Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Hydra | 14,629 | 9 | 6 days ago | 1 | May 08, 2019 | 92 | apache-2.0 | Go | ||
OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid. | ||||||||||
Netflix Proxy | 3,523 | 7 months ago | 6 | mit | Python | |||||
Smart DNS proxy to watch Netflix | ||||||||||
Portus | 2,980 | 10 months ago | 156 | apache-2.0 | Ruby | |||||
Authorization service and frontend for Docker registry (v2) | ||||||||||
Login With | 2,293 | 2 | 2 years ago | 9 | August 08, 2018 | 35 | mit | JavaScript | ||
Stateless login-with microservice for OAuth | ||||||||||
Starhackit | 1,288 | 4 | a month ago | 20 | September 22, 2016 | 9 | unlicense | JavaScript | ||
StarHackIt: React/Native/Node fullstack starter kit with authentication and authorisation, data backed by SQL, the infrastructure deployed with GruCloud | ||||||||||
Authorizer | 1,273 | 10 hours ago | 75 | mit | Go | |||||
Your data, your control. Fully open source, authentication and authorization. No lock-ins. Deployment in Railway in 120 seconds || Spin a docker image as a micro-service in your infra. Built in login page and Admin panel out of the box. | ||||||||||
Docker_auth | 1,187 | 1 | a month ago | 3 | March 10, 2021 | 55 | apache-2.0 | Go | ||
Authentication server for Docker Registry 2 | ||||||||||
Sso | 710 | 6 years ago | 12 | mit | Java | |||||
cas单点登录系统,其中包括cas认证服务,配置中心,监控平台,服务管理的高可用项目 | ||||||||||
Express Mongodb Rest Api Boilerplate | 448 | 4 months ago | 3 | mit | TypeScript | |||||
A boilerplate for Node.js apps / Rest API / Authentication from scratch - express, mongodb (mongoose). Typescript | ||||||||||
Actix Web Rest Api With Jwt | 441 | 5 months ago | 5 | mit | Rust | |||||
A simple CRUD backend app using Actix-web, Diesel and JWT |
Authorizer is an open-source authentication and authorization solution for your applications. Bring your database and have complete control over the user information. You can self-host authorizer instances and connect to any database (Currently supports 11+ databases including Postgres, MySQL, SQLite, SQLServer, YugaByte, MariaDB, PlanetScale, CassandraDB, ScyllaDB, MongoDB, ArangoDB).
For more information check:
Deploy production ready Authorizer instance using one click deployment options available below
Infra provider | One-click link | Additional information |
---|---|---|
Railway.app | docs | |
Heroku | docs | |
Render | docs | |
Koyeb | docs |
This guide helps you practice using Authorizer to evaluate it before you use it in a production environment. It includes instructions for installing the Authorizer server in local or standalone mode.
git clone https://github.com/authorizerdev/authorizer.git
or use the forked url from step 1cd authorizer
cp .env.sample .env
. Check all the supported env here
make build-dashboard
make build-app
make clean && make
Note: if you don't have
make
, you cancd
intoserver
dir and build using thego build
command. In that case you will have to builddashboard
&app
manually usingnpm run build
on both dirs.
./build/server
Deploy / Try Authorizer using binaries. With each Authorizer Release binaries are baked with required deployment files and bundled. You can download a specific version of it for the following operating systems:
Note: For windows, we recommend running using docker image to run authorizer.
Unzip using following command
tar -zxf AUTHORIZER_VERSION -c authorizer
Change directory to authorizer
cd authorizer
Run following command to start authorizer
./build/server
Note: For mac users, you might have to give binary the permission to execute. Here is the command you can use to grant permission
xattr -d com.apple.quarantine build/server
Note:
DATABASE_URL
,DATABASE_TYPE
andDATABASE_NAME
are only configurable via platform envs
Note: One can always disable the email verification to allow open sign up, which is not recommended for production as anyone can use anyone's email address
This example demonstrates how you can use @authorizerdev/authorizer-js
CDN version and have login ready for your site in few seconds. You can also use the ES module version of @authorizerdev/authorizer-js
or framework-specific versions like @authorizerdev/authorizer-react
html
fileNote: Change AUTHORIZER_URL in the below code with your authorizer URL. Also, you can change the logout button component
<script src="https://unpkg.com/@authorizerdev/authorizer-js/lib/authorizer.min.js"></script>
<script type="text/javascript">
const authorizerRef = new authorizerdev.Authorizer({
authorizerURL: `YOUR_AUTHORIZER_INSTANCE_URL`,
redirectURL: window.location.origin,
clientID: 'YOUR_CLIENT_ID', // obtain your client id from authorizer dashboard
});
// use the button selector as per your application
const logoutBtn = document.getElementById('logout');
logoutBtn.addEventListener('click', async function () {
await authorizerRef.logout();
window.location.href = '/';
});
async function onLoad() {
const res = await authorizerRef.authorize({
response_type: 'code',
use_refresh_token: false,
});
if (res && res.access_token) {
// you can use user information here, eg:
const user = await authorizerRef.getProfile({
Authorization: `Bearer ${res.access_token}`,
});
const userSection = document.getElementById('user');
const logoutSection = document.getElementById('logout-section');
logoutSection.classList.toggle('hide');
userSection.innerHTML = `Welcome, ${user.email}`;
}
}
onLoad();
</script>