Displaying 1 to 20 from 26 results

fosite - Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.

  •    Go

The security first OAuth2 & OpenID Connect framework for Go. Built simple, powerful and extensible. This library implements peer-reviewed IETF RFC6749, counterfeits weaknesses covered in peer-reviewed IETF RFC6819 and countermeasures various database attack scenarios, keeping your application safe when that hacker penetrates or leaks your database. OpenID Connect is implemented according to OpenID Connect Core 1.0 incorporating errata set 1 and includes all flows: code, implicit, hybrid.OAuth2 and OpenID Connect are difficult protocols. If you want quick wins, we strongly encourage you to look at Hydra. Hydra is a secure, high performance, cloud native OAuth2 and OpenID Connect service that integrates with every authentication method imaginable and is built on top of Fosite.

osin - Golang OAuth2 server library

  •    Go

OSIN is an OAuth2 server library for the Go language, as specified at http://tools.ietf.org/html/rfc6749 and http://tools.ietf.org/html/draft-ietf-oauth-v2-10.It also includes support for PKCE, as specified at https://tools.ietf.org/html/rfc7636, which increases security for code-exchange flows for public OAuth clients.

oauth2 - Go OAuth2

  •    Go

oauth2 package contains a client implementation for OAuth 2.0 spec.Or you can manually git clone the repository to $(go env GOPATH)/src/golang.org/x/oauth2.

goth - Package goth provides a simple, clean, and idiomatic way to write authentication packages for Go web applications

  •    Go

Package goth provides a simple, clean, and idiomatic way to write authentication packages for Go web applications.Unlike other similar packages, Goth, lets you write OAuth, OAuth2, or any other protocol providers, as long as they implement the Provider and Session interfaces.




gologin - Go login handlers for authentication providers (OAuth1, OAuth2)

  •    Go

Package gologin provides chainable login http.Handler's for Google, Github, Twitter, Digits, Facebook, Bitbucket, Tumblr, or any OAuth1 or OAuth2 authentication providers.Choose a subpackage. Register the LoginHandler and CallbackHandler for web logins or the TokenHandler for (mobile) token logins. Get the authenticated user or access token from the request context.

authboss - The boss of http auth.

  •    Go

Authboss is a modular authentication system for the web. It tries to remove as much boilerplate and "hard things" as possible so that each time you start a new web project in Go, you can plug it in, configure, and start building your app without having to build an authentication system each time. This reduces the potential for mistakes since authentication is not exactly trivial and should hopefully be generic enough to be plugged into all sorts of different web applications.Each module can be turned on simply by importing it and the side-effects take care of the rest. Not all the capabilities of authboss are represented by a module, see use cases to view the supported use cases as well as how to use them in your app.

go-oauth2-server - A standalone, specification-compliant, OAuth2 server written in Golang.

  •    Go

This service implements OAuth 2.0 specification. Excerpts from the specification are included in this README file to describe different grant types. Please read the full spec for more detailed information.Clients must authenticate with client credentials (client ID and secret) when issuing requests to /v1/oauth/tokens endpoint. Basic HTTP authentication should be used.

loginsrv - JWT login microservice with plugable backends such as OAuth2, Github, htpasswd, osiam

  •    Go

loginsrv is a standalone minimalistic login server providing a JWT login for multiple login backends.The following providers (login backends) are supported.


jwtproxy - An HTTP-Proxy that adds AuthN through JWTs

  •    Go

The JWT proxy is intended to be used as a complementary service for authenticating, and possibly authorizing requests made between services. There is a forward proxy component, which can be configured to sign outgoing requests to another service, and a reverse proxy component, which can be used to authenticate incoming requests from another service.The JWT forward proxy is used to sign outgoing requests with a JWT using a private key.

gin-oauth2 - Middleware for Gin Framework users who also want to use OAuth2

  •    Go

Gin-OAuth2 is specially made for Gin Framework users who also want to use OAuth2. It was created by Go developers who needed Gin middleware for working with OAuth2 and couldn't find any.When it comes to choosing a Go framework, there's a lot of confusion about what to use. The scene is very fragmented, and detailed comparisons of different frameworks are still somewhat rare. Meantime, how to handle dependencies and structure projects are big topics in the Go community. We've liked using Gin for its speed, accessibility, and usefulness in developing microservice architectures. In creating Gin-OAuth2, we wanted to take fuller advantage of Gin's capabilities and help other devs do likewise.

u2f - Go FIDO U2F Library

  •    Go

Go FIDO U2F Library. This Go package implements the parts of the FIDO U2F specification required on the server side of an application.

auth - Istio authentication components

  •    Go

The diagram below shows Istio Auth's architecture, which includes three primary components: identity, key management, and communication security. This diagram describes how Istio Auth is used to secure the service-to-service communication between service 'frontend' running as the service account 'frontend-team' and service 'backend' running as the service account 'backend-team'. Istio supports services running on both Kubernetes containers and VM/bare-metal machines.As illustrated in the diagram, Istio Auth leverages secret volume mount to deliver keys/certs from Istio CA to Kubernetes containers. For services running on VM/bare-metal machines, we introduce a node agent, which is a process running on each VM/bare-metal machine. It generates the private key and CSR (certificate signing request) locally, sends CSR to Istio CA for signing, and delivers the generated certificate together with the private key to Envoy.

firebase-admin-go - Firebase Admin Go SDK

  •    Go

Firebase provides the tools and infrastructure you need to develop apps, grow your user base, and earn money. The Firebase Admin Go SDK enables access to Firebase services from privileged environments (such as servers or cloud) in Go. Currently this SDK provides Firebase custom authentication support.For more information, visit the Firebase Admin SDK setup guide.

gotrue - An SWT based API for managing users and issuing SWT tokens

  •    Go

GoTrue is a small open-source API written in golang, that can act as a self-standing API service for handling user registration and authentication for JAM projects.It's based on OAuth2 and JWT and will handle user signup, authentication and custom user data.

go-alone - A very simple to use, high-performance, Go (golang) MAC signer.

  •    Go

For help with this package or general Go discussion, please join the Discord Gophers chat server.This assumes you already have a working Go environment, if not please see this page first.

scorsh - Signed-Commit Remote Shell - authenticated trigger for remote execution via Git

  •    Go

scorsh lets you trigger commands on a remote git server through commits, optionally signed with gnupg. scorsh is written in Go.

kubehook - A JWT based Kubernetes webhook authentication service.

  •    Go

Kubehook is a webhook token authentication service for Kubernetes. It provides one API endpoint to generate JSON Web Tokens, and another to validate tokens on behalf of Kubernetes. Kubehook can optionally be configured with a set of Kubernetes clusters to automatically configure. When run with the --kubecfg-template users can simply download a ~/.kube/config file preconfigured with well known clusters.

kuberos - An OIDC authentication helper for Kubernetes' kubectl

  •    Go

An OIDC authentication helper for Kubernetes' kubectl. The latter two of these parameters must be aquired by performing an initial OIDC authentication outside of kubectl. OIDC is an awkward authentication method for a commandline tool as it is entirely browser based. Existing implementations (see Alternatives) provide CLI tools to handle this initial authentication. These CLIs will typically require the user connect to localhost in their Browser to perform the initial authentication.

multipass - Better authentication for HTTP

  •    Go

Multipass is like HTTP Basic authentication but better and without passwords. Multipass implements the idea to authenticate users based on something they own instead of something they know. This is better known as the second factor of Two-factor Authentication.