Favicon of authentik

authentik

Self-hosted identity provider with flexible workflows, comprehensive APIs, and enterprise-grade security. Over 1 million installations trusted worldwide.

Visit authentik
Screenshot of authentik websiteVisit authentik

Take control of your identity infrastructure with a secure, self-hosted authentication platform that puts you in charge of your most sensitive data. With over 1 million installations worldwide, authentik delivers enterprise-grade identity management without vendor lock-in.

Key advantages:

  • Self-hosted security - No reliance on third-party services for critical infrastructure
  • Complete flexibility - Use pre-built workflows or customize every authentication step through configurable templates
  • Open source transparency - Continuously reviewed code with security prioritized from design to deployment
  • Unified pricing - No feature guessing or extra costs for core functionality

Comprehensive protocol support including OAuth2/OIDC, SAML2, SCIM, LDAP, and RADIUS. Deploy anywhere with Kubernetes, Terraform, and Docker Compose support.

Enterprise features include multi-factor authentication, conditional access, application proxy, WebAuthn passkeys, and GeoIP protection. Perfect for both B2B and B2C use cases with APIs and fully customizable policies for workflow automation.

Features:

Manage users page shows a Session tab where active sessions can be listed and revoked

Client credentials flow is available for machine‑to‑machine authentication using service‑accounts

Brands let you customize the login page’s title, logo, favicon, background image, custom CSS and default flows

Each brand can apply to a specific domain or wildcard domain, enabling different login pages per domain

Event notifications can be delivered to generic HTTP webhooks or Slack/Discord using transport rules

authentik integrates with enterprise services like Google Workspace and Microsoft Entra ID

GeoIP policy includes an impossible travel check that blocks logins from far‑apart locations within a short time window

Password policy checks hashed passwords against the Have I Been Pwned database and uses zxcvbn to enforce password complexity

Conditional access policies and expression policies allow MFA to be required only when certain conditions (location, risk, device) are met

Admin console includes dashboards showing system status, recent logins, authentication events and application usage

User can be imported via API

Enterprise multi‑tenancy enables creation of multiple tenants with separate PostgreSQL schemas. Each tenant can be associated with a domain

Role‑based access control allows administrators to create roles as collections of permissions and assign them to groups to manage access

Administrators can impersonate user profiles and reset passwords through the admin interface

Health endpoints and Prometheus metrics allow monitoring of server, worker and outpost health and can be used with Grafana dashboards

Share:
Details:
View Repository

Similar to authentik:

Secure authentication without the engineering complexity
Drop-in passkeys, adaptive MFA, and passwordless authentication for B2C accounts. Phishing-resistant security with minimal engineering effort.
Full-featured TypeScript authentication in minutes
Open Source
Comprehensive TypeScript authentication framework with email/password, OAuth, 2FA, multi-tenant support, and framework-agnostic design for modern apps.
Open-source IAM platform with comprehensive SSO support
Open Source
UI-first Identity and Access Management platform supporting OAuth 2.0, OIDC, SAML, WebAuthn, MFA, and integration with Google Workspace, Active Directory.
,

Command Menu