Go to file
Fabi 5c6df06a7c
feat: auth method query side (#3068)
* feat: queries for searching mfas and passwordless

* feat: tests for user auth method queries

* Update internal/api/grpc/auth/multi_factor.go

Co-authored-by: Livio Amstutz <livio.a@gmail.com>

* Update internal/api/grpc/auth/passwordless.go

Co-authored-by: Livio Amstutz <livio.a@gmail.com>

* Update internal/api/grpc/management/user.go

Co-authored-by: Livio Amstutz <livio.a@gmail.com>

* Update internal/api/grpc/management/user.go

Co-authored-by: Livio Amstutz <livio.a@gmail.com>

Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2022-01-20 13:21:59 +01:00
.codecov
.github Update issue templates task (#2981) 2022-01-12 09:44:32 +01:00
build feat: add stdout and filesystem notification channels (#2925) 2022-01-06 09:00:24 +01:00
cmd fix(query): keys (#2755) 2022-01-12 13:22:04 +01:00
console feat: add confirmation field for user deletion, self warning (#2971) 2022-01-10 11:12:57 +01:00
docs docs: update angular quickstart (#3025) 2022-01-20 10:13:34 +01:00
guides refactor(local): docker compose (#2892) 2021-12-31 18:04:20 +01:00
hack fix: operator picks (#1463) 2021-03-24 10:31:19 +01:00
internal feat: auth method query side (#3068) 2022-01-20 13:21:59 +01:00
k8s/base
migrations feat: auth method projection (#3020) 2022-01-19 14:49:50 +01:00
openapi fix: add api docs and http handler for openapi files (#1526) 2021-04-07 08:23:47 +02:00
operator fix(k8s): new generated crd-definitions for k8s 1.22 (#2843) 2022-01-12 14:53:37 +01:00
pkg fix(k8s): new generated crd-definitions for k8s 1.22 (#2843) 2022-01-12 14:53:37 +01:00
proto/zitadel feat(queries): user grants (#2838) 2022-01-14 09:45:50 +00:00
scripts fix(k8s): new generated crd-definitions for k8s 1.22 (#2843) 2022-01-12 14:53:37 +01:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools chore: align go.mod version for pipeline (#1922) 2021-06-22 15:18:22 +02:00
.dockerignore fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
.gitignore feat: add stdout and filesystem notification channels (#2925) 2022-01-06 09:00:24 +01:00
.releaserc.js chore: rename master to main (#1550) 2021-04-07 16:07:15 +02:00
changelog.config.js
CODE_OF_CONDUCT.md chore(coc): recommend code of conduct (#1782) 2021-05-28 07:38:50 +02:00
CONTRIBUTING.md fix(eventstore): sub queries (#1805) 2021-07-06 13:55:57 +02:00
go.mod fix(query): keys (#2755) 2022-01-12 13:22:04 +01:00
go.sum fix(query): keys (#2755) 2022-01-12 13:22:04 +01:00
LICENSE
README.md docs(readme): Updates readme (#2994) 2022-01-12 15:07:54 +01:00
SECURITY.md refactor: Version 1 2021-04-20 14:04:02 +02:00

Zitadel Logo Zitadel Logo

semantic-release Release license release Go Report Card codecov discord
OpenID Connect Certified

What Is ZITADEL

ZITADEL is a "Cloud Native Identity and Access Management" solution built for the cloud era. ZITADEL uses a modern software stack consisting of Golang, Angular and CockroachDB as sole storage and follows an event sourced pattern.

We built ZITADEL not only with the vision of becoming a great open source project but also as a superb platform to support developers building their applications, without need to handle secure user login and account management themselves.

How Does It Work

We built ZITADEL around the idea that the IAM should be easy to deploy and scale. That's why we tried to reduce external systems as much as possible. For example, ZITADEL is event sourced but it does not rely on a pub/sub system to function. Instead we built all the functionality right into one binary. ZITADEL only needs Kubernetes for orchestration and CockroachDB as storage.

Run ZITADEL anywhere

Self-hosted

You can run an automatically operated ZITADEL instance on a CNCF compliant Kubernetes cluster of your choice:

Software-as-a-Service

  • ZITADEL Cloud: ZITADEL.ch is our shared cloud service hosted in Switzerland. Get started and try the free tier, including already unlimited users and all necessary security features.
  • ZITADEL Dedicated: We operate and support a dedicated instance of ZITADEL for you. Get in touch!

Start using ZITADEL

Quickstarts

See our Documentation to get started with ZITADEL quickly. Let us know, if you are missing a language or framework in the Q&A.

Client libraries

  • Go client library
  • .NET client library
  • Dart client library
  • Elixir client library (maintained by jshmrtn)

Help and Documentation

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Security

See the policy here

Features of ZITADEL platform

  • Authentication
    • OpenID Connect 1.0 Protocol (OP)
    • Username / Password
    • Machine-to-machine (JWT profile)
    • Passwordless with FIDO2
    • Multifactor authentication with OTP, U2F
    • Federation with OpenID Connect 1.0 Protocol (RP), OAuth 2.0 Protocol (RP)
    • Identity Brokering
  • Identity & Access Management
    • B2C, B2B, B2E, M2M identities
    • Authorization via Role Based Access Control (RBAC)
    • Delegation of roles to other organizations for self-management
    • Management roles
    • User self-service workflows
    • User register workflow
  • Strong audit trail for all IAM resources
  • Privatelabeling
    • Custom branding
    • Custom texts
    • Hosted login
    • Personal profile
  • Integration
    • API-first
    • Actions for custom code execution

Showcase

Passwordless Login

Use our login widget to allow easy and sucure access to your applications and enjoy all the benefits of passwordless (FIDO 2 / WebAuthN):

  • works on all modern platforms, devices, and browsers
  • phishing resistant alternative
  • requires only one gesture by the user
  • easy enrollment of the device during registration

passwordless-windows-hello

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Register new applications OIDC-Client-Register

Delegate the right to assign roles to another organization projects_create_org_grant

Customize login and console with your design
private_labeling

Other CAOS Projects

  • ORBOS - GitOps everything
  • OIDC for GO - OpenID Connect SDK (client and server) for Go
  • ZITADEL Tools - Go tool to convert key file to privately signed JWT

Usage Data

ZITADEL components send errors and usage data to CAOS Ltd., so that we are able to identify code improvement potential. If you don't want to send this data or don't have an internet connection, pass the global flag --disable-analytics when using zitadelctl. For disabling ingestion for already-running components, execute the takeoff command again with the --disable-analytics flag.

We try to distinguishing the environments from which events come from. As environment identifier, we enrich the events by the domain you have configured in zitadel.yml, as soon as it's available. When it's not available and you passed the --gitops flag, we defer the environment identifier from your git repository URL.

Besides from errors that don't clearly come from misconfiguration or cli misuage, we send an inital event when any binary is started. This is a " invoked" event along with the flags that are passed to it, except secret values of course.

We only ingest operational data. Your ZITADEL workload data from the IAM application itself is never sent anywhere unless you chose to integrate other systems yourself.

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.