Jauth
Lightweight TLS reverse proxy with SSH and Telegram authorization
Jauth is a compact SSL/TLS reverse proxy written in Go that protects self-hosted applications by requiring authorization before proxying traffic. It provides SSH- and Telegram-based login methods, optional single sign-on behavior, and can obtain certificates automatically or use self-signed/manual certificates.
Key Features
- Single static binary with minimal dependencies, designed for simple self-hosting
- TLS support via autogenerated self-signed certificates, manual certificates, or ACME/Let's Encrypt
- Authorization via an integrated SSH server (authorized_keys) and Telegram login widget validation
- Optional lightweight SSO: authenticated username is forwarded to backend via Remote-User header
- Per-domain configuration, domain-specific whitelists and optional per-domain Telegram users
- Whitelist-based access control and a NoAuth mode to act as a plain TLS proxy
- Stores authenticated sessions/tokens on disk for session persistence between restarts
- Defaults that let it run with minimal configuration while supporting custom TOML config
Use Cases
- Protect web interfaces and internal dashboards for self-hosted apps without adding app-level auth
- Provide a simple SSO/pass-through header for multiple services behind the same gateway
- Allow SSH key or Telegram-based access for teams that prefer key-based authentication or tokenless login flows
Limitations and Considerations
- Telegram-based login requires registering a bot and binding it to a domain (one bot per domain); Jauth validates tokens rather than using the Telegram bot API directly
- ACME certificate issuance is per-domain and may be delayed; logs may not always show issuance progress
- SSO is minimal (username is forwarded via header) and is not a full-featured identity provider or OIDC/SAML implementation
- Session tokens are stored in a local file; if running with dropped privileges or restricted filesystem access, token persistence or state saving may be affected
Jauth is focused on minimalism and pragmatic access control for self-hosted services. It is suitable when a lightweight, single-binary TLS proxy with SSH/Telegram authorization and simple SSO semantics is preferred over a full identity platform.
Categories:
Tags:
Tech Stack:
Similar Services

Caddy
Extensible web server and reverse proxy with automatic HTTPS
Caddy is a fast, extensible Go web server and reverse proxy with automatic HTTPS (ACME), HTTP/1.1, HTTP/2, and HTTP/3 support, and a JSON config API.

Traefik Proxy
Cloud-native reverse proxy, load balancer, and ingress controller
Traefik Proxy is a dynamic reverse proxy and load balancer that auto-discovers services from Docker, Kubernetes, and other providers, with HTTPS, routing, and observabili...

Kong Gateway
Cloud-native API and LLM gateway with extensible plugins
Kong Gateway is a high-performance, cloud-native API gateway for routing, securing, and observing API traffic, with an extensible plugin system and Kubernetes support.

Nginx Proxy Manager
Web UI to manage Nginx reverse proxy hosts and SSL certificates
Nginx Proxy Manager is a web-based admin panel for managing Nginx reverse proxy hosts, redirects, streams, and Let’s Encrypt SSL certificates via Docker.

NGINX
High-performance web server, reverse proxy, and load balancer
NGINX is a high-performance HTTP server and reverse proxy with caching, load balancing, TLS termination, and TCP/UDP proxying via a modular architecture.

Pangolin
Identity-aware VPN and reverse proxy for secure remote access
Open-source identity-based remote access platform combining WireGuard VPN and tunneled reverse proxy access with granular zero-trust controls.
Go
TOML