TinyAuth logo

Alternatives to TinyAuth

The simplest way to protect your apps with a login screen - authentication middleware for Docker apps Find open source and proprietary alternatives that serve similar purposes.

License:GPL-3.0
Stars:2,267
Pricing:Free
Hosting:Self-Hosted

Self-hosted alternatives to TinyAuth

Open source projects that can replace TinyAuth:

Keycloak logo

Keycloak

27,578
Apache-2.0

Keycloak is a comprehensive open source identity and access management solution that enables organizations to secure modern applications and services with minimal effort. It provides built-in support for authentication, authorization, user management and more.

Key Features

  • Authentication Methods:

    • Username/password login
    • Social login providers
    • Two-factor authentication
    • Single sign-on (SSO)
    • Identity brokering
    • LDAP/Active Directory integration
    • Kerberos support
  • User Management:

    • Self-service registration
    • Password policies
    • User federation
    • Group management
    • Role-based access control
    • User attribute management
  • Security Features:

    • Fine-grained authorization
    • Session management
    • Brute force protection
    • Account security features
    • Token-based authentication
    • TLS support
  • Integration Capabilities:

    • OpenID Connect support
    • SAML 2.0 support
    • OAuth 2.0 flows
    • REST APIs
    • Multiple client adapters
    • Custom extensions

Who Should Use Keycloak

Keycloak is ideal for:

  • Organizations needing centralized authentication
  • Teams building modern applications
  • Enterprises requiring SSO capabilities
  • Projects needing social login integration
  • Deployments requiring strong security
  • Multi-tenant environments

Installation Requirements

  • Java Runtime Environment
  • Database (PostgreSQL recommended)
  • Reverse proxy (optional)
  • Docker support (optional)
  • Sufficient memory (min 512MB RAM)
Authelia logo

Authelia

24,063
Apache-2.0

Authelia is a comprehensive authentication and authorization server that provides single sign-on (SSO) and two-factor authentication for web applications. It integrates with reverse proxies to secure access to your services through a modern web portal.

Key Features

  • Authentication Methods:

    • Username/password authentication
    • Two-factor authentication (2FA)
    • WebAuthn/FIDO2 support
    • Time-based One-Time Passwords (TOTP)
    • Mobile push notifications via Duo
    • Passwordless authentication with Passkeys
  • Access Control:

    • Fine-grained access rules
    • Domain-based policies
    • User/group based restrictions
    • Network-level controls
    • One-factor vs two-factor policy options
  • Integration Capabilities:

    • OpenID Connect 1.0 provider
    • OAuth 2.0 support
    • Reverse proxy compatibility
    • LDAP integration
    • Multiple storage backends
    • REST API access
  • Security Features:

    • Brute force protection
    • Password reset with email verification
    • Session management
    • Secure cookie handling
    • TLS support
    • Security headers

Who Should Use Authelia

Authelia is ideal for:

  • Organizations requiring self-hosted authentication
  • Teams needing SSO capabilities
  • Environments requiring 2FA/MFA
  • Security-conscious deployments
  • Multi-service infrastructures
  • Privacy-focused implementations

Installation Requirements

  • Reverse proxy (nginx, Traefik, etc.)
  • Storage backend (SQL database)
  • SMTP server for notifications
  • Redis (optional, for high availability)
  • Docker (recommended)
Authentik logo

Authentik

16,477
NOASSERTION

Authentik is a versatile open source Identity Provider that emphasizes flexibility in authentication and authorization. It can function as both a standalone identity solution for smaller deployments or scale to replace enterprise identity providers.

Key Features

  • Authentication Methods:

    • Username/password authentication
    • Multi-factor authentication (MFA)
    • Social login providers
    • SAML support
    • OAuth2/OpenID Connect
    • LDAP integration
    • Proxy authentication
  • Authorization Features:

    • Fine-grained access control
    • Policy-based authorization
    • Role-based access control (RBAC)
    • Group management
    • Dynamic authorization rules
    • Attribute-based access control
  • Integration Capabilities:

    • Multiple protocol support
    • Reverse proxy integration
    • API access
    • Outpost system for protocol support
    • Custom flows and stages
    • Extensible architecture
  • Enterprise Features:

    • High availability support
    • Scalable architecture
    • Audit logging
    • Branding customization
    • Self-service capabilities
    • Automated user provisioning

Who Should Use Authentik

Authentik is ideal for:

  • Organizations seeking a self-hosted identity solution
  • Teams requiring flexible authentication flows
  • Enterprises needing SSO capabilities
  • Projects requiring multiple protocol support
  • Privacy-focused implementations
  • Both small and large-scale deployments

Installation Requirements

  • Docker and Docker Compose (for small deployments)
  • Kubernetes (for larger deployments)
  • PostgreSQL database
  • Redis (optional)
  • Reverse proxy (recommended)

Explore by Category

Find more projects in these tags