What is Authelia?
It is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion of reverse proxies like nginx, Traefik or HAProxy to let them know whether queries should pass through. Unauthenticated users are redirected to Authelia Sign-in portal instead.
Authelia is a tool in the User Management and Authentication category of a tech stack.
Authelia is an open source tool with GitHub stars and GitHub forks. Here’s a link to Authelia's open source repository on GitHub
Who uses Authelia?
Docker, NGINX, Kubernetes, HAProxy, and Traefik are some of the popular tools that integrate with Authelia. Here's a list of all 5 tools that integrate with Authelia.
- Several second factor methods
- Password reset with identity verification using email confirmation
- Single-factor only authentication method available
- Access restriction after too many authentication attempts
- Fine-grained access control per subdomain, user, resource and network
- Support of basic authentication for endpoints protected by single factor
- Beta support for OpenID Connect
- Highly available using a remote database and Redis as a highly available KV store
- Compatible with Kubernetes ingress-nginx controller out of the box
Authelia Alternatives & Comparisons
What are some alternatives to Authelia?
See all alternatives
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
JSON Web Token
JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.
You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.
It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.
No related comparisons found