A new open-source Single Sign-On (SSO) provider designed to simplify user and access management.

Features:

  • 🙋‍♂️ User Management
  • 🌐 OpenID Connect (OIDC) Provider
  • 🔀 Proxy ForwardAuth Domains
  • 📧 User Registration and Invitations
  • 🔑 Passkey Support
  • 🔐 Secure Password Reset with Email Verification
  • 🎨 Custom Branding Options

Screenshot of the login portal:

  • Hawk@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 hours ago

    Definitely giving this a go, seems exactly what I’ve been looking for for my small self hosted stack.

    • notquitenothing@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      If you run into any issue during setup let me know! I am still working on the documentation so hopefully it is somewhat understandable 😆

  • eldereko@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    6
    ·
    20 hours ago

    the Postgres requirement is a dealbreaker for me. I don’t get why all these “simple” self-hosted apps need a bloated database. how many users is a self-hoster going to have, maybe 1-10? SQLite can easily handle thousands. I’m currently using Authelia, and it even has a database-less YAML option for managing users

    • notquitenothing@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      19
      ·
      edit-2
      19 hours ago

      I do agree. I have been thinking about adding a SQLite option which should be somewhat easy since knex (the database package that VoidAuth uses) supports it. Before releasing that I would want to create some way to migrate your data from one database type to another. If you want to use VoidAuth feel free to make an issue for this!

      • Zelaf@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        5
        ·
        19 hours ago

        Having run minor projects using PocketBase before and also seen what PocketBase itself can do and SQLite configured correctly in general, It’s great. I’ve gotten to be a big fan of it by the years and gladly opt for it over the bigger ones.

        If this project got SQLite support it would be a great replacement for my own setup which requires about 3 or 4 accounts. Currently using a proprietary solution and been looking into moving to Authentik but it’s a bit too heavy resource wise for my current servers.

        • notquitenothing@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          10
          ·
          18 hours ago

          I will make an issue for adding SQLite support, it has been on my mind for the same reasons. I would say don’t let the Postgres requirement stop you from trying it out. Modern hardware really doesn’t mind having multiple containerized postgresdb instances running, it can be very lightweight when idle.

            • lambalicious@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              3 hours ago

              It does mean a form of provider lock-in, which is or can be its own issue. Also, while PostgreSQL is one of the best database engines out there among the FOSS stuff, it is verifiably and vastly overblown for stuff like “store a name and a email”, and I at least am not aware of any sort of “Postgres Lite” engines else I’d be using them at work.

              • illusionist@lemmy.zip
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                37 minutes ago

                How does it lock you in? You, the admin, has full control over postgres. Sqlite has no security features. Does it store passwords? Sqlite also locks the database which is usually OK if there are no concurrent jobs. But for such services it sounds like a bad idea to use sqlite. (I am no server/app dev)

        • Kay Ohtie@pawb.social
          link
          fedilink
          English
          arrow-up
          1
          ·
          18 hours ago

          Yeah, I use Authentik currently and the main reason is simplicity of having it with LDAP. But I’ve considered running something else backed by FreeIPA to get more compatibility for LDAP. I feel like I have to fight to get something to work with it.

          But it has some high overhead for sure.

  • corsicanguppy@lemmy.ca
    link
    fedilink
    English
    arrow-up
    8
    ·
    20 hours ago

    This thing looks great but it has layers of supply-chain sploit risk. Make sure you’re really secure before trying it – and if you’re (otherwise) iso27002 compliant, give it a pass.

    • nelson@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      18 hours ago

      I’m trying to wrap my head around your comment to understand. What exactly do you mean by supply chain sploit risk?

      The tool is using 3rd party libraries and those libraries could be used to introduce vulnerabilities in the app?

    • notquitenothing@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      19 hours ago

      I would not recommend using VoidAuth to anyone who needs to be any kind of security compliant. I am not a security professional and am using packages for the OIDC and other security heavy-lifting. I can recommend VoidAuth for those just looking for a simple but good looking auth app for securing their own selfhosted apps and resources.

    • notquitenothing@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      22 hours ago

      While I haven’t spun up Keycloak myself, I think VoidAuth would supply some similar functionality. Ideally the features of Keycloak that you are likely to need but easier to setup and use!