An flexible authentication and authorization platform provided as a service.
The open source reference implementation for Identity-as-a-Service solutions.
⭐ Star us on GitHub — it motivates us a lot!
This is the core of idaas.nl: (not) yet another identity platform.
Idaas.nl has similaries with Auth0, Okta, Oracle IDCS Azure AD B2C, Ping Identity, ForgeRock, OneLogin, Keykloak, Gluu and other products.
Idaas.nl is a true multi-tenant solution. It is design to scale out and provides great flexibility.
Run the commands listed below and access your tenant via http://login.notidaas.nl
Note: notidaas.nl
is a special domain. This domain and all subdomains point to localhost. You’ll need to create a local (trusted) certificate. Below you’ll find how.
docker-compose up
After a minute or so, visit http://login.notidaas.nl and login with [email protected]
and password changeit
.
An example Kubernetes configuration can be found in ./kubernetes/
.
In order to start the Kubernetes cluster in minikube, run the following.
# Start minikube and
minikube start --mount-string="$(pwd):/var/www/html" --mount --extra-config=apiserver.service-node-port-range=80-30000
# Build the docker images
env $(cat .env.demo | xargs) docker-compose build laravel.test node.test
# Apply the configuration
minikube kubectl apply -- -f ./kubernetes/
# Expose all services
minikube service --all
# Open a Socks5 proxy
ssh -i ~/.minikube/machines/minikube/id_rsa -D 8080 docker@$(minikube ip)
Use whatever method to open a shell in a pod of the idaas
service and run the following.
php artisan migrate
php artisan tenant:master login [email protected]
Now configure your browser to use localhost:8080
as a SOCKS5 proxy and browse to login.notidaas.nl
.
mkcert
is a simple tool for making locally-trusted development certificates. It requires no configuration.
# from this project's root folder
mkcert -install
mkcert --key-file ./nginx/_wildcard.notidaas.nl-key.pem --cert-file ./nginx/_wildcard.notidaas.nl.pem *.notidaas.nl *.manage.notidaas.nl *.minio.notidaas.nl