior
  • Built-in, configurable rate limiter to mitigate brute-force login attempts
  • Distributed as a Docker image and usable with docker-compose; simple static login UI

Use Cases

  • Protect multiple self-hosted web apps behind a single authentication wall
  • Integrate a simple auth layer into Traefik/Caddy/nginx setups for homelabs and small deployments
  • Provide password-based access control where a full identity provider is unnecessary

Limitations and Considerations

  • Authentication is limited to username/password entries in a local passwd file; no built-in OIDC/SAML/OAuth providers
  • No built-in CSRF protection as of current roadmap items
  • Not intended as a full SSO or enterprise identity solution; focuses on minimalism and simplicity

nforwardauth is designed for minimal operational overhead and fast response times. It is well suited to homelab and small deployments that need a simple, centralized forward-auth layer without external identity provider integrations.

152stars
8forks

Why choose an open source alternative?

  • Data ownership: Keep your data on your own servers
  • No vendor lock-in: Freedom to switch or modify at any time
  • Cost savings: Reduce or eliminate subscription fees
  • Transparency: Audit the code and know exactly what's running