authentik is an open-source identity provider focused on flexibility and versatility.
Cost / License
- Freemium
- Open Source
Application type
Platforms
- Mac
- Linux
- Self-Hosted
- Kubernetes
- Docker




OAuth2 Proxy is described as 'OAuth2-Proxy is a flexible, open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. It provides a simple and secure way to protect your web applications with OAuth2 / OIDC' and is a Reverse Proxy server in the security & privacy category. There are six alternatives to OAuth2 Proxy for a variety of platforms, including Self-Hosted, Linux, Docker, Kubernetes and SaaS apps. The best OAuth2 Proxy alternative is authentik, which is both free and Open Source. Other great apps like OAuth2 Proxy are VoidAuth, Ory, Clerk Authentication and Pomerium.
authentik is an open-source identity provider focused on flexibility and versatility.




Open-source authentication and user management platform offering passkey-based SSO, centralized login, user invitations, self-registration, and email integration for self-hosted deployments. Emphasizes privacy, admin and user ease, local data control, and strong security.

Ory builds cloud-native authentication (login), authorization (permission), delegation (OAuth2, OpenID Connect), and user management software. You can deploy what you need yourself or use the Ory Network and get started in minutes.
Clerk is more than a "sign-in box." Integrate complete user management UIs and APIs, purpose-built for React, Next.js, and the Modern Web.

Pomerium is an identity and context-aware proxy that enables secure access to applications without a client. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in.



An open-source UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform with web UI supporting OAuth 2.0, OIDC, SAML, CAS, LDAP, SCIM, WebAuthn, TOTP, MFA, Face ID, RADIUS, Google Workspace, Active Directory and Kerberos.