Replace
Take control of your identity needs with a secure, flexible solution.
Own your data
No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet.
Flexible and scalable
Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.
Security through transparency
Open source code is continuously reviewed by experts in the community, and we prioritize security from design to code, testing, and maintenance.
Streamlined pricing
No more guessing if a feature is included or paying extra for core functionality. Covers both B2B and B2C use cases.
Why authentik?
Using a self-hosted, open source identity provider means prioritizing security and taking control of your most sensitive data. With authentik, you no longer need to continually place your trust in a third-party service.
Automate and simplify
Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose.
Customer Highlight
Do more with authentik
authentik | Keycloak | Microsoft ADFS | Azure/Entra ID | Okta | Duo | Authelia | |
---|---|---|---|---|---|---|---|
Capabilities included | |||||||
Self-host anywhere | |||||||
MFA ⓘ | |||||||
Conditional Access | |||||||
Open-source/Source available | |||||||
Application Proxy ⓘ | |||||||
Enterprise support ⓘ | |||||||
Protocol Support (as a provider) | |||||||
SAML2 | |||||||
OAuth2 and OIDC | |||||||
SCIM | |||||||
LDAP | |||||||
RADIUS | |||||||
Federation support | |||||||
SAML2 | |||||||
OAuth2 and OIDC | |||||||
OAuth1 | |||||||
LDAP | |||||||
SCIM | |||||||
Kerberos | |||||||
Use cases | |||||||
Authentication | |||||||
Enrollment | |||||||
Self-service |