Stack Auth

Best Self Hosted Alternatives to Stack Auth

A curated collection of the 8 best self hosted alternatives to Stack Auth.

Stack Auth is a developer-focused authentication and user-management SaaS offering login and session handling, user and organization management, APIs/SDKs for web and mobile apps, and identity integrations.

Alternatives List

#1
Keycloak

Keycloak

Keycloak is an open-source IAM server providing single sign-on, user federation, and centralized authentication and authorization using OIDC, OAuth 2.0, and SAML.

Keycloak screenshot

Keycloak is an open-source Identity and Access Management (IAM) server for modern applications and services. It centralizes authentication and authorization so applications can rely on standards-based SSO instead of implementing login, user storage, and session management.

Key Features

  • Single sign-on and single sign-out across multiple applications
  • Support for standard protocols: OpenID Connect, OAuth 2.0, and SAML 2.0
  • Identity brokering and social login via configurable identity providers
  • User federation with LDAP and Active Directory, with extensible provider support
  • Admin console for managing realms, clients, users, roles, sessions, and policies
  • Account management console for end users (profile, password changes, session management, and 2FA)
  • Fine-grained authorization services for policy-based access control

Use Cases

  • Centralized SSO for internal apps, APIs, and microservices
  • Replacing custom authentication with standards-based identity and token issuance
  • Integrating enterprise directories (LDAP/AD) and external identity providers into one login flow

Limitations and Considerations

  • Operating securely at scale requires careful configuration of realms, clients, token lifetimes, and session settings
  • Some advanced deployments may require external databases and clustering planning for high availability

Keycloak is widely used as a central identity provider to standardize authentication and access control across heterogeneous systems. It reduces application complexity while enabling consistent security policies and user management in one place.

32.3kstars
8kforks
#2
ZITADEL

ZITADEL

ZITADEL is an open source IAM/CIAM platform providing SSO, MFA, OIDC/OAuth2, SAML, user management, and multi-tenant organizations with audit logging.

ZITADEL is an identity and access management platform for authenticating users and securing applications. It provides hosted and custom login options, supports modern standards like OIDC/OAuth2 and SAML, and is designed with multi-tenancy in mind for B2B and CIAM scenarios.

Key Features

  • Multi-tenant organizations with team and project management
  • Single Sign-On with OpenID Connect and OAuth 2.x flows
  • SAML 2.0 support for enterprise federation
  • Multifactor authentication (OTP) and passkeys (FIDO2/WebAuthn)
  • Role-based access control (RBAC) and permission management
  • Self-service user registration and account management
  • API-first platform with gRPC and REST APIs
  • SCIM 2.0 server for automated user provisioning
  • Event-sourced architecture with an audit trail

Use Cases

  • Centralized authentication for web and mobile apps using OIDC/OAuth2
  • B2B SaaS user management with isolated organizations and delegated admin
  • Enterprise integrations via SAML and automated provisioning via SCIM

Limitations and Considerations

  • Requires PostgreSQL (commonly version 14+) as the primary storage backend

ZITADEL combines standards-based authentication with strong multi-tenancy and extensibility, making it suitable for both customer-facing and internal identity scenarios. It can be operated with a hosted login or integrated more deeply via APIs for fully custom experiences.

12.7kstars
916forks
#3
Logto

Logto

Open-source authentication and authorization infrastructure with OIDC/OAuth 2.1, SAML SSO, multi-tenancy, MFA, and RBAC for SaaS and AI apps.

Logto is an open-source identity and access management platform for adding authentication and authorization to web, mobile, and API-based products. It provides standards-based login, enterprise SSO, and scalable multi-tenant identity management for SaaS and AI applications.

Key Features

  • OAuth 2.1 and OpenID Connect provider for apps, SPAs, and APIs
  • SAML-based enterprise SSO with common external IdPs
  • Multi-tenancy via organizations, including invitations and provisioning flows
  • Role-based access control for global and organization-scoped permissions
  • Multiple sign-in methods: password, passwordless (email/SMS codes), and social login
  • Multi-factor authentication options including passkeys, authenticator apps, and backup codes
  • Customizable, pre-built sign-in experience and broad SDK/framework support
  • Admin console for managing apps, users, roles, and authentication settings

Use Cases

  • Add secure login and token-based API access to a SaaS product
  • Implement enterprise-ready SSO and org-level access controls for B2B apps
  • Centralize identity for multi-app ecosystems, including AI agents and tools

Limitations and Considerations

  • Running at scale typically requires operating and tuning PostgreSQL and the service stack
  • Advanced enterprise/security expectations may require careful configuration of SSO, MFA, and authorization models

Logto is a strong fit when you want a modern, standards-based auth system with multi-tenancy, SSO, and RBAC built in. It helps teams ship production-ready identity features without building and maintaining custom auth infrastructure from scratch.

11.4kstars
687forks
#4
Pocket ID

Pocket ID

Pocket ID is a simple self-hosted OpenID Connect (OIDC) provider that lets users sign in to apps using passkeys instead of passwords.

Pocket ID screenshot

Pocket ID is a lightweight OpenID Connect (OIDC) identity provider designed for simple deployments. It focuses on passwordless authentication by using passkeys, enabling users to sign in securely without managing passwords.

Key Features

  • OpenID Connect provider for authenticating users to compatible services
  • Passkey-only (passwordless) authentication flow
  • Designed to be simpler to operate than larger IAM suites for small setups
  • Web-based admin/user interface for managing the identity provider
  • Container-friendly deployment options for straightforward installation

Use Cases

  • Centralized login (OIDC) for homelab and self-hosted applications
  • Passwordless sign-in using hardware keys (for example, security keys)
  • Lightweight alternative for small teams that only need OIDC authentication

Limitations and Considerations

  • Passkey-only approach may not fit environments that require passwords or multiple auth methods

Pocket ID is a good fit when you want an OIDC provider with minimal complexity and a strong passwordless stance. It prioritizes ease of use and modern authentication for smaller, focused deployments.

6.2kstars
186forks
#5
VoidAuth

VoidAuth

VoidAuth is a self-hosted SSO provider with OpenID Connect, ForwardAuth proxy auth, and built-in user and group management plus MFA and passkeys.

VoidAuth screenshot

VoidAuth is an open-source authentication and user management service designed to sit in front of your self-hosted applications. It provides Single Sign-On via OpenID Connect and can also protect apps through a reverse-proxy ForwardAuth flow.

Key Features

  • OpenID Connect (OIDC) identity provider for SSO integrations
  • ForwardAuth-style proxy authentication for protecting apps behind a reverse proxy
  • Built-in user and group management with an admin panel
  • User invitations and optional self-registration
  • Multi-factor authentication support, including passkeys (WebAuthn)
  • Secure password reset via email verification
  • Customization for branding and emails (logo, title, theme color, email templates)
  • Encryption at rest with PostgreSQL or SQLite-backed storage

Use Cases

  • Centralized login for a homelab or self-hosted app suite using OIDC
  • Protecting internal dashboards and services via reverse-proxy ForwardAuth
  • Lightweight IAM for small teams with groups and invitation-based onboarding

Limitations and Considerations

  • The project notes it has not been security audited; evaluate risk and keep dependencies updated

VoidAuth fits users who want a modern, self-hosted SSO solution with both OIDC-based federation and reverse-proxy authentication, plus practical account management features. It is especially suited for homelabs and small organizations standardizing authentication across multiple services.

1.7kstars
50forks
#6
Authgear

Authgear

Open-source Auth0/Clerk/Firebase Auth alternative with passkeys, MFA, SSO (OIDC/SAML), user management portal, and extensible auth flows for web and mobile apps.

Authgear screenshot

Authgear is an identity and authentication platform for consumer and B2B applications, providing hosted login, user management, and standards-based SSO. It can be deployed for self-hosting and is designed to support modern authentication methods across web and mobile.

Key Features

  • Pre-built, customizable signup/login and account settings UI
  • Passwordless authentication (magic link / OTP via email and SMS) and passkeys (WebAuthn)
  • Multi-factor authentication (TOTP, email OTP, SMS OTP)
  • SSO and federated identity via OAuth 2.0 / OIDC and SAML 2.0
  • Admin portal for configuration, user/session management, and operational insights (e.g., logs)
  • Admin API with GraphQL for managing auth resources and automation
  • Extensibility via webhooks and server-side hooks for custom auth logic
  • Enterprise-oriented controls such as audit logs, rate limiting, and brute-force protection

Use Cases

  • Add authentication to SaaS products and multi-app ecosystems with a unified identity layer
  • Implement enterprise SSO for B2B customers using OIDC/SAML and directory integrations
  • Roll out phishing-resistant sign-in using passkeys plus MFA for higher assurance logins

Authgear combines turnkey UI components with protocol support and administrative tooling, making it suitable for teams that want a customizable IAM foundation without building auth from scratch. Its API and hooks enable deeper integration while keeping authentication flows consistent across platforms.

1.2kstars
81forks
#7
Melody Auth

Melody Auth

Turnkey OAuth 2.0/OIDC authentication system with admin panel, REST APIs, RBAC, MFA, social login, and flexible deployment on Cloudflare Workers or Node.js.

Melody Auth screenshot

Melody Auth is a turnkey OAuth 2.0 and authentication system you can run on Cloudflare Workers (with D1 and KV) or self-host on Node.js with Redis and PostgreSQL. It provides a complete auth server, management UI, and developer-facing APIs and SDKs for integrating secure login flows into applications.

Key Features

  • OAuth 2.0 flows including authorization, token exchange, refresh token revoke, scopes, consent, and user info retrieval
  • OpenID Connect support (discovery/openid configuration) and JWT/JWKS-based authentication with key rotation
  • Multi-factor authentication options including email/OTP/SMS, passkeys, recovery codes, and “remember device”
  • External identity providers including social login (Google, GitHub, Discord, Apple, etc.) and OIDC providers; SAML SSO in Node.js deployments
  • Role-based access control (RBAC), user attributes, account linking, organizations and groups
  • Admin panel for managing users, apps, roles/scopes, organizations, IdPs, and logs (including impersonation)
  • Server-to-server REST API plus embedded auth API and frontend SDKs for web, React, Angular, and Vue
  • Brute-force protection and security-focused logging for sign-in and verification flows

Use Cases

  • Ship OAuth/OIDC authentication for new products with a built-in admin console
  • Add MFA, passkeys, and social login to existing apps without building auth from scratch
  • Run an internal identity provider for multiple apps with RBAC, org/group management, and audit-friendly logs

Melody Auth is well-suited for teams that want a complete, customizable auth stack with minimal operational overhead on the edge or full control in a traditional server deployment.

580stars
53forks
#8
AuthPortal

AuthPortal

Lightweight Go-based authentication gateway that provides unified SSO for Plex, Jellyfin, and Emby users with OIDC, MFA and an admin console. Runs in Docker and stores profiles in Postgres.

AuthPortal is a lightweight, Go-built authentication gateway that provides a unified login experience for Plex, Jellyfin, and Emby users. It issues signed session cookies, offers an admin console, and can act as an OAuth 2.1 / OIDC authorization server for downstream apps. (github.com)

Key Features

  • Unified login flows for Plex (PIN flow), Jellyfin, and Emby with provider-specific handling.
  • Signed, HTTP-only JWT session cookies and session lifecycle management.
  • Optional TOTP-based multi-factor authentication with recovery codes and per-tenant enforcement.
  • Built-in OAuth 2.1 / OIDC endpoints (discovery, JWKS, token, userinfo) with PKCE and refresh support.
  • Admin SPA for runtime config editing (providers, security, MFA), OAuth client management, and encrypted config backups with scheduling/retention. (github.com)

Use Cases

  • Provide single sign-on for a media-focused community (Plex/Jellyfin/Emby) across internal portals and apps.
  • Act as a lightweight first-party OIDC authorization server for home-lab or intranet applications.
  • Centralize MFA enforcement, OAuth client lifecycle, and runtime configuration for downstream services.

Limitations and Considerations

  • Designed for same-origin / intranet scenarios; production use requires proper HTTPS reverse proxy and careful key management (SESSION_SECRET, DATA_KEY).
  • Relies on Postgres for user/profile storage and expects you to manage DB availability, backups, and secret rotation. (github.com)

AuthPortal is intended for self-hosting in home-lab and media community environments. It emphasizes a small runtime footprint, containerized deployment, and extensible provider support while requiring operators to follow security best practices and manage secrets and backups carefully. (github.com)

81stars
2forks

Why choose an open source alternative?

  • Data ownership: Keep your data on your own servers
  • No vendor lock-in: Freedom to switch or modify at any time
  • Cost savings: Reduce or eliminate subscription fees
  • Transparency: Audit the code and know exactly what's running