- Stars
- 31,368
- License
- Apache-2.0
- Last commit
- 3 days ago
Best Identity & SSO Tools
Explore leading tools in the Identity & SSO category, including open-source options and SaaS products. Compare features, use cases, and find the best fit for your workflow.
10+ open-source projects · 7 SaaS products
Top open-source Identity & SSO
These projects are active, self-hostable choices for knowledge management teams evaluating alternatives to SaaS tools.
- Stars
- 25,985
- License
- Apache-2.0
- Last commit
- 3 days ago
- Stars
- 23,668
- License
- MIT
- Last commit
- 3 days ago
- Stars
- 19,049
- License
- Unknown
- Last commit
- 3 days ago
- Stars
- 14,731
- License
- Unknown
- Last commit
- 8 days ago
- Stars
- 13,055
- License
- Apache-2.0
- Last commit
- 3 days ago
Open Source Identity and Access Management for Modern Applications
Open-source authentication and authorization server providing two-factor authentication and single sign-on for applications via a web portal, acting as a companion for reverse proxies.
Popular SaaS Platforms to Replace
Understand the commercial incumbents teams migrate from and how many open-source alternatives exist for each product.
Amazon Cognito
Customer identity and access management service for adding user sign-up, sign-in, and authentication to apps
Auth0
Cloud-based identity management platform for adding user authentication and authorization to applications
Clerk
User authentication and identity APIs for web and mobile apps
JumpCloud
Cloud directory platform for identity and device management
Okta
Identity and access management platform for workforce and customers
Stytch
User authentication APIs and SDKs
Amazon Cognito is a cloud-based identity management service that enables developers to add user sign-up, sign-in, and access control to web and mobile applications. It provides a user directory, supports authentication standards (OAuth 2.0, OpenID Connect), and can federate identities from social and enterprise identity providers, simplifying the implementation of secure user authentication flows.
Frequently replaced when teams want private deployments and lower TCO.
Explore related categories
Browse neighbouring categories in Security to widen your evaluation.
- Application Security Testing (SAST/DAST/SCA)Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
- Compliance Automation & GRCAutomated controls, evidence collection and audits for SOC 2, ISO 27001, HIPAA and more.
- Container SecurityContainer image scanning and Kubernetes security tools for supply chain protection.
- Data Discovery & ClassificationSensitive data discovery, classification and privacy compliance across data stores.
- Secrets ManagementVaults and key management systems for secure storage of credentials and secrets.
- SIEM & Threat DetectionSecurity information and event management platforms for threat monitoring and analysis.





