11/12 free views
Tool
Web Service
Identity & Access Management (IAM)

authentik

by goauthentik

19.7Kstars
1.4Kforks
69watchers
Updated 4 months ago
About

authentik is an open-source, flexible Identity Provider designed to unify authentication and access management across diverse environments.

The authentication glue you need.

Primary Use Case

authentik is primarily used by organizations seeking a versatile and self-hosted identity provider solution to manage authentication, zero trust policies, and secrets management. It is suitable for both small test setups and large-scale enterprise deployments replacing legacy IdPs like Okta or Auth0. IT teams and security architects use authentik to implement centralized identity and access management with support for multiple protocols.

Key Features
  • Open-source Identity Provider with broad protocol support
  • Flexible and versatile authentication system
  • Zero Trust security model integration
  • Secrets management capabilities
  • Self-hosted alternative to Okta, Auth0, Entra ID, Ping Identity
  • Docker Compose and Kubernetes Helm Chart installation options
  • Enterprise-grade scalability for large deployments
  • Active CI/CD pipelines and code coverage monitoring

Installation

  • For small or test setups, use Docker Compose as documented at https://goauthentik.io/docs/installation/docker-compose/
  • For larger or production setups, deploy using the Helm Chart available at https://github.com/goauthentik/helm
  • Refer to Kubernetes installation documentation at https://goauthentik.io/docs/installation/kubernetes/ for Helm Chart usage
Security Frameworks
Initial Access
Persistence
Defense Evasion
Credential Access
Impact
Usage Insights
  • Integrate authentik with SIEM solutions to enhance detection of anomalous authentication events.
  • Leverage authentik's zero trust capabilities to enforce granular access policies reducing lateral movement.
  • Use authentik's secrets management to rotate credentials automatically, minimizing exposure risk.
  • Deploy authentik in Kubernetes environments using Helm charts for scalable and resilient IAM infrastructure.
  • Combine authentik with multi-factor authentication (MFA) to strengthen defense against credential theft.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about authentik. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team40%
Blue Team90%
Purple Team70%
Details
LicenseOther
LanguagePython
Open Issues3816
Topics
saml
saml-idp
saml-sp
oauth2
oauth2-server
oauth2-client
oidc
oidc-provider
oidc-client
sso