Browse Software
List Your Product
Loading...
Dex logo

Dex

  Add to Compare

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
View Details

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Authentik logo
View Details

Overview

Description Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. Read more Authentik is the most versatile Identity Provider available today. For professionals requiring the highest standard of digital security and looking to extend their existing environment with additional protocols, Authentik is the perfect choice. Authentik allows easily to authenticate users in customers application without the hassle of arduous user sign-up procedures or forgotten password resets. It also enables other authentication methods such as OpenID Connect and OAuth2 protocols, meaning that customer can enjoy support for any type of authentication method that wish to integrate into customers application. Authentik is open-source so that it can be further customized according to unique needs and specifications. Because of its flexibility, it's also incredibly easy to implement new protocols or refine existing ones within a short period of time. Better yet, Authentik represents good value for money as its pricing structure is highly competitive among providers offering similar services. Furthermore, its team of developers are experienced and knowledgeable in this field, meaning customer can rest assured knowing that data is safe with them. For those seeking an exceptional identity provider with expert support and impressive customizability options, look no further than Authentik – the ideal solution for reliable authentication processes. Read more
Pricing Options
  • Free Trial Not Available
  • Keycloak Offers Custom plan.
  • Free Trial Not Available
  • Starts at $5.0. Offers Free-forever plan.
SW Score & Breakdown

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    74%
  • Momentum
    64%
  • Popularity
    73%

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    96%
  • Reviews
    60%
  • Momentum
    61%
  • Popularity
    68%
SaaSworthy Awards # 4 Fastest Growing
Not Available

Features

Total Features
9 Features
10 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 7 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • SaaS/Web/Cloud
    • Installed - Windows
    Modes of Support
    • Online
    • Online
    API Support
    • NA
    • Available

    Reviews & Ratings

    User Rating
    4.4/5 45 user ratings
    Not Available
    Rating Distribution
    • Excellent

      53.3%
    • Very Good

      40%
    • Average

      4.4%
    • Poor

      0%
    • Terrible

      2.2%
    Not Available
    Pros & Cons
    • Open-source and free to use
    • Easy to implement and use
    • Supports a wide range of authentication methods
    • Provides centralized management of user access
    • Offers social login and single sign-on (SSO)
    • May require additional configuration for complex setups
    • Limited reporting and analytics capabilities
    • Fewer integrations compared to some commercial IAM solutions
    • Highly customizable and flexible
    • Supports a wide range of authentication protocols
    • Open-source and cost-effective
    • Experienced and knowledgeable development team
    • Easy to implement and integrate
    • May require technical expertise for advanced customization
    • Limited documentation and support resources compared to some commercial IAM solutions
    • Fewer pre-built integrations compared to some competitors
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • Keycloak Offers Custom plan.
    • Free Trial Not Available
    • Starts at $5.0. Offers Free-forever plan.
    Pricing Plans
    Monthly Plans Annual Plans

    Keycloak Custom

    Open Source Free

    Enterprise Self-Hosted $5.00 $5.00

    Enterprise Cloud $5.00 $5.00 per user / month

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots Admin Console
    + 5 More
    Landing Screen
    + 1 More

    Vendor information

    Company Details Located in: Raleigh, North Carolina

    Not available

    Contact Details

    Not available

    https://www.keycloak.org/

    Not available

    https://goauthentik.io/

    Social Media Handles

    FAQs

    What are the key differences between Keycloak and Authentik?

    Keycloak is an open-source IAM solution that simplifies securing applications, while Authentik is a versatile identity provider with advanced customization options.

    What are the alternative products to Keycloak?

    The top alternatives to Keycloak are Auth0, Azure AD, Okta, Teamstack, and Oracle Identity Management.

    What are the alternative products to Authentik?

    The top alternatives to Authentik are Keycloak, Okta, Login-Master, Ping Identity, and WSO2 Identity Server.

    Which product offers better customization options?

    Authentik offers more extensive customization options due to its open-source nature, allowing for tailored implementations.

    Which product is more suitable for large-scale identity management?

    Both Keycloak and Authentik are capable of handling large-scale identity management, but Keycloak has a wider user base and more enterprise-grade features.

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed