This is not a place of honor
for anybody ever thinking about taking the short way and installing third-party user software like #ZITADEL instead of your own
a word of warning:
This is not a place of honor
for anybody ever thinking about taking the short way and installing third-party user software like #ZITADEL instead of your own
a word of warning:
I'm considering abandoning #KeyCloak in favor of #Zitadel for #IAM. It's a tiny #Kubernetes based setup, and #KeyCloak seems like a massive GUI-first Java behemoth, which is pretty far from my personal preference - something that's light weight, declarative, cloud-native and preferably written […]
Over the last few weeks, I've spent some time on and off researching a good way to do Authn and Authz, and struggled quite a bit with the number of options available. Not completely understanding what I'm doing/how to search for my requirements, I've first started trying Logto (but that an UI clicking contest to set up), then going for kanidm without realizing this doesn't have support for a public sign in form, which is something I need. And just now when I'm relatively sure that Better Auth fits my needs quite well, I've discovered Stack Auth via this nice website: https://www.auth0alternatives.com/ Man, if I only would've found this 4 weeks earlier.
🏰 Zitadel identity manager has 3 serious vulns to patch that could leave organizations at serious risk, including account takeovers and reading of sensitive data.
#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
Well scratch that #Zitadel upgrade. I thought I was using a versioned tag in my #DockerCompose file but I'm actually using latest. As such I've been running 4.x since it was released! :nkoHypers:
#selfhosted #selfhosting #OIDC #IdP #software
I'd like to see if I can upgrade to #Zitadel 4.x today without blowing anything else up :elmo_fire:
#authentication #OIDC #Tailscale #selfhosting #selfhosted #selfhost #IdP
It is an honor to see us listed #3 in the "100 top Software companies and startups in Zurich in July 2025": www.f6s.com/companies/so.... Check out our profile here: www.f6s.com/zitadel. #Zitadel #IAM #Identity
🔐 Step-by-step Guide: Self-host your #Zitadel #TypeScript login UI for complete control over #authentication
✅ Deploy to @vercel.com (or any host)
✅ Custom branding & UX
✅ Different domains per app
✅ Full ownership of #auth flow
👨🎓 👩🎓 🧑🎓 Become an expert at #Zitadel, the #OpenSource #identity platform built for #developers who are tired of legacy #IAM complexity, with @rawkode.dev:
✅ #Multitenant architecture
✅ #Passwordless auth
✅ API-first design
Perfect for #CloudNative engineers!
🔥 NEW: #Zitadel #SDKs for #Java, #Python, #PHP and #Ruby
Stop wrestling with identity integration complexity. Start building.
Get started today: zitadel.com/blog/zitadel...
#DevTools #IAM #SDK
🔐 Step-by-step Guide: Self-host your #Zitadel #TypeScript login UI for complete control over #authentication
✅ Deploy to @vercel (or any host)
✅ Custom branding & UX
✅ Different domains per app
✅ Full ownership of #auth flow
zitadel.com/blog/how-to-...
Happening NOW! If you are thinking of migrating off of #Auth0 and onto #Zitadel, join us here: discord.gg/cWdqA9e3?eve.... Our team will also be sharing a migration guide and other resources you can reference!
What does a "day in the life of ZITADEL CEO" look like?
What is the origin story of #Zitadel, the #CloudNative #Identity and #authentication platform?
🦒 Tall tale about a human-sized stuffed giraffe #Gigi becoming the face of #identity management at #Zitadel!
Started as team reward stickers, evolved into @rootd.ch's birthday gift, Gigi is now our documentation's most recognizable character.
Check out Gigi's full story:
Deployment choice for #identity infrastructure (#SelfHost or #Cloud) should not come at the cost of giving up complete control over your data. Check out this highlight by @rootd.ch on how #zitadel offers flexibility without compromising security posture:
Check out this highlight eu1.hubs.ly/H0jG0ks0 where @rootd.ch highlights how #zitadel stands out with a developer-first #identity platform
5 reasons 150+ customers choose #Zitadel #IAM:
🔐Developer-first multi-tenancy
🔐Self-hosted or cloud deployment flexibility
🔐API-first extensibility
🔐#OpenSource commitment
🔐Actionable audit history
See how #zitadel is transforming #identity:
5 reasons 150+ customers choose #Zitadel #IAM:
🔐Developer-first multi-tenancy
🔐Self-hosted or cloud deployment flexibility
🔐API-first extensibility
🔐#OpenSource commitment
🔐Actionable audit history
See how #zitadel is transforming #identity:
🔒 Choosing between #Keycloak and #Zitadel?
Our 2025 roadmap includes #TypeScript Login with #OIDC, enhanced #Actions Framework, and #Audit Trail.
See the full comparison: zitadel.com/blog/zitadel...
#IAM #Security #OpenSource
✨ Spotlight: Our @rootd.ch, CEO & Co-Founder. Florian started #zitadel with a mission to create developer-friendly #identity management that's both open-source and enterprise-ready.
Check out how Florian's vision is reshaping identity infrastructure: zitadel.com/blog/meet-fl... #IAM #Auth
Tired of #authentication pages that don't match your app's look and feel? #Zitadel now lets you build your own login experience with our Session API! Handle username/password flows, social logins, and even modern passkeys - all with your branding and #UX:
🔍 Academic research meets real-world #authentication!
Melvin needed to study how #auth methods affect #accessibility. He chose #Zitadel over #Keycloak for its flexible custom login API.
Using Next.js, he built interfaces with both traditional auth and passkeys:
🚨 1-hour heads-up 🚨
In one hour, join Fabienne Bühler (Chief Product Officer) and Tim Möhlmann (Engineering Lead) for a #Zitadel V3 Feature demo at 17:00 UTC on our #discord: discord.gg/gmxHjsnT?eve...
Technical comparison: #Zitadel vs. #Keycloak 💻
⚡ Event-driven architecture
⚡ Unique project grouping
⚡ Multi-tenancy approach
⚡ Licensing differences (Apache → AGPL)
Read our detailed analysis for engineering teams: zitadel.com/blog/zitadel...
#Security #OpenSource #IAM
This is an excellent step-by-step guide by @lamw.bsky.social on how to configure #zitadel as an identity provider for vCenter Server: