ZITADEL - Identity infrastructure, simplified for you.
Go to file
2023-05-11 11:53:52 +02:00
.artifacts/zitadel ci(e2e): Run Tests in Pipelines (#3903) 2022-08-05 20:00:46 +02:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github docs: remove tasklist (#5806) 2023-05-05 12:22:39 +00:00
build feat(api): new settings service (#5775) 2023-05-11 09:23:40 +00:00
cmd fix(step11): execute step 10 to make sure events are in correct order 2023-05-11 11:53:52 +02:00
console feat(console): device code (#5771) 2023-05-11 08:18:14 +00:00
deploy/knative feat(admin-api): list events (#4989) 2023-01-16 11:30:03 +00:00
docs feat(api): new settings service (#5775) 2023-05-11 09:23:40 +00:00
e2e feat(console): device code (#5771) 2023-05-11 08:18:14 +00:00
internal feat(api): new settings service (#5775) 2023-05-11 09:23:40 +00:00
openapi chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
pkg/grpc feat(api): new session service (#5801) 2023-05-05 15:34:53 +00:00
proto feat(api): new settings service (#5775) 2023-05-11 09:23:40 +00:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools feat: user v2alpha email API (#5708) 2023-04-25 09:02:29 +02:00
.dockerignore docs: improve api docs (#5158) 2023-02-23 18:08:06 +07:00
.gitignore docs: improve api docs (#5158) 2023-02-23 18:08:06 +07:00
.golangci.yaml feat: add quotas (#4779) 2023-02-15 02:52:11 +01:00
.goreleaser.yaml chore(console): buf stub build (#5215) 2023-02-17 14:09:11 +00:00
.releaserc.js chore: merge (#5773) 2023-04-28 14:56:51 +00:00
buf.work.yaml chore(console): buf stub build (#5215) 2023-02-17 14:09:11 +00:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
CONTRIBUTING.md docs(contrib): fix headings, add embedded code (#5752) 2023-05-04 16:03:07 +02:00
go.mod feat(api): new session service (#5801) 2023-05-05 15:34:53 +00:00
go.sum feat: device authorization RFC 8628 (#5646) 2023-04-19 08:46:02 +00:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
main.go chore: test server for direct resource access 2023-04-24 20:40:31 +03:00
README.md docs(readme): update features (#5676) 2023-04-13 10:34:01 +02:00
release-channels.yaml chore: update stable to 2.21.3 (#5514) 2023-03-29 14:07:23 +00:00
SECURITY.md docs: update security policies (#5452) 2023-03-16 08:52:12 +01:00
yarn.lock docs: fix preview link (#4965) 2023-01-03 10:14:13 +00:00

Zitadel Logo Zitadel Logo

Do you look for a user management that's quickly set up like Auth0 and open source like Keycloak?

Do you have project that requires a multi-tenant user management with self-service for your customers?

Look no further — ZITADEL combines the ease of Auth0 with the versatility of Keycloak.

We provide you with a wide range of out of the box features to accelerate your project. Multi-tenancy with branding customization, secure login, self-service, OpenID Connect, OAuth2.x, SAML2, LDAP, Passwordless with FIDO2 (including Passkeys), OTP, U2F, and an unlimited audit trail is there for you, ready to use.

With ZITADEL you can rely on a hardened and extensible turnkey solution to solve all of your authentication and authorization needs.


🏡 Website 💬 Chat 📋 Docs 🧑‍💻 Blog 📞 Contact

Get started

👉 Quick Start Guide

Deploy ZITADEL (Self-Hosted)

Deploying ZITADEL locally takes less than 3 minutes. So go ahead and give it a try!

See all guides here

If you are interested to get professional support for your self-hosted ZITADEL please reach out to us!

Setup ZITADEL Cloud (SaaS)

If you want to experience a hands-free ZITADEL, you should use ZITADEL Cloud.

It is free for up to 25'000 authenticated requests and provides you all the features that make ZITADEL great. Learn more about the pay-as-you-go pricing.

Example applications

Clone one of our example applications or deploy them directly to Vercel.

SDKs

Use our SDKs for your favorite language and framework.

Why choose ZITADEL

We built ZITADEL with a complex multi-tenancy architecture in mind and provide the best solution to handle B2B customers and partners. Yet it offers everything you need for a customer identity (CIAM) use case.

Features

Authentication

Multi-Tenancy

Integration

  • GRPC and REST APIs
  • Actions to call any API, send webhooks, adjust workflows, or customize tokens
  • Role Based Access Control (RBAC)

Self-Service

Deployment

Track upcoming features on our roadmap.

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Contributors

Made with contrib.rocks.

Showcase

Quick Start Guide

Secure a React Application using OpenID Connect Authorization Code with PKCE

Quick Start Guide

Login with Passkeys

Use our login widget to allow easy and secure access to your applications and enjoy all the benefits of Passkeys (FIDO 2 / WebAuthN):

Passkeys

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Console Showcase

Security

See the policy here

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.