ZITADEL - Identity infrastructure, simplified for you.
Go to file
Max Peintner 97fe041a86
docs: add tailwindcss for styles, oidc authorize endpoint playground (#4707)
* variable parser

* rm plugin

* set fcn

* env

* EnvCode component

* cleanup env demo

* env

* rm remark plugin

* auth request context

* auth req component

* authorize endpoint construction

* rev react page

* fix endpoint

* styling

* query params with anchor

* desc

* tailwind coexistence

* fix styles

* add login_hint, organizationId scope

* auth request without prompt

* show login_hint

* sync displayed url with actual href

* fix fcn

* coloring

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* Update docs/src/components/authrequest.jsx

Co-authored-by: mffap <mpa@zitadel.com>

* add plausible, header

* add pkce

* move

* adds pkce code challenge

* replace cboa

* reaname and move to required

* fall back to cboa due to webpack error

* trailing slash

* reorder org_id

* remove resourceowner

* texts

* update references

* buffer, fix some react dom components

* Apply suggestions from code review

Co-authored-by: Florian Forster <florian@zitadel.com>

* standard scopes

Co-authored-by: mffap <mpa@zitadel.com>
Co-authored-by: Florian Forster <florian@zitadel.com>
2022-12-05 18:36:12 +01:00
.artifacts/zitadel ci(e2e): Run Tests in Pipelines (#3903) 2022-08-05 20:00:46 +02:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github docs: Update BUG_REPORT.yaml (#4793) 2022-11-30 18:46:50 +00:00
build chore: cockroach version (#4775) 2022-12-02 09:42:27 +00:00
cmd fix(database): create column only if not exists (#4812) 2022-12-02 10:48:39 +00:00
console fix(console): fix login text ref (#4806) 2022-12-01 15:59:16 +00:00
deploy/knative docs: normalised versions and explained releases (#4119) 2022-08-08 14:04:46 +00:00
docs docs: add tailwindcss for styles, oidc authorize endpoint playground (#4707) 2022-12-05 18:36:12 +01:00
e2e feat: allow disabling the mfa setup prompt (#4575) 2022-10-26 10:20:01 +02:00
internal fix: correct where statement for AppByOIDCClientID (#4815) 2022-12-02 13:15:09 +00:00
openapi chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
pkg/grpc feat(actions): add token customization flow and extend functionally with modules (#4337) 2022-10-06 14:23:59 +02:00
proto/zitadel feat: remove org (#4148) 2022-11-30 17:01:17 +01:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
.dockerignore chore(ci): release pipeline for v2 (#3197) 2022-02-14 14:35:16 +00:00
.gitignore fix(auth): always get token by id and user id (#4371) 2022-09-15 12:59:40 +00:00
.golangci.yaml feat: save last occurrence of failed events and fix instance filtering (#4710) 2022-11-18 13:49:38 +01:00
.goreleaser.yaml fix(login): improve multifactor prompt (#4474) 2022-10-03 13:48:24 +02:00
.releaserc.js fix: reduce load on view tables (#4716) 2022-11-22 07:36:48 +01:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
CONTRIBUTING.md docs: Product management (#4715) 2022-11-24 09:44:53 +01:00
go.mod chore: cockroach version (#4775) 2022-12-02 09:42:27 +00:00
go.sum chore: cockroach version (#4775) 2022-12-02 09:42:27 +00:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
main.go feat: improve console caching and provide build info (#3621) 2022-05-13 14:06:44 +02:00
README.md chore: openSSF badge (#4686) 2022-11-10 15:16:09 +01:00
release-channels.yaml update stable release to 2.8.2 (#4574) 2022-10-19 11:58:56 +02:00
SECURITY.md chore: Update Security policy (#4350) 2022-09-11 15:09:22 +02:00

Zitadel Logo Zitadel Logo

Do you look for a user management that's quickly set up like Auth0 and open source like Keycloak?

Do you have project that requires a multi-tenant user management with self-service for your customers?

Look no further — ZITADEL combines the ease of Auth0 with the versatility of Keycloak.

We provide you with a wide range of out of the box features to accelerate your project. Multi-tenancy with branding customization, secure login, self-service, OpenID Connect, OAuth2.x, SAML2, Passwordless with FIDO2 (including Passkeys), OTP, U2F, and an unlimited audit trail is there for you, ready to use.

With ZITADEL you can rely on a hardened and extensible turnkey solution to solve all of your authentication and authorization needs.


🏡 Website 💬 Chat 📋 Docs 🧑‍💻 Blog 📞 Contact

Get started

Deploy ZITADEL (Self-Hosted)

Deploying ZITADEL locally takes less than 3 minutes. So go ahead and give it a try!

See all guides here

If you are interested to get professional support for your self-hosted ZITADEL please reach out to us!

Setup ZITADEL Cloud (SaaS)

If you want to experience a hands-free ZITADEL, you should use ZITADEL Cloud.

It is free for up to 25'000 authenticated requests and provides you all the features that make ZITADEL great. Learn more about the pay-as-you-go pricing.

Why choose ZITADEL

We built ZITADEL with a complex multi-tenancy architecture in mind and provide the best solution to handle B2B customers and partners. Yet it offers everything you need for a customer identity (CIAM) use case.

Features

Track upcoming features on our roadmap.

Integrate your application

Quickstarts

Get started with your preferred language with our Quickstarts.

If you miss something please feel free to join the Discussion

Example applications

Clone one of our example applications or deploy them directly to Vercel.

OpenID Connect RP Libraries

Use any of the Open ID Connect certified RP implementations in your preferred language. As certified OpenID Provider, ZITADEL is compatible with any of the implementations.

Client libraries

Language / Framework Client API Machine auth (*) Auth check (**) Thanks to the maintainers
.NET zitadel-net GRPC ✔️ ✔️ smartive 👑
Dart zitadel-dart GRPC ✔️ smartive 👑
Elixir zitadel_api GRPC ✔️ ✔️ jshmrtn 🙏🏻
Go zitadel-go GRPC ✔️ ✔️ ZITADEL
Rust zitadel-rust GRPC ✔️ smartive 👑
JVM 🚧 WIP TBD
Python 🚧 WIP TBD
Javascript Maybe you?

(*) Automatically authenticate service accounts with JWT Profile.
(**) Automatically check if the access token is valid and claims match

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Contributors

Made with contrib.rocks.

Showcase

Passwordless Login

Use our login widget to allow easy and secure access to your applications and enjoy all the benefits of passwordless (FIDO 2 / WebAuthN):

  • works on all modern platforms, devices, and browsers
  • phishing resistant alternative
  • requires only one gesture by the user
  • easy enrollment of the device during registration

passwordless-windows-hello

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Console Showcase

Security

See the policy here

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.