ZITADEL - Identity infrastructure, simplified for you.
Go to file
2022-05-20 14:32:06 +00:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github ci: publish releases (#3647) 2022-05-17 16:06:56 +02:00
build docs: installation (#3646) 2022-05-18 12:42:13 +00:00
cmd chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
console chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
deploy/compose docs: clearer masterkey, config iam admin (#3670) 2022-05-19 13:59:11 +00:00
docs chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
guides chore(ci): release pipeline for v2 (#3197) 2022-02-14 14:35:16 +00:00
internal chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
openapi chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
pkg/grpc chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
proto/zitadel chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
.dockerignore chore(ci): release pipeline for v2 (#3197) 2022-02-14 14:35:16 +00:00
.gitignore feat: System api (#3461) 2022-04-21 12:37:39 +02:00
.goreleaser.yaml chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
.releaserc.js ci: publish releases (#3647) 2022-05-17 16:06:56 +02:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
CONTRIBUTING.md docs: V2 alpha readme (#3669) 2022-05-20 14:20:31 +00:00
go.mod chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
go.sum chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
main.go feat: improve console caching and provide build info (#3621) 2022-05-13 14:06:44 +02:00
README.md docs: V2 alpha readme (#3669) 2022-05-20 14:20:31 +00:00
SECURITY.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00

Zitadel Logo Zitadel Logo

You want auth that's quickly set up like Auth0 but open source like Keycloak? Look no further— ZITADEL combines the ease of Auth0 and the versatility of Keycloak.

We provide a wide range of out of the box features like secure login, self-service, OpenID Connect, OAuth2.x, SAML2, branding, Passwordless with FIDO2, OTP, U2F, and an unlimited audit trail to improve the life of developers. Especially noteworthy is that ZITADEL supports not only B2C and B2E scenarios but also B2B. This is super useful for people who build B2B Solutions, as ZITADEL can handle all the delegated user and access management.

With ZITADEL you rely on a battle tested, hardened and extensible turnkey solution to solve all of your authentication and authorization needs. With the unique way of how ZITADEL stores data it gives you an unlimited audit trail which provides a peace of mind for even the harshest audit and analytics requirements.


🏡 Website 💬 Chat 📋 Docs 🧑‍💻 Blog 📞 Contact

Get started

ZITADEL Cloud

The easiest way to get started with ZITADEL is to use our public cloud offering. Subscribe to our newsletter and we will be in touch with you as soon as the public release is live.

You can also discovery our new pay-as-you-go pricing.

Install ZITADEL

Quickstarts - Integrate your app

If you miss something please feel free to engage with us here

Why ZITADEL

Features

Client libraries

Language Client API Machine auth (*) Auth check (**) Thanks to the maintainers
.NET zitadel-net GRPC ✔️ ✔️ buehler 👑
Dart zitadel-dart GRPC ✔️ buehler 👑
Elixir zitadel_api GRPC ✔️ ✔️ jshmrtn 🙏🏻
Go zitadel-go GRPC ✔️ ✔️ ZITADEL
Rust zitadel-rust GRPC ✔️ buehler 👑
JVM 🚧 WIP TBD
Python 🚧 WIP TBD
Javascript Maybe you?

(*) Automatically authenticate service accounts with JWT Profile.
(**) Automatically check if the access token is valid and claims match

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Showcase

Passwordless Login

Use our login widget to allow easy and secure access to your applications and enjoy all the benefits of passwordless (FIDO 2 / WebAuthN):

  • works on all modern platforms, devices, and browsers
  • phishing resistant alternative
  • requires only one gesture by the user
  • easy enrollment of the device during registration

passwordless-windows-hello

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Register new applications OIDC-Client-Register

Delegate the right to assign roles to another organization projects_create_org_grant

Customize login and console with your design
private_labeling

Usage Data

ZITADEL components send errors and usage data to CAOS Ltd., so that we are able to identify code improvement potential. If you don't want to send this data or don't have an internet connection, pass the global flag --disable-analytics when using zitadelctl. For disabling ingestion for already-running components, execute the takeoff command again with the `` flag.

We try to distinguishing the environments from which events come from. As environment identifier, we enrich the events by the domain you have configured in zitadel.yml, as soon as it's available. When it's not available and you passed the --gitops flag, we defer the environment identifier from your git repository URL.

Besides from errors that don't clearly come from misconfiguration or cli misuage, we send an inital event when any binary is started. This is a " invoked" event along with the flags that are passed to it, except secret values of course.

We only ingest operational data. Your ZITADEL workload data from the IAM application itself is never sent anywhere unless you chose to integrate other systems yourself.

Security

See the policy here

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.