ZITADEL - Identity infrastructure, simplified for you.
Go to file
Stefan Benz bc9a85daf3
feat: V2 alpha import and export of organizations (#3798)
* feat(import): add functionality to import data into an instance

* feat(import): move import to admin api and additional checks for nil pointer

* fix(export): export implementation with filtered members and grants

* fix: export and import implementation

* fix: add possibility to export hashed passwords with the user

* fix(import): import with structure of v1 and v2

* docs: add v1 proto

* fix(import): check im imported user is already existing

* fix(import): add otp import function

* fix(import): add external idps, domains, custom text and messages

* fix(import): correct usage of default values from login policy

* fix(export): fix renaming of add project function

* fix(import): move checks for unit tests

* expect filter

* fix(import): move checks for unit tests

* fix(import): move checks for unit tests

* fix(import): produce prerelease from branch

* fix(import): correctly use provided user id for machine user imports

* fix(import): corrected otp import and added guide for export and import

* fix: import verified and primary domains

* fix(import): add reading from gcs, s3 and localfile with tracing

* fix(import): gcs and s3, file size correction and error logging

* Delete docker-compose.yml

* fix(import): progress logging and count of resources

* fix(import): progress logging and count of resources

* log subscription

* fix(import): incorporate review

* fix(import): incorporate review

* docs: add suggestion for import

Co-authored-by: Fabi <38692350+hifabienne@users.noreply.github.com>

* fix(import): add verification otp event and handling of deleted but existing users

Co-authored-by: Livio Amstutz <livio.a@gmail.com>
Co-authored-by: Fabienne <fabienne.gerschwiler@gmail.com>
Co-authored-by: Silvan <silvan.reusser@gmail.com>
Co-authored-by: Fabi <38692350+hifabienne@users.noreply.github.com>
2022-07-28 13:42:35 +00:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github chore: Update issue templates (#3979) 2022-07-18 19:30:19 +00:00
build feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
cmd feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
console fix: project grants (#4031) 2022-07-27 07:55:44 +00:00
deploy/knative fix: clarify instances in steps and config (#4003) 2022-07-27 10:22:20 +02:00
docs feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
guides feat: Configurable Unique Machine Identification (#3626) 2022-05-24 16:57:57 +02:00
internal feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
openapi chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
pkg/grpc fix: project grants (#4031) 2022-07-27 07:55:44 +00:00
proto/zitadel feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
.dockerignore chore(ci): release pipeline for v2 (#3197) 2022-02-14 14:35:16 +00:00
.gitignore feat: System api (#3461) 2022-04-21 12:37:39 +02:00
.goreleaser.yaml chore: speed up build (#4017) 2022-07-25 11:54:05 +00:00
.releaserc.js feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
CONTRIBUTING.md chore: How to contribute translations (#3689) 2022-05-24 09:47:38 +02:00
go.mod feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
go.sum feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
main.go feat: improve console caching and provide build info (#3621) 2022-05-13 14:06:44 +02:00
README.md fix: scheduling (#3978) 2022-07-22 10:08:39 +00:00
SECURITY.md chore: various typos (#3686) 2022-05-21 10:44:09 +00:00

Zitadel Logo Zitadel Logo

You want auth that's quickly set up like Auth0 but open source like Keycloak? Look no further— ZITADEL combines the ease of Auth0 and the versatility of Keycloak.

We provide a wide range of out of the box features like secure login, self-service, OpenID Connect, OAuth2.x, SAML2, branding, Passwordless with FIDO2, OTP, U2F, and an unlimited audit trail to improve the life of developers. Especially noteworthy is that ZITADEL supports not only B2C and B2E scenarios but also B2B. This is super useful for people who build B2B Solutions, as ZITADEL can handle all the delegated user and access management.

With ZITADEL you rely on a battle tested, hardened and extensible turnkey solution to solve all of your authentication and authorization needs. With the unique way of how ZITADEL stores data it gives you an unlimited audit trail which provides a peace of mind for even the harshest audit and analytics requirements.


🏡 Website 💬 Chat 📋 Docs 🧑‍💻 Blog 📞 Contact

Get started

ZITADEL Cloud (SaaS)

The easiest way to get started with ZITADEL is to use our public cloud offering. Currently ZITADEL V2 Beta is available, head over to https://zitadel.cloud and create your first ZITADEL instance for free.

You can also discover our pay-as-you-go pricing.

Install ZITADEL

Quickstarts - Integrate your app

If you miss something please feel free to engage with us here

Why ZITADEL

Features

Client libraries

Language Client API Machine auth (*) Auth check (**) Thanks to the maintainers
.NET zitadel-net GRPC ✔️ ✔️ buehler 👑
Dart zitadel-dart GRPC ✔️ buehler 👑
Elixir zitadel_api GRPC ✔️ ✔️ jshmrtn 🙏🏻
Go zitadel-go GRPC ✔️ ✔️ ZITADEL
Rust zitadel-rust GRPC ✔️ buehler 👑
JVM 🚧 WIP TBD
Python 🚧 WIP TBD
Javascript Maybe you?

(*) Automatically authenticate service accounts with JWT Profile.
(**) Automatically check if the access token is valid and claims match

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Contributors

Made with contrib.rocks.

Showcase

Passwordless Login

Use our login widget to allow easy and secure access to your applications and enjoy all the benefits of passwordless (FIDO 2 / WebAuthN):

  • works on all modern platforms, devices, and browsers
  • phishing resistant alternative
  • requires only one gesture by the user
  • easy enrollment of the device during registration

passwordless-windows-hello

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Register new applications OIDC-Client-Register

Delegate the right to assign roles to another organization projects_create_org_grant

Customize login and console with your design
private_labeling

Security

See the policy here

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.