ZITADEL - Identity infrastructure, simplified for you.
Go to file
Fabi 2502f379d9
fix: add missing custom message text requests (#1851)
* fix: add missing requests

* fix: test
2021-06-11 07:31:00 +00:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github chore(deps): bump github.com/nicksnyder/go-i18n/v2 from 2.1.1 to 2.1.2 (#1334) 2021-06-01 07:45:59 +02:00
build fix: label policy (#1828) 2021-06-08 09:48:44 +02:00
cmd feat: custom message text (#1801) 2021-06-10 11:49:10 +00:00
console feat: custom message text (#1801) 2021-06-10 11:49:10 +00:00
docs fix: add missing custom message text requests (#1851) 2021-06-11 07:31:00 +00:00
guides chore(contribute): add step by step guide (#1754) 2021-06-01 09:55:08 +02:00
hack fix: operator picks (#1463) 2021-03-24 10:31:19 +01:00
internal fix: add missing custom message text requests (#1851) 2021-06-11 07:31:00 +00:00
k8s/base fix: add arg and probes to deployment (#605) 2020-08-18 14:22:53 +02:00
migrations feat: custom message text (#1801) 2021-06-10 11:49:10 +00:00
openapi fix: add api docs and http handler for openapi files (#1526) 2021-04-07 08:23:47 +02:00
operator fix: label policy (#1828) 2021-06-08 09:48:44 +02:00
pkg feat(operator): make running ZITADEL easy (#1562) 2021-04-22 16:43:34 +00:00
proto/zitadel fix: add missing custom message text requests (#1851) 2021-06-11 07:31:00 +00:00
scripts feat(operator): make running ZITADEL easy (#1562) 2021-04-22 16:43:34 +00:00
tools docs: generate admin api (#1584) 2021-04-15 18:21:46 +02:00
.dockerignore chore(pipeline): change caching keys (#1651) 2021-04-23 09:40:13 +02:00
.gitignore fix: add api docs and http handler for openapi files (#1526) 2021-04-07 08:23:47 +02:00
.releaserc.js chore: rename master to main (#1550) 2021-04-07 16:07:15 +02:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore(coc): recommend code of conduct (#1782) 2021-05-28 07:38:50 +02:00
CONTRIBUTING.md chore(contribute): add step by step guide (#1754) 2021-06-01 09:55:08 +02:00
go.mod fix: label policy (#1828) 2021-06-08 09:48:44 +02:00
go.sum fix: label policy (#1828) 2021-06-08 09:48:44 +02:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
README.md docs: update run and start section texts (#1745) 2021-05-19 09:47:16 +02:00
SECURITY.md refactor: Version 1 2021-04-20 14:04:02 +02:00

Zitadel Logo

semantic-release Release license release Go Report Card codecov

What Is ZITADEL

ZITADEL is a "Cloud Native Identity and Access Management" solution built for the cloud era. ZITADEL uses a modern software stack consisting of Golang, Angular and CockroachDB as sole storage and follows an event sourced pattern.

We built ZITADEL not only with the vision of becoming a great open source project but also as a superb platform to support developers building their applications, without need to handle secure user login and account management themselves.

How Does It Work

We built ZITADEL around the idea that the IAM should be easy to deploy and scale. That's why we tried to reduce external systems as much as possible. For example, ZITADEL is event sourced but it does not rely on a pub/sub system to function. Instead we built all the functionality right into one binary. ZITADEL only needs Kubernetes for orchestration and CockroachDB as storage.

Features of ZITADEL platform

  • Authentication
    • OpenID Connect 1.0 Protocol (OP)
    • Username / Password
    • Machine-to-machine (JWT profile)
    • Passwordless with FIDO2
  • Multifactor authentication with OTP, U2F
  • Federation with OpenID Connect 1.0 Protocol (RP), OAuth 2.0 Protocol (RP)
  • Authorization via Role Based Access Control (RBAC)
  • Identity Brokering
  • Delegation of roles to other organizations for self-management
  • Strong audit trail for all IAM resources
  • User interface for administration
  • APIs for Management, Administration, and Authentication
  • Policy configuration and enforcement

Run ZITADEL anywhere

Self-Managed

You can run an automatically operated ZITADEL instance on a CNCF compliant Kubernetes cluster of your choice:

CAOS-Managed

  • ZITADEL Cloud: ZITADEL.ch is our shared cloud service hosted in Switzerland. Get started and try the free tier, including already unlimited users and all necessary security features.
  • ZITADEL Enterprise: We operate and support a private instance of ZITADEL for you. Get in touch!

Start using ZITADEL

Quickstarts

See our Documentation to get started with ZITADEL quickly. Let us know, if you are missing a language or framework in the Q&A.

Client libraries

  • Go client library
  • .NET client library
  • Dart client library

Help and Documentation

Showcase

Passwordless Login

Use our login widget to allow easy and sucure access to your applications and enjoy all the benefits of passwordless (FIDO 2 / WebAuthN):

  • works on all modern platforms, devices, and browsers
  • phishing resistant alternative
  • requires only one gesture by the user
  • easy enrollment of the device during registration

passwordless-windows-hello passwordless-iphone

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Register new applications OIDC-Client-Register

Delegate the right to assign roles to another organization projects_create_org_grant

How To Contribute

Details need to be announced, but feel free to contribute already. As long as you are okay with accepting to contribute under this projects OSS License you are fine.

Security

See the policy here

Other CAOS Projects

  • ORBOS - GitOps everything
  • OIDC for GO - OpenID Connect SDK (client and server) for Go
  • ZITADEL Tools - Go tool to convert key file to privately signed JWT

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.